CN114330949A - Method, device and equipment for asset assessment based on block chain - Google Patents

Method, device and equipment for asset assessment based on block chain Download PDF

Info

Publication number
CN114330949A
CN114330949A CN202011218558.9A CN202011218558A CN114330949A CN 114330949 A CN114330949 A CN 114330949A CN 202011218558 A CN202011218558 A CN 202011218558A CN 114330949 A CN114330949 A CN 114330949A
Authority
CN
China
Prior art keywords
report
hash value
manuscript
cloud
obtaining
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011218558.9A
Other languages
Chinese (zh)
Inventor
李秀荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xiamen Yunzhong Lian Technology Co ltd
Original Assignee
Xiamen Yunzhong Lian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xiamen Yunzhong Lian Technology Co ltd filed Critical Xiamen Yunzhong Lian Technology Co ltd
Priority to CN202011218558.9A priority Critical patent/CN114330949A/en
Publication of CN114330949A publication Critical patent/CN114330949A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

The present application relates to a method for asset valuation, the method comprising: assisting the user in writing a report; generating an evaluation report and a report abstract corresponding to the evaluation report; generating a report original hash value of the evaluation report, storing the evaluation report to a cloud, and obtaining a returned report cloud address; storing the reported raw hash value and the reported cloud address to a blockchain; storing the report summary to a blockchain.

Description

Method, device and equipment for asset assessment based on block chain
Technical Field
The application relates to the technical field of network application, in particular to a method, a device and equipment for asset assessment based on a block chain and cloud storage.
Background
In recent years, with the development of social economy, the application scenes of asset assessment are increasing. For example, real estate or asset transactions, mortgages, taxes, leases, investments, etc. are all independable from asset valuations. Most of traditional asset assessment reports are written on line, and the report writing efficiency is low and the report quality cannot be guaranteed by means of non-professional third-party general office software such as word and excel. The time and effort required to write an assessment report is significant, the work efficiency is low, and the ever-increasing assessment needs cannot be met. In addition, the report anti-counterfeiting means is simple, and is easy to be falsified and forged, so that potential safety hazards are brought to report users, and the report users are difficult to share and use.
Disclosure of Invention
Based on this, the application provides a method, a device and equipment for asset assessment.
According to an aspect of the application, a method for asset assessment is presented, the method comprising:
assisting the user in writing a report;
generating an evaluation report and a report abstract corresponding to the evaluation report;
generating a report original hash value of the evaluation report, storing the evaluation report to a cloud, and obtaining a returned report cloud address;
storing the reported raw hash value and the reported cloud address to a blockchain;
storing the report summary to a blockchain.
According to some embodiments, the aforementioned method further comprises: generating a manuscript; generating a manuscript original hash value of the manuscript, storing the manuscript to the cloud, and obtaining a returned manuscript cloud address; and storing the manuscript original hash value and the manuscript cloud address to a block chain.
According to some embodiments, the assisting user in report composition comprises: acquiring attachment information from a blockchain; acquiring an accessory from the cloud according to the accessory information; and the auxiliary user writes corresponding content of the corresponding evaluation report according to the content of the accessory.
According to some embodiments, before storing the reported raw hash value and the reported cloud address to a blockchain, further comprising: encrypting the report original hash value and the report cloud address by a public key; and/or encrypting the manuscript original hash value and the manuscript cloud address through a public key.
According to some embodiments, the storing the reported raw hash value and the reported cloud address to a blockchain comprises: generating a report primary key identification corresponding to the evaluation report; storing the report original hash value and the report cloud address encrypted by the report primary key identification and the public key to a block chain; and/or
Generating a manuscript primary key identification corresponding to the manuscript; and storing the manuscript original hash value and the manuscript cloud address encrypted by the manuscript primary key identification and the public key to a block chain.
According to some embodiments, before storing the reported raw hash value and the reported cloud address to a blockchain, further comprising: encrypting the report original hash value and the report cloud address through a first symmetric key to obtain first report encrypted data; encrypting the first symmetric key through a public key to obtain a first digital envelope; and/or encrypting the manuscript original hash value and the manuscript cloud address through a second symmetric key to obtain first manuscript encrypted data; and encrypting the second symmetric key through a public key to obtain a second digital envelope.
According to some embodiments, the storing the reported raw hash value and the reported cloud address to a blockchain comprises: generating a report primary key identification corresponding to the evaluation report; storing the report primary key identification and the encrypted report original hash value and the report cloud address to a blockchain; storing the report primary key identification and a first digital envelope to a blockchain; and/or generating a manuscript primary key identification corresponding to the manuscript; associating the manuscript primary key identification with the encrypted manuscript original hash value and the manuscript cloud address and then storing the association result in a block chain; and storing the manuscript primary key identification and the second digital envelope to a block chain.
According to some embodiments, the aforementioned method further comprises further comprising: generating an attachment list, and storing the attachment list to a blockchain, wherein the attachment list comprises the report primary key identification and/or the manuscript primary key identification.
According to some embodiments, said chaining the blocks on the report summary comprises: encrypting the report abstract by a public key and then uploading the report abstract to a block chain; or encrypting the report digest by a symmetric key; encrypting the symmetric key through public keys of related members of the alliance chain to obtain a digital envelope; and the encrypted report summary and the block chain on the digital envelope.
According to an aspect of the application, a method for asset assessment is presented, the method comprising:
obtaining an encrypted report digest from the blockchain;
obtaining the decrypted report digest;
acquiring an attachment list related to the report abstract;
obtaining a corresponding report original hash value and a report cloud address from the blockchain through the attachment list;
acquiring a download evaluation report from the cloud through the report cloud address;
obtaining a report check hash value of the download evaluation report;
judging the consistency of the report original hash value and the report check hash value;
and if the consistency is established, providing the download evaluation report to the user.
According to some embodiments, the aforementioned method further comprises: obtaining a corresponding manuscript original hash value and a manuscript cloud address in a block chain through the attachment list; acquiring a download manuscript from the cloud through the manuscript cloud address; acquiring a manuscript check hash value of the download manuscript; judging the consistency of the manuscript original hash value and the manuscript check hash value; and if the consistency is established, providing the download manuscript for the user.
According to some embodiments, the obtaining the list of attachments related to the report summary comprises: obtaining the attachment list from the local; or obtain the list of attachments from the blockchain.
According to some embodiments, the obtaining, by the accessory list, a corresponding report raw hash value and a report cloud address in a blockchain comprises: acquiring the encrypted original report hash value and the encrypted report cloud address through a report primary key identifier in the attachment list; and obtaining the decrypted report original hash value and the report cloud address.
According to some embodiments, the obtaining the decrypted report raw hash value and report cloud address comprises: obtaining the report original hash value and the report cloud address decrypted by a private key; or obtaining a digital envelope decrypted by a private key to obtain a symmetric key; and decrypting through the symmetric key to obtain the report original hash value and the report cloud address.
According to some embodiments, the obtaining, by the accessory list, a corresponding report raw hash value and a report cloud address in a blockchain further comprises: acquiring the encrypted report cloud address through the report original hash value in the attachment list; and obtaining the decrypted report cloud address.
According to some embodiments, said obtaining said decrypted report digest comprises: obtaining the report digest decrypted by a private key; or obtaining a digital envelope decrypted by a private key to obtain a symmetric key; and decrypting by the symmetric key to obtain the report digest.
According to an aspect of the application, an apparatus for asset assessment is presented, comprising: the writing module is used for assisting a user in writing a report; the generating module is used for generating an evaluation report and a report abstract corresponding to the evaluation report; the cloud-going module is used for generating a report original hash value of the evaluation report, storing the evaluation report to the cloud and obtaining a returned report cloud address; a chaining module for storing the reported original hash value and the reported cloud address to a block chain; the uplink module further stores the report summary to a blockchain.
According to an aspect of the application, an apparatus for asset assessment is presented, comprising: a downlink module that obtains an encrypted report digest from the blockchain; the decryption module is used for obtaining the decrypted report abstract; the acquisition module acquires an attachment list related to the report abstract; the matching module is used for obtaining a corresponding report original hash value and a report cloud address from the block chain through the accessory list; the cloud downloading module acquires a downloading evaluation report from the cloud through the report cloud address; the hash value calculation module is used for acquiring a report check hash value of the download evaluation report; the checking module is used for judging the consistency of the report original hash value and the report checking hash value; and the feedback module is used for providing the download evaluation report to the user if the consistency is established.
According to an aspect of the present application, an electronic device is provided, including: one or more processors; storage means for storing one or more programs; when executed by the one or more processors, cause the one or more processors to implement a method as in any above.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is apparent that the drawings in the following description only show some embodiments of the present application.
FIG. 1a illustrates an architecture diagram of a system for asset assessment, according to an exemplary embodiment.
FIG. 1b shows a flowchart of a method for asset valuation, according to an example embodiment.
FIG. 2 shows a flowchart of a method for asset valuation in accordance with an exemplary embodiment.
FIG. 3 shows a flow diagram of another method for asset valuation in accordance with an exemplary embodiment.
FIG. 4 illustrates an apparatus block diagram of a method for asset assessment, according to an exemplary embodiment.
FIG. 5 illustrates an apparatus block diagram of another method for asset assessment in accordance with exemplary embodiments.
FIG. 6 shows a block diagram of an electronic device according to an example embodiment.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. Example embodiments may, however, be embodied in many different forms and should not be construed as limited to the embodiments set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of example embodiments to those skilled in the art. The same reference numerals denote the same or similar parts in the drawings, and thus, a repetitive description thereof will be omitted.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the application. One skilled in the relevant art will recognize, however, that the subject matter of the present application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, and so forth. In other instances, well-known methods, devices, implementations, or operations have not been shown or described in detail to avoid obscuring aspects of the application.
The block diagrams shown in the figures are functional entities only and do not necessarily correspond to physically separate entities. I.e. these functional entities may be implemented in the form of software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor means and/or microcontroller means.
The flow charts shown in the drawings are merely illustrative and do not necessarily include all of the contents and operations/steps, nor do they necessarily have to be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the actual execution sequence may be changed according to the actual situation.
It will be understood that, although the terms first, second, third, etc. may be used herein to describe various components, these components should not be limited by these terms. These terms are used to distinguish one element from another. Thus, a first component discussed below may be termed a second component without departing from the teachings of the present concepts. As used herein, the term "and/or" includes any and all combinations of one or more of the associated listed items.
It will be appreciated by those skilled in the art that the drawings are merely schematic representations of exemplary embodiments, and that the blocks or processes shown in the drawings are not necessarily required to practice the present application and are, therefore, not intended to limit the scope of the present application.
FIG. 1a illustrates an architecture diagram of a system for asset assessment, according to an exemplary embodiment.
As shown in fig. 1a, the main components of the system for asset assessment are: a service platform 101, a blockchain 103, and a cloud 105.
According to an example embodiment, an asset assessment system may be implemented based on a federation proposal. The alliance chain can be composed of large-scale evaluation organizations and bank nodes, and the business of small and medium-scale evaluation organizations can be accessed as a direct node or accessed through a proxy node (for example, an evaluation service platform). In this system, multiple parties collaborate to share asset assessment reporting information among the involved parties (e.g., assessment associations, banks, assessment institutions, etc.). By adopting the block chain, the asset evaluation report can not be tampered, can be traced from end to end, and is easy to supervise and audit. In the aspect of system ecological expansion, supervision and audit departments, insurance, small credit companies, channels, auction companies, national funding committees and intermediaries can conveniently and quickly join in through a alliance chain.
According to an example embodiment, the evaluation service platform may provide a unified Portal to customers, evaluation authorities, banks, and operators, where each participant may perform business processes. The evaluation service platform may provide a series of service tools for an evaluation organization or other participants to complete or view an evaluation report. According to some embodiments, an assessment institution conducts online assessment report writing work through an assessment service platform.
In this application, an asset valuation may be understood in a broad sense, including a real estate valuation, an intangible asset valuation, an intellectual property valuation, and the like, depending on the context, unless otherwise noted.
The blockchain 103 provides an untampered ledger maintained by multiple parties, and trust is improved for multiple parties of transactions. The change process of the assets (assessment reports) is recorded in detail, and service tracing and evidence obtaining are facilitated.
According to the embodiment, the user can access the system through multiple devices, and in the asset evaluation process, the user plays different roles in the system due to different functional requirements, so that the user has different functions and rights.
According to one embodiment, the user's role is, for example, an asset assessment organization, and the user collects assessment data attachments, which are stored to the blockchain process by the service platform 101. The general flow is as shown in fig. 1b, the attachment is calculated by the service platform 101 to obtain the hash value of the attachment, and then the assessment data attachment is stored in the cloud 105 and the storage link address is returned to the service platform 101. The service platform 101 associates the evaluation data attachment, the hash value and the storage link address, encrypts the hash value and the storage link address, and sends the encrypted hash value and the encrypted storage link address to the block chain 103 for storage. After all assessment material attachments are processed, the user selects the required assessment material attachments from the full assessment material attachments with the help of the service platform 101 to write asset assessment reports. After writing, the service platform 101 generates an asset assessment report file, a report summary, and an attachment list, where the attachment list records assessment material attachments used in the asset assessment report. The asset assessment report file can be considered as one of the attachments, and the service platform 101 performs the same storage to block chain processing as the assessment data attachment. The service platform 101 encrypts the generated report summary and the attachment list and sends the report summary and the attachment list to the blockchain 103 for storage.
According to another embodiment, the user role is, for example, an organization designated by the asset assessment organization that can view asset assessment reports, and after the user is permitted to view asset assessment reports, the service platform 101 obtains the corresponding encrypted report summary and attachment list from the blockchain 103, and decrypts the report summary and attachment list to obtain the report summary and attachment list. And acquiring the encrypted hash value and the storage link address corresponding to the asset assessment report file from the blockchain 103 through the attachment list, acquiring the asset assessment report file from the cloud 105 according to the storage link address after decryption, and calculating the obtained hash value of the asset assessment report file. Compares it with the hash value stored in blockchain 103, and if consistent, provides an asset assessment report file to the user; if not, the user is prompted that the asset assessment reporting file has been tampered with. The user can view all attachments applied in the asset assessment report file through the attachment list, and the acquisition and verification method is the same as that of the asset assessment report file, as described above, and is shown in fig. 1 b.
The system ensures the consistency and reliability of asset evaluation data and results by using the characteristic that the block chain data is difficult to tamper; the cloud 101 is used for assisting the block chain 103 to store large files occupying large space, the defect that the efficiency of storing the large files in the block chain is poor is overcome, the storage efficiency is ensured, and meanwhile, a file hash value verification mechanism is cooperatively introduced, so that the content of the file can be ensured to be difficult to be tampered even if the file is not stored in the block chain 103; and a combined encryption method is applied, so that the asset evaluation related information is only displayed for part of the specified blockchain participants.
According to some embodiments, the uplink/clouding data for real estate evaluations may include: evaluation report number, title, evaluation consignor, project name, evaluation purpose, evaluation method, value time point, value type, evaluation object (including use, land use right type, building structure, building area, year of construction, level, total number of layers, land use period) and evaluation result (including value under the assumption that no legal priority is established, legal priority paid and known by the evaluator, mortgage value, tax and treatment fee expected to realize the mortgage, mortgage net value), registered real estate evaluator 1, registered real estate evaluator 2, report valid time, report valid time interval, hash and url of the picture document/video of the item being evaluated, hash and url of the evaluation report, hash and url of each attachment of the evaluation report, etc. The safety privacy protection, the non-tampering and the traceability of the evaluation report are realized, and the information can be shared among related parties.
According to further embodiments, the uplink/clouding data for asset valuations may include: project name, issue number (report number, to be reported in the assessment society), value type, assessment standard day, report issuing time, assessment method (at least two of three must be selected), signature assessor 1, signature assessor 2, assessment purpose, assessed unit name, principal name, assessment object, assessment scope, organization name, method for assessing conclusion, accounting value, basic law assessment value, market law assessment value, income law assessment value, other assessment method assessment value, report user and summary table (attachment, unit: ten thousand yuan), and the like. The above can be disclosed internally by the interested party, can be modified, but must add a reason for the modification, and can not cover the historical data. The safety privacy protection, the non-tampering and the traceability of the evaluation report are realized, the information can be shared among related parties, and the chain must be linked in the first stage; an assessment report (attachment), an assessment institution statement (attachment, automatically using the latest according to time matching), an assessment officer commitment letter (attachment, automatically using the latest according to time matching), a classification summary sheet (table 2+ income method), various asset classification summary sheets (attachment), and a back-up file (attachment), wherein the link is selectively linked according to the actual situation, but the link is required in the second stage; list (accessories) and description (accessories) for selectively winding according to actual conditions, but the third stage must wind; the working manuscript (accessories) is selectively linked according to the actual situation, but the fourth stage must be linked, and the two, three and four stages are all linked with Hash and URL.
FIG. 2 shows a flowchart of a method for asset valuation in accordance with an exemplary embodiment.
As shown in fig. 2, at S201, the secondary user composes a report.
According to an example embodiment, the user role of this flow is, for example, an asset assessment organization. Before that, the user has completed the operation of collecting and storing the evaluation data attachment to the blockchain, and the overall method is as described above, wherein specifically, when encrypting the hash value and the storage link address of the evaluation data attachment, the following method can be adopted: according to an embodiment, the generation of the symmetric key can be performed on a service platform, a third-party platform and the like without limitation; the symmetric key is used to encrypt the hash value and the storage link address of the assessment material attachment.
According to an example embodiment, in the foregoing operation of collecting and storing an evaluation data attachment to a block chain by a user, specifically, when associating the evaluation data attachment, a hash value, and a storage link address, the following method may be adopted: generating a primary key identification to be associated with the hash value and the storage link address so as to facilitate matching in subsequent calling or reading; or, by using the characteristic that the hash value has different sources and almost does not have repeated values, the hash value can be used as the primary key identifier, and in this case, the hash value is not encrypted during encryption, and only the link address is encrypted.
According to an exemplary embodiment, the user needs to use the assessment materials attachment already stored to the blockchain when composing the report, and the calling process is as follows: and the service platform finds the corresponding encrypted hash value and the corresponding storage link address or the plaintext hash value and the corresponding encrypted storage link address in the block chain through the primary key identification. And then, a plaintext storage link address is obtained by using a symmetric key provided by a user for decryption, a corresponding evaluation data attachment is obtained from the cloud through the link address, a new hash value is obtained by calculation, the new hash value is compared with the hash value obtained from the block chain, and if the new hash value is consistent with the hash value obtained from the block chain, the attachment is reliable and is not tampered, so that the method can be used for assisting the user in writing a report.
According to an exemplary embodiment, during the process of writing a report by a user, a new manuscript content is generated according to the input content of the user, which is substantially equal to the evaluation material attachment, and the processing procedure of the newly generated manuscript content is the same as that of the evaluation material attachment and the evaluation report.
Therefore, according to the embodiment of the application, the evaluation process is recorded on the blockchain and the cloud by storing and sharing the manuscript of the evaluation report through the blockchain and the cloud, so that the non-falsification and falsification of the evaluation report are ensured, and a solid technical foundation is provided for the reliable utilization of the evaluation report.
At S203, an evaluation report and a report summary are generated.
According to an example embodiment, after a user has written a report, an assessment report, a report summary, and a list of attachments are generated. The primary key identifiers of all the accessories used in the evaluation report are recorded in the accessory list, and the accessory list is associated with the asset evaluation item or the report abstract to which the accessory list belongs, and according to one embodiment, the accessory list can be associated through another primary key identifier. This list of attachments may be stored at the service platform or may also be stored to the blockchain. The list of attachments stored in the blockchain may or may not be encrypted with a symmetric key, since the contents of the list of attachments have no substantive information regarding the contents of the asset measure.
At S205, a hash value of the evaluation report is generated, the evaluation report is stored to the cloud and a returned cloud address is obtained.
According to an exemplary embodiment, the evaluation report is a file, which may be considered an evaluation data attachment, and the same evaluation data attachment is stored in the blockchain process, which is first calculated to obtain the hash value. And then storing the evaluation report to the cloud and returning the storage link address of the evaluation report to the service platform.
At S209, the hash value and the cloud address are stored to the blockchain.
According to the embodiment, after the hash value and the storage link address are encrypted through a symmetric key or a public key, a main key identification is generated, the main key identification is associated with the hash value and the storage link address of the evaluation report, and the main key identification is stored to the block chain together with the encrypted hash value and the storage link address.
According to another embodiment, the hash value of the evaluation report can also be used as the primary key identifier, and the hash value of the storage link address after encryption and the plain text is stored in the blockchain.
At S211, the report digest is stored to the blockchain.
According to an exemplary embodiment, the report summary is a text content, and needs to be associated with the asset assessment item to facilitate calling and matching when obtaining, and the report summary is encrypted together with the attachment list by using the symmetric key and then stored in the blockchain. And then, encrypting and packaging the symmetric key by a public key to generate a digital envelope, and correspondingly and respectively packaging a plurality of digital envelopes if a plurality of public keys exist, and storing the digital envelopes to the block chain. According to an embodiment, the report digest may also be encrypted with a public key. Data privacy protection can be realized through a key encryption technology and a key distribution mechanism, so that the evaluation report can be shared in a controllable range.
And (3) processing the manuscript: according to an example embodiment, a manuscript is generated; generating a manuscript original hash value of the manuscript, storing the manuscript to the cloud, and obtaining a returned manuscript cloud address; and storing the manuscript original hash value and the manuscript cloud address to a block chain.
According to one embodiment, the manuscript original hash value and the manuscript cloud address are encrypted through a public key.
According to an embodiment, generating a manuscript primary key identification corresponding to a manuscript; and storing the manuscript original hash value and the manuscript cloud address encrypted by the manuscript key identification and the public key to the block chain.
According to one embodiment, the manuscript original hash value and the manuscript cloud address are encrypted through a symmetric key to obtain manuscript encrypted data; and encrypting the symmetric key by a public key to obtain the digital envelope.
According to an embodiment, generating a manuscript primary key identification corresponding to a manuscript; associating the manuscript primary key identification with the encrypted manuscript original hash value and the manuscript cloud address and then storing the association result in a block chain; and storing the manuscript primary key identification and the digital envelope into a block chain.
According to one embodiment, an attachment list is generated, the attachment list is stored to a blockchain, and the attachment list includes a manuscript primary key identification.
According to an example embodiment, the public key is a public key provided by an individual, which is designated by the asset assessment authority and has the right to view asset assessment results, of the member in the federation chain to the asset assessment authority, and the public key is used as encryption and can be used for identity identification and primary key identification. Members in a federation chain share a blockchain, but where different information is only open to a given member.
According to an embodiment, the symmetric key for encrypting the report digest, the hash value of the encrypted evaluation data attachment, and the symmetric key for storing the link address may be the same symmetric key or different symmetric keys, and are not limited herein. If a different symmetric key is utilized, the symmetric key needs to be associated with the corresponding report digest or assessment material attachment by primary key identification.
FIG. 3 shows a flow diagram of another method for asset valuation in accordance with an exemplary embodiment.
As shown in fig. 3, at S301, an encrypted report digest is obtained.
According to an example embodiment, the user role of this flow is an individual designated by, for example, an asset assessment organization, who is entitled to view asset assessment results. The user gets the associated encrypted report summary from the blockchain by authorizing the participating asset assessment project. And according to the above, the digital envelope with the symmetric key encapsulated can be obtained through the public key of the user.
At S303, a decrypted report digest is obtained.
According to an exemplary embodiment, the digital envelope is decrypted by a private key corresponding to the aforementioned public key, resulting in a symmetric key. The clear report digest can be obtained by decryption with the symmetric key.
According to an embodiment, the public key encrypted report digest can be directly decrypted by a private key corresponding to the public key, so that the name text report digest is obtained.
At S305, a list of attachments associated with the report summary is obtained.
According to an example embodiment, the list of attachments corresponding to an asset evaluation item or a report summary may be obtained from the service platform local or blockchain through the established associations described in FIG. 2.
At S307, a hash value and a cloud address are obtained.
Specifically, a hash value and a storage link address of the evaluation report are obtained. According to an example embodiment, as previously described, the hash value and the storage link address of the evaluation report that is matched and derived from the blockchain by the primary key identification stored by the attachment list may be stored. And decrypting the encrypted file by the symmetric key obtained in the step 303 to obtain a plaintext hash value and a storage link address.
According to an embodiment, the public-key encrypted hash value and the storage link address may also be decrypted by the private key.
According to an embodiment, when the primary key identifier is a hash value, it is only necessary to obtain an encrypted storage link address in the block chain by using the hash value stored in the attachment list, and then perform the same decryption process as described above.
At S309, an assessment report is downloaded from the cloud.
According to an example embodiment, the evaluation report is downloaded from the cloud based on the decrypted storage link address.
At S311, a hash value of the downloaded evaluation report is obtained.
According to an example embodiment, a hash value of the downloaded evaluation report is calculated.
At S313, the consistency between the downloaded hash value and the original hash value is determined.
According to an example embodiment, the hash value of the downloaded evaluation report is compared with the hash values of the evaluation reports stored in the blockchain to determine whether the hash values are consistent.
At S315, if the consistency is established, an evaluation report is provided to the user.
According to an example embodiment, if the consistency is judged to be established, an evaluation report is presented to the user. According to some embodiments, the evaluation report can be downloaded to the user for viewing locally, and the user can be limited to view only online to prevent the leakage of key information.
According to another embodiment, if it is determined that the consistency is not established, a warning message such as "the file has been tampered" is presented to the user.
According to an embodiment, the processing of the manuscript may include: obtaining a corresponding manuscript original hash value and a manuscript cloud address in a block chain through an attachment list; acquiring a download manuscript from the cloud through the manuscript cloud address; acquiring a manuscript verification hash value of the downloaded manuscript; judging the consistency of the original hash value of the manuscript and the verification hash value of the manuscript; and if the consistency is established, providing the downloaded manuscript for the user.
According to an exemplary embodiment, the evaluation data attachments and the manuscript contents recorded in the attachment list can also be checked and verified by the method described in fig. 3, and will not be described again.
It is to be understood that some of the foregoing embodiments may be performed by a service platform, or may be performed by other platforms, such as a third party platform, for example, and are not limited in particular herein.
FIG. 4 illustrates an apparatus block diagram of a method for asset assessment, according to an exemplary embodiment.
As shown in FIG. 4, an apparatus of a method for asset valuation may comprise:
the system comprises a composition module 401, a generation module 403, a cloud module 405 and an uplink module 407.
The composition module 401 is used for assisting the user in composition of the report;
the generating module 403 is configured to generate an evaluation report and a report summary corresponding to the evaluation report;
the cloud-up module 405 is configured to generate a report original hash value of an evaluation report, store the evaluation report to a cloud, and obtain a returned report cloud address;
the uplink module 407 is configured to store the reported original hash value and the reported cloud address to the blockchain;
the uplink module 407 is also used to store the report summary to the blockchain.
FIG. 5 illustrates an apparatus block diagram of another method for asset assessment in accordance with exemplary embodiments.
As shown in FIG. 5, another apparatus for a method of asset valuation may comprise:
the system comprises a downlink module 501, a decryption module 503, an acquisition module 505, a matching module 507, a cloud downloading module 509, a hash value calculation module 511, a verification module 513 and a feedback module 515.
The downlink module 501 is used to obtain an encrypted report digest from the blockchain;
the decryption module 503 is configured to obtain a decrypted report digest;
the obtaining module 505 is configured to obtain an attachment list related to the report summary;
the matching module 507 is configured to obtain a corresponding report original hash value and a report cloud address from the block chain through the attachment list;
the cloud downloading module 509 is configured to obtain a download evaluation report from the cloud through the report cloud address;
the hash value calculation module 511 is configured to obtain a report check hash value of the download evaluation report;
the check module 513 is configured to determine consistency between the report original hash value and the report check hash value;
the feedback module 515 is configured to provide the download evaluation report to the user if the consistency is established.
FIG. 6 shows a block diagram of an electronic device according to an example embodiment.
An electronic device 600 according to this embodiment of the present application is described below with reference to fig. 6. The electronic device 600 shown in fig. 6 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present application.
As shown in fig. 6, the electronic device 600 is embodied in the form of a general purpose computing device. The components of the electronic device 600 may include, but are not limited to: at least one processing unit 610, at least one storage unit 620, a bus 630 that connects the various system components (including the storage unit 620 and the processing unit 610), a display unit 640, and the like.
Where the storage unit stores program code that may be executed by the processing unit 610 such that the processing unit 610 performs the methods described herein according to various exemplary embodiments of the present application. For example, the processing unit 610 may perform the methods described previously.
The storage unit 620 may include readable media in the form of volatile memory units, such as a random access memory unit (RAM)6201 and/or a cache memory unit 6202, and may further include a read-only memory unit (ROM) 6203.
The memory unit 620 may also include a program/utility 6204 having a set (at least one) of program modules 6205, such program modules 6205 including, but not limited to: an operating system, one or more application programs, other program modules, and program data, each of which, or some combination thereof, may comprise an implementation of a network environment.
Bus 630 may be one or more of several types of bus structures, including a memory unit bus or memory unit controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
The electronic device 600 may also communicate with one or more external devices 6001 (e.g., a keyboard, a pointing device, a bluetooth device, etc.), with one or more devices that enable a user to interact with the electronic device 600, and/or with any devices (e.g., a router, a modem, etc.) that enable the electronic device 600 to communicate with one or more other computing devices. Such communication may occur via an input/output (I/O) interface 650. Also, the electronic device 600 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN), and/or a public network such as the Internet) via the network adapter 660. The network adapter 660 may communicate with other modules of the electronic device 600 via the bus 630. It should be appreciated that although not shown in the figures, other hardware and/or software modules may be used in conjunction with the electronic device 600, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems, among others.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. The technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (which may be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which may be a personal computer, a server, or a network device, etc.) to execute the above method according to the embodiments of the present application.
The software product may employ any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
A computer readable storage medium may include a propagated data signal with readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A readable storage medium may also be any readable medium that is not a readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a readable storage medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Program code for carrying out operations of the present application may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The computer readable medium carries one or more programs which, when executed by a device, cause the computer readable medium to perform the functions described above.
Those skilled in the art will appreciate that the modules described above may be distributed in the apparatus according to the description of the embodiments, or may be modified accordingly in one or more apparatuses unique from the embodiments. The modules of the above embodiments may be combined into one module, or further split into multiple sub-modules.
Through the above description of the embodiments, those skilled in the art will readily understand that the exemplary embodiments described herein may be implemented by software, or by software in combination with necessary hardware. Therefore, the technical solution according to the embodiment of the present application can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a usb disk, a removable hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiment of the present application.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the description of the embodiments is only intended to facilitate the understanding of the methods and their core concepts of the present application. Meanwhile, a person skilled in the art should, according to the idea of the present application, change or modify the embodiments and applications of the present application based on the scope of the present application. In view of the above, the description should not be taken as limiting the application.

Claims (19)

1. A method for asset assessment based on blockchains, the method comprising:
assisting the user in writing a report;
generating an evaluation report and a report abstract corresponding to the evaluation report;
generating a report original hash value of the evaluation report, storing the evaluation report to a cloud, and obtaining a returned report cloud address;
storing the reported raw hash value and the reported cloud address to a blockchain;
storing the report summary to a blockchain.
2. The method of claim 1, further comprising:
generating a manuscript;
generating a manuscript original hash value of the manuscript, storing the manuscript to the cloud, and obtaining a returned manuscript cloud address;
and storing the manuscript original hash value and the manuscript cloud address to a block chain.
3. The method of claim 1, wherein the assisting user in composing the report comprises:
acquiring attachment information from a blockchain;
acquiring an accessory from the cloud according to the accessory information;
and the auxiliary user writes corresponding content of the corresponding evaluation report according to the content of the accessory.
4. The method of claim 2, wherein prior to storing the reported raw hash value and the reported cloud address to a blockchain, further comprising:
encrypting the report original hash value and the report cloud address by a public key; and/or
And encrypting the manuscript original hash value and the manuscript cloud address through a public key.
5. The method of claim 4, wherein the storing the reported raw hash value and the reported cloud address to a blockchain comprises:
generating a report primary key identification corresponding to the evaluation report;
storing the report original hash value and the report cloud address encrypted by the report primary key identification and the public key to a block chain; and/or
Generating a manuscript primary key identification corresponding to the manuscript;
and storing the manuscript original hash value and the manuscript cloud address encrypted by the manuscript primary key identification and the public key to a block chain.
6. The method of claim 2, wherein prior to storing the reported raw hash value and the reported cloud address to a blockchain, further comprising:
encrypting the report original hash value and the report cloud address through a first symmetric key to obtain first report encrypted data;
encrypting the first symmetric key through a public key to obtain a first digital envelope;
and/or
Encrypting the manuscript original hash value and the manuscript cloud address through a second symmetric key to obtain first manuscript encrypted data;
and encrypting the second symmetric key through a public key to obtain a second digital envelope.
7. The method of claim 6, wherein the storing the reported raw hash value and the reported cloud address to a blockchain comprises:
generating a report primary key identification corresponding to the evaluation report;
storing the report primary key identification and the encrypted report original hash value and the report cloud address to a blockchain;
storing the report primary key identification and a first digital envelope to a blockchain;
and/or
Generating a manuscript primary key identification corresponding to the manuscript;
associating the manuscript primary key identification with the encrypted manuscript original hash value and the manuscript cloud address and then storing the association result in a block chain;
and storing the manuscript primary key identification and the second digital envelope to a block chain.
8. The method of claim 5 or 7, further comprising:
generating an attachment list, and storing the attachment list to a blockchain, wherein the attachment list comprises the report primary key identification and/or the manuscript primary key identification.
9. The method of claim 1, wherein said chaining the report digests into blocks comprises:
encrypting the report abstract by a public key and then uploading the report abstract to a block chain; or
Encrypting the report digest by a symmetric key;
encrypting the symmetric key through public keys of related members of the alliance chain to obtain a digital envelope;
and the encrypted report summary and the block chain on the digital envelope.
10. A method for asset assessment based on blockchains, the method comprising:
obtaining an encrypted report digest from the blockchain;
obtaining the decrypted report digest;
acquiring an attachment list related to the report abstract;
obtaining a corresponding report original hash value and a report cloud address from the blockchain through the attachment list;
acquiring a download evaluation report from the cloud through the report cloud address;
obtaining a report check hash value of the download evaluation report;
judging the consistency of the report original hash value and the report check hash value;
and if the consistency is established, providing the download evaluation report to the user.
11. The method of claim 10, further comprising:
obtaining a corresponding manuscript original hash value and a manuscript cloud address in a block chain through the attachment list;
acquiring a download manuscript from the cloud through the manuscript cloud address;
acquiring a manuscript check hash value of the download manuscript;
judging the consistency of the manuscript original hash value and the manuscript check hash value;
and if the consistency is established, providing the download manuscript for the user.
12. The method of claim 10, wherein said obtaining a list of attachments associated with said report summary comprises:
obtaining the attachment list from the local; or
Obtaining the list of attachments from the blockchain.
13. The method of claim 10, wherein the obtaining, by the attachment list, corresponding report raw hash values and report cloud addresses in a blockchain comprises:
acquiring the encrypted original report hash value and the encrypted report cloud address through a report primary key identifier in the attachment list;
and obtaining the decrypted report original hash value and the report cloud address.
14. The method of claim 13, wherein the obtaining the decrypted report raw hash value and report cloud address comprises:
obtaining the report original hash value and the report cloud address decrypted by a private key; or
Obtaining a digital envelope decrypted by a private key to obtain a symmetric key;
and decrypting through the symmetric key to obtain the report original hash value and the report cloud address.
15. The method of claim 10, wherein the obtaining, by the attachment list, corresponding report raw hash values and report cloud addresses in a blockchain further comprises:
acquiring the encrypted report cloud address through the report original hash value in the attachment list;
and obtaining the decrypted report cloud address.
16. The method of claim 10, wherein said obtaining the decrypted report digest comprises:
obtaining the report digest decrypted by a private key; or
Obtaining a digital envelope decrypted by a private key to obtain a symmetric key;
and decrypting by the symmetric key to obtain the report digest.
17. An apparatus for asset assessment, comprising:
the writing module is used for assisting a user in writing a report;
the generating module is used for generating an evaluation report and a report abstract corresponding to the evaluation report;
the cloud-going module is used for generating a report original hash value of the evaluation report, storing the evaluation report to the cloud and obtaining a returned report cloud address;
a chaining module for storing the reported original hash value and the reported cloud address to a block chain;
the uplink module further stores the report summary to a blockchain.
18. An apparatus for asset assessment, comprising:
a downlink module that obtains an encrypted report digest from the blockchain;
the decryption module is used for obtaining the decrypted report abstract;
the acquisition module acquires an attachment list related to the report abstract;
the matching module is used for obtaining a corresponding report original hash value and a report cloud address from the block chain through the accessory list;
the cloud downloading module acquires a downloading evaluation report from the cloud through the report cloud address;
the hash value calculation module is used for acquiring a report check hash value of the download evaluation report;
the checking module is used for judging the consistency of the report original hash value and the report checking hash value;
and the feedback module is used for providing the download evaluation report to the user if the consistency is established.
19. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs;
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-16.
CN202011218558.9A 2020-11-04 2020-11-04 Method, device and equipment for asset assessment based on block chain Pending CN114330949A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011218558.9A CN114330949A (en) 2020-11-04 2020-11-04 Method, device and equipment for asset assessment based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011218558.9A CN114330949A (en) 2020-11-04 2020-11-04 Method, device and equipment for asset assessment based on block chain

Publications (1)

Publication Number Publication Date
CN114330949A true CN114330949A (en) 2022-04-12

Family

ID=81032898

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011218558.9A Pending CN114330949A (en) 2020-11-04 2020-11-04 Method, device and equipment for asset assessment based on block chain

Country Status (1)

Country Link
CN (1) CN114330949A (en)

Similar Documents

Publication Publication Date Title
US10970274B2 (en) System and method for electronic data capture and management for audit, monitoring, reporting and compliance
McCallig et al. Establishing the representational faithfulness of financial accounting information using multiparty security, network analysis and a blockchain
CA2384944C (en) Document management system
WO2020108046A1 (en) Cross-block chain interaction method and system, computer device, and storage medium
CN110689433A (en) Resource management information service system, method and device based on alliance chain
DE60132495T2 (en) An information management system
US20200005410A1 (en) System and Method for Facilitating Legal Review for Commercial Loan Transactions
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
US20080184334A1 (en) Sealing electronic content
CN112231284A (en) Block chain-based big data sharing system, method, device and storage medium
US20210217098A1 (en) Blockchain-based message services for time-sensitive events
JP2022055352A (en) Method, system and computer program (compliance mechanisms in blockchain networks)
CN111415233A (en) Bank electronic inquiry letter generation method based on block chain multi-party authorization
Spagnoletti et al. Online black-markets: An investigation of a digital infrastructure in the dark
Reed et al. Beyond BitCoin—legal impurities and off-chain assets
Wilson Certificates and trust in electronic commerce
US20100106646A1 (en) System and method for asset identification, evaluation, and control
National Research Council Cryptography's Role in Securing the Information Society
US20210217100A1 (en) Storage management based on message feedback
Rane et al. Integrity and authenticity of academic documents using blockchain approach
Vaidya et al. Data Leakage Detection and Security in Cloud Computing
CN114330949A (en) Method, device and equipment for asset assessment based on block chain
US20230092436A1 (en) Framework for demaraction of digital assets
Kurzban Authentication of computer-generated evidence in the United States Federal courts
US20230070625A1 (en) Graph-based analysis and visualization of digital tokens

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination