CN108694670A - Transaction data authentication method, apparatus and system - Google Patents

Transaction data authentication method, apparatus and system Download PDF

Info

Publication number
CN108694670A
CN108694670A CN201810832808.4A CN201810832808A CN108694670A CN 108694670 A CN108694670 A CN 108694670A CN 201810832808 A CN201810832808 A CN 201810832808A CN 108694670 A CN108694670 A CN 108694670A
Authority
CN
China
Prior art keywords
transaction data
rule
verified
field
platform
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810832808.4A
Other languages
Chinese (zh)
Other versions
CN108694670B (en
Inventor
罗奔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hongqiao Hi Tech Group Co ltd
Original Assignee
Zhuhai Hongqiao Hi Tech Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Hongqiao Hi Tech Co Ltd filed Critical Zhuhai Hongqiao Hi Tech Co Ltd
Priority to CN201810832808.4A priority Critical patent/CN108694670B/en
Publication of CN108694670A publication Critical patent/CN108694670A/en
Application granted granted Critical
Publication of CN108694670B publication Critical patent/CN108694670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present invention provides a kind of transaction data authentication method, apparatus and system, method is applied to block chain network, and block chain network is communicated with multiple business platforms respectively, and method includes:Receive the target document mark and transaction data corresponding with target document mark that any business platform is sent;In the correspondence of preset document mark and proof rule, determine that proof rule corresponding with target document mark is target verification rule;Transaction data is verified using target verification rule;If being verified, then in the correspondence of preset transmission platform, document mark and purpose platform, determine the corresponding purpose platform of business platform that target document mark is identified and sent with target document, send transaction data to purpose platform, the low technical problem of the flexibility of transaction data authentication system existing in the prior art is alleviated, the technique effect for improving transaction data authentication system flexibility has been reached.

Description

Transaction data authentication method, apparatus and system
Technical field
The present invention relates to transaction data authentication technical field, more particularly, to a kind of transaction data authentication method, apparatus and System.
Background technology
International trade (International Trade) is also referred to as had trade relations, and refers to kinds of goods and service transacting across border, and one As be made of imports trade and the export trade, therefore also referred to as foreign trade.The participant of international trade can wrap It includes:International trade consignee or consignor, international trade service supplier, international trade place operator and regulatory agency.It is each international The participant of trade corresponds to a business platform respectively, and the transmission of data is traded between business platform.
In practical applications, due to actual operation flow demand, A business platforms need transmission transaction data to give B business Data verification rule is both provided in platform and C business platforms, B business platforms and C business platforms, if A business platforms are transferred to B The transaction data of business platform does not meet the rule of the data verification in B business platforms, then B business platforms rejection A business is flat The transaction data of platform transmission.Similarly, if the transaction data that A business platforms are transferred to C business platforms is not met in C business platforms Data verification rule, the then transaction data that C business platforms rejection A business platforms transmit.So when A business platforms transmit The particular content of transaction data when change, the number in data verification rule and C business platforms in B business platforms It will be changed accordingly according to proof rule, therefore, the problem for causing the flexibility of transaction data authentication system low.
Invention content
In view of this, the purpose of the present invention is to provide a kind of transaction data authentication method, apparatus and system, it is existing to alleviate The technical problem for having the flexibility of transaction data authentication system present in technology low.
In a first aspect, an embodiment of the present invention provides a kind of transaction data authentication method, method is applied to block chain network, The block chain network is communicated with multiple business platforms respectively, and method includes:
Receive the target document mark and transaction corresponding with the target document mark that any business platform is sent Data;
In the correspondence of preset document mark and proof rule, test corresponding with the target document mark is determined Card rule is target verification rule;
The transaction data is verified using the target verification rule;
If being verified, in the correspondence of preset transmission platform, document mark and purpose platform, determining and institute It states target document mark and sends the corresponding purpose platform of business platform of the target document mark, send the number of deals According to the purpose platform.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiments of first aspect, wherein institute It includes multiple aiming field marks and the field value corresponding with each aiming field mark, the target to state transaction data Proof rule includes the correspondence between preset field identification and field validation rule, described to be advised using the target verification Then the transaction data is verified, including:
Each aiming field is identified, the correspondence between the field identification and field validation rule In, determine that field validation rule corresponding with aiming field mark is aiming field proof rule;
It is verified using the aiming field proof rule pair field value corresponding with aiming field mark;
If each of the transaction data field value is verified, it is determined that the transaction data authentication is logical It crosses.
With reference to first aspect, an embodiment of the present invention provides second of possible embodiments of first aspect, wherein institute Stating aiming field proof rule includes:Whether allow to verify for empty proof rule, data type proof rule and data length and advise Then, described to be verified using the aiming field proof rule pair field value corresponding with aiming field mark, including:
Whether allow to verify the field value for empty proof rule using described;
If whether the field value allows to be verified for sky, using the data type proof rule to the word Segment value is verified;
If the data type of the field value is verified, using the data length proof rule to the field value It is verified;
If the data length of the field value is verified, it is determined that the field value is verified.
With reference to first aspect, an embodiment of the present invention provides the third possible embodiments of first aspect, wherein institute Whether state allows to verify the field value for empty proof rule using described, including:
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the word Whether segment value allows to be verified for sky;
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, then really Whether the fixed field value allows to be verified for sky.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, wherein institute It states and the field value is verified using the data type proof rule, including:
Obtain the data type of the field value;
If the data type in the data type and the data type proof rule is consistent, it is determined that the field The data type of value is verified.
With reference to first aspect, an embodiment of the present invention provides the 5th kind of possible embodiments of first aspect, wherein institute It states and the field value is verified using the data length proof rule, including:
Obtain the data length of the field value;
If the data length in the data length and the data length proof rule is consistent, it is determined that the field The data length of value is verified.
With reference to first aspect, an embodiment of the present invention provides the 6th kind of possible embodiments of first aspect, wherein side Method further includes:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
Second aspect, the embodiment of the present invention also provide a kind of transaction data authentication device, including:Receiving module determines mould Block, authentication module and sending module;
The receiving module, for receive target document mark that any business platform is sent and with the target document mark Know corresponding transaction data;
The determining module, in the correspondence of preset document mark and proof rule, determining and the mesh It is target verification rule to mark document and identify corresponding proof rule;
The authentication module, for being verified to the transaction data using the target verification rule;
The sending module, if for being verified, in preset transmission platform, pair of document mark and purpose platform In should being related to, determine that the corresponding purpose of business platform for identifying and sending the target document mark with the target document is flat Platform sends the transaction data to the purpose platform.
The third aspect, the embodiment of the present invention also provide a kind of transaction data authentication system, including:It multiple business platforms and answers With the block chain network of any the method for such as first aspect, the block chain network is led to multiple business platforms respectively Letter.
Fourth aspect, the embodiment of the present invention also provide a kind of meter for the non-volatile program code that can perform with processor Calculation machine readable medium, said program code make the processor execute the method as described in first aspect is any.
The embodiment of the present invention brings following advantageous effect:Transaction data authentication method application provided in an embodiment of the present invention In block chain network, the block chain network is communicated with multiple business platforms respectively, and method includes:It is flat to receive any business The target document mark and transaction data corresponding with the target document mark that platform is sent;It identifies and verifies in preset document In the correspondence of rule, determine that proof rule corresponding with the target document mark is target verification rule;Using described Target verification rule verifies the transaction data;If being verified, in preset transmission platform, document mark and mesh Platform correspondence in, determine and target document mark and to send the business platform that the target document identifies right The purpose platform answered sends the transaction data to the purpose platform.
So when A business platforms need to transmit transaction data to B business platforms and C business platforms, the transmission of A business platforms The particular content of transaction data when change, it is only necessary to change the proof rule in block chain network, need not be to B The data verification rule in data verification rule and C business platforms in business platform is changed accordingly, is avoided due to working as A When the particular content of the transaction data of business platform transmission changes, the data verification rule in B business platforms and C industry The flexibility of transaction data authentication system is low caused by data verification rule in business platform will be changed accordingly Therefore problem alleviates the low technical problem of the flexibility of transaction data authentication system existing in the prior art, has reached and carried The technique effect of high transaction data authentication system flexibility.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification It obtains it is clear that understand through the implementation of the invention.The purpose of the present invention and other advantages are in specification, claims And specifically noted structure is realized and is obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the flow chart of transaction data authentication method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of step S103 in Fig. 1;
Fig. 3 is the flow chart of step S202 in Fig. 2;
Fig. 4 is the structural schematic diagram of transaction data authentication system provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Lower obtained every other embodiment, shall fall within the protection scope of the present invention.
Currently, international trade (International Trade) is also referred to as had trade relations, refer to being handed over across the kinds of goods in border and service Easily, it is generally made of imports trade and the export trade, therefore also referred to as foreign trade.The participant of international trade can To include:International trade consignee or consignor, international trade service supplier, international trade place operator and regulatory agency.Each The participant of international trade corresponds to a business platform respectively, and the transmission of data is traded between business platform.
In practical applications, due to actual operation flow demand, A business platforms need transmission transaction data to give B business Data verification rule is both provided in platform and C business platforms, B business platforms and C business platforms, if A business platforms are transferred to B The transaction data of business platform does not meet the rule of the data verification in B business platforms, then B business platforms rejection A business is flat The transaction data of platform transmission.Similarly, if the transaction data that A business platforms are transferred to C business platforms is not met in C business platforms Data verification rule, the then transaction data that C business platforms rejection A business platforms transmit.So when A business platforms transmit The particular content of transaction data when change, the number in data verification rule and C business platforms in B business platforms It will be changed accordingly according to proof rule, therefore, the problem for causing the flexibility of transaction data authentication system low is based on This, a kind of transaction data authentication method, apparatus and system provided in an embodiment of the present invention can be alleviated existing in the prior art The low technical problem of the flexibility of transaction data authentication system has reached the technology effect for improving transaction data authentication system flexibility Fruit.
For ease of understanding the present embodiment, first to a kind of transaction data authentication side disclosed in the embodiment of the present invention Method describes in detail, and method is applied to block chain network, and the block chain network is communicated with multiple business platforms respectively.
Illustratively, multiple business platforms may include:Consignee's business platform, consignor's business platform, service provide Person's business platform, place operator's business platform and regulatory agency's business platform.
Illustratively, ISP's business platform may include:Declare at customs business platform, inspection declaration business platform, ship For business platform, logistics transportation business platform, forwarder business platform, banking platform, insurance business platform and financing business Platform etc..
Illustratively, the place operator business platform may include:Wharfage platform, is protected harbor service platform Tax area business platform and supervision place business platform etc..
Illustratively, regulatory agency's business platform may include:Customs service platform, quarantine business platform, maritime affairs Business platform, frontier inspection business platform, foreign currency operation platform, national tax business platform, businesses platform and port business platform etc..
As shown in Figure 1, the transaction data authentication method may comprise steps of.
Step S101, block chain network receive the target document mark that any business platform is sent and with the target Document identifies corresponding transaction data.
Illustratively, the transaction data is the data in the document.The transaction data may include:Multiple targets Field identification and the field value corresponding with each aiming field mark.The transaction data can be as shown in table 1.
Table 1
Aiming field identifies Field value
A field identifications A field values
B field identifies B field values
C field identifications C field values
D field identifies D field values
Step S102 is determined and the target document mark in the correspondence of preset document mark and proof rule It is target verification rule to know corresponding proof rule.
Illustratively, the correspondence of the document mark and proof rule can be as shown in table 2.
Table 2
Document identifies Proof rule
E documents identify E proof rules
F documents identify F proof rules
G documents identify G proof rules
H documents identify H proof rules
I documents identify I proof rules
J documents identify J proof rules
Illustratively, if the target document is identified as H documents mark, it can determine that target verification rule is verified for H Rule.
Step S103 verifies the transaction data using the target verification rule.
Illustratively, the target verification rule may include pair between preset field identification and field validation rule It should be related to.Correspondence between field identification in H proof rules and field validation rule can be as shown in table 3.
Table 3
Field identification Field validation rule
A field identifications H1Field validation rule
B field identifies H2Field validation rule
C field identifications H3Field validation rule
D field identifies H4Field validation rule
Illustratively, H1Field validation rule is verified for a pair field value corresponding with A field identifications;H2Field is tested Card rule is verified for a pair field value corresponding with B field mark;H3Field validation rule for pair with C field identifications pair The field value answered is verified;H4Field validation rule is verified for a pair field value corresponding with D field mark.
As shown in Fig. 2, step S103 may comprise steps of.
Step S201 identifies each aiming field, between the field identification and field validation rule In correspondence, determine that field validation rule corresponding with aiming field mark is aiming field proof rule.
Illustratively, for A field identifications, determine that aiming field proof rule is H1Field validation rule.For B field Mark determines that aiming field proof rule is H2Field validation rule.For C field identifications, aiming field proof rule is determined For H3Field validation rule.D field is identified, determines that aiming field proof rule is H4Field validation rule.
Step S202 is carried out using the aiming field proof rule pair field value corresponding with aiming field mark Verification.
Illustratively, H is utilized1Field validation rule verifies a field values.Utilize H2Field validation rule is to b fields Value is verified.Utilize H3Field validation rule verifies c field values.Utilize H4Field validation rule carries out d field values Verification.
Illustratively, the aiming field proof rule may include:Whether allow to test for empty proof rule, data type Card rule and data length proof rule.
As shown in figure 3, step S202 may comprise steps of.
Whether step S301 allows to verify the field value for empty proof rule using described.
Illustratively, it is illustrated by taking a field values as an example.Whether allowed for empty proof rule to a field values using described It is verified.
Illustratively, step S301 may comprise steps of.
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the word Whether segment value allows to be verified for sky.
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, then really Whether the fixed field value allows to be verified for sky.
Step S302 utilizes data type verification rule if whether the field value allows to be verified for sky Then the field value is verified.
Illustratively, if whether a field values allow to be verified for sky, the data type proof rule pair is utilized A field values are verified.
Illustratively, described that the field value is verified using the data type proof rule, may include with Lower step.
Obtain the data type of the field value.
Illustratively, data type can be:Initial form, multi-component system, recording unit, algebraic data type, abstract number According to type, reftype or type function.
It is illustrated by taking numeric data type as an example.Numeric data type may include:Integer, long, single precision are floating Point-type, double-precision floating point type and currency.
If the data type in the data type and the data type proof rule is consistent, it is determined that the field The data type of value is verified.
Illustratively, it is illustrated by taking integer as an example, if the data type of a field values is integer, the data type is tested Data type in card rule is also integer, it is determined that the data type of a field values is verified.If the data class of a field values Type is integer, and the data type in the data type proof rule is single-precision floating point type, it is determined that the data class of a field values Type verification does not pass through.
Step S303 utilizes the data length proof rule pair if the data type of the field value is verified The field value is verified.
Illustratively, if the data type of a field values is verified, using the data length proof rule to a words Segment value is verified.
Illustratively, described that the field value is verified using the data length proof rule, may include with Lower step.
Obtain the data length of the field value.
Illustratively, data length can generally be indicated with byte.
If the data length in the data length and the data length proof rule is consistent, it is determined that the field The data length of value is verified.
Illustratively, if the data length of a field values is 2 bytes, the data length in the data length proof rule For 2 bytes, then it is determined that the data length of a field values is verified.
Step S304, if the data length of the field value is verified, it is determined that the field value is verified.
Illustratively, if the data length of a field values is verified, it is determined that a field values are verified.
Step S203, if each of described transaction data field value is verified, it is determined that the number of deals According to being verified.
Illustratively, if a field values, b field values, c field values and d field values are verified, it is determined that the transaction Data verification passes through.
Step S104, if being verified, in preset transmission platform, the correspondence of document mark and purpose platform In, determine the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document, hair Send the transaction data to the purpose platform.
Illustratively, the correspondence for sending platform, document mark and purpose platform can be as shown in table 4.
Table 4
Send platform Document identifies Purpose platform
A business platforms E documents identify B business platforms
B business platforms F documents identify C business platforms
C business platforms G documents identify D business platforms
D business platforms H documents identify E business platforms
E business platforms I documents identify F business platforms
F business platforms J documents identify G business platforms
Illustratively, if D business platforms transmission H documents, which identify, is given block chain network, the purpose that block chain network determines Platform is E business platforms.If being verified, block chain network sends transaction data to E business platforms.
In the embodiment of the present invention, transaction data authentication method provided in an embodiment of the present invention is applied to block chain network, institute It states block chain network to communicate with multiple business platforms respectively, method includes:Receive the target list that any business platform is sent Card mark and transaction data corresponding with the target document mark;In the correspondence of preset document mark and proof rule In, determine that proof rule corresponding with the target document mark is target verification rule;It is right using the target verification rule The transaction data is verified;If being verified, closed in preset transmission platform, document mark and the corresponding of purpose platform In system, the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document is determined, The transaction data is sent to the purpose platform.
So when A business platforms need to transmit transaction data to B business platforms and C business platforms, the transmission of A business platforms The particular content of transaction data when change, it is only necessary to change the proof rule in block chain network, need not be to B The data verification rule in data verification rule and C business platforms in business platform is changed accordingly, is avoided due to working as A When the particular content of the transaction data of business platform transmission changes, the data verification rule in B business platforms and C industry The flexibility of transaction data authentication system is low caused by data verification rule in business platform will be changed accordingly Therefore problem alleviates the low technical problem of the flexibility of transaction data authentication system existing in the prior art, has reached and carried The technique effect of high transaction data authentication system flexibility.
In practical applications, send transaction data business platform sent transaction data after, in this case it is not apparent that transaction data Whether it is successfully sent, in order to solve this problem, in another embodiment of the present invention, the transaction data authentication method is also May include:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
In the embodiment of the present invention, if the transaction data authentication that business platform is sent does not pass through, the transmission of block chain network is tested Card is not by notifying to the business platform.After the business platform for sending transaction data receives verification not by notice, just Know that transaction data is not successfully sent, needs to retransmit transaction data.If the business platform for sending transaction data does not receive To verification not by notice, then business platform is known that transaction data is successfully sent.Thus it is guaranteed that transaction data is tested The high efficiency and practicability of card process.
In another embodiment of the present invention, a kind of transaction data authentication device disclosed in the embodiment of the present invention is carried out It is discussed in detail, including:Receiving module, determining module, authentication module and sending module;
The receiving module, for receive target document mark that any business platform is sent and with the target document mark Know corresponding transaction data;
The determining module, in the correspondence of preset document mark and proof rule, determining and the mesh It is target verification rule to mark document and identify corresponding proof rule;
The authentication module, for being verified to the transaction data using the target verification rule;
The sending module, if for being verified, in preset transmission platform, pair of document mark and purpose platform In should being related to, determine that the corresponding purpose of business platform for identifying and sending the target document mark with the target document is flat Platform sends the transaction data to the purpose platform.
In another embodiment of the present invention, a kind of transaction data authentication system disclosed in the embodiment of the present invention is carried out It is discussed in detail, including:The block chain network of multiple business platforms and application such as any the method for above-described embodiment, the block Chain network is communicated with multiple business platforms respectively.
Illustratively, multiple business platforms may include:Consignee's business platform, consignor's business platform, service provide Person's business platform, place operator's business platform and regulatory agency's business platform.
Illustratively, ISP's business platform may include:Declare at customs business platform, inspection declaration business platform, ship For business platform, logistics transportation business platform, forwarder business platform, banking platform, insurance business platform and financing business Platform etc..
Illustratively, the place operator business platform may include:Wharfage platform, is protected harbor service platform Tax area business platform and supervision place business platform etc..
Illustratively, regulatory agency's business platform may include:Customs service platform, quarantine business platform, maritime affairs Business platform, frontier inspection business platform, foreign currency operation platform, national tax business platform, businesses platform and port business platform etc..
Illustratively, by taking the transaction data authentication system includes a block chain network and four business platforms as an example into Row explanation.As shown in figure 4, the transaction data authentication system may include:Block chain network 11 and four business platforms, four Business platform is respectively:Business platform 12, business platform 13, business platform 14 and business platform 15.Block chain network 11 is distinguished It is communicated with business platform 12, business platform 13, business platform 14 and business platform 15.
In another embodiment of the present invention, to disclosed in the embodiment of the present invention it is a kind of with processor can perform it is non- The computer-readable medium of volatile program code describes in detail, and said program code makes the processor execute above-mentioned reality Apply any method of example.
Unless specifically stated otherwise, the opposite step of the component and step that otherwise illustrate in these embodiments, digital table It is not limit the scope of the invention up to formula and numerical value.
The technique effect and preceding method embodiment phase of the device that the embodiment of the present invention is provided, realization principle and generation Together, to briefly describe, device embodiment part does not refer to place, can refer to corresponding contents in preceding method embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In all examples being illustrated and described herein, any occurrence should be construed as merely illustrative, without It is as limitation, therefore, other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
Flow chart and block diagram in attached drawing show the system, method and computer journey of multiple embodiments according to the present invention The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part for a part for one module, section or code of table, the module, section or code includes one or more uses The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can essentially base Originally it is performed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.It is also noted that It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule The dedicated hardware based system of fixed function or action is realized, or can use the group of specialized hardware and computer instruction It closes to realize.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can Can also be electrical connection to be mechanical connection;It can be directly connected, can also indirectly connected through an intermediary, Ke Yishi Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition Concrete meaning in invention.
In the description of the present invention, it should be noted that term "center", "upper", "lower", "left", "right", "vertical", The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to Convenient for the description present invention and simplify description, do not indicate or imply the indicated device or element must have a particular orientation, With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ", " third " is used for description purposes only, and is not understood to indicate or imply relative importance.
What the embodiment of the present invention was provided is traded the computer program product of data verification method, including stores place The computer readable storage medium of the executable non-volatile program code of device is managed, the instruction that said program code includes can be used for The method described in previous methods embodiment is executed, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit, Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for The mutual coupling, direct-coupling or communication connection of opinion can be by some communication interfaces, device or unit it is indirect Coupling or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product It is stored in the executable non-volatile computer read/write memory medium of a processor.Based on this understanding, of the invention Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words The form of product embodies, which is stored in a storage medium, including some instructions use so that One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention State all or part of step of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read- Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with Store the medium of program code.
Finally it should be noted that:Embodiment described above, only specific implementation mode of the invention, to illustrate the present invention Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair It is bright to be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art In the technical scope disclosed by the present invention, it can still modify to the technical solution recorded in previous embodiment or can be light It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover the protection in the present invention Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. a kind of transaction data authentication method, which is characterized in that method is applied to block chain network, the block chain network difference It is communicated with multiple business platforms, method includes:
Receive the target document mark and transaction data corresponding with the target document mark that any business platform is sent;
In the correspondence of preset document mark and proof rule, verification rule corresponding with the target document mark are determined It is then target verification rule;
The transaction data is verified using the target verification rule;
If being verified, in the correspondence of preset transmission platform, document mark and purpose platform, determine and the mesh Mark document mark and the corresponding purpose platform of business platform for sending target document mark, send the transaction data to The purpose platform.
2. transaction data authentication method according to claim 1, which is characterized in that the transaction data includes multiple targets Field identification and the field value corresponding with each aiming field mark, the target verification rule includes preset field Correspondence between mark and field validation rule, it is described that the transaction data is tested using the target verification rule Card, including:
Each aiming field is identified, in the correspondence between the field identification and field validation rule, really Fixed field validation rule corresponding with aiming field mark is aiming field proof rule;
It is verified using the aiming field proof rule pair field value corresponding with aiming field mark;
If each of the transaction data field value is verified, it is determined that the transaction data authentication passes through.
3. transaction data authentication method according to claim 2, which is characterized in that the aiming field proof rule packet It includes:Whether allow for empty proof rule, data type proof rule and data length proof rule, the utilization target word Section proof rule pair field value corresponding with aiming field mark is verified, including:
Whether allow to verify the field value for empty proof rule using described;
If whether the field value allows to be verified for sky, using the data type proof rule to the field value It is verified;
If the data type of the field value is verified, the field value is carried out using the data length proof rule Verification;
If the data length of the field value is verified, it is determined that the field value is verified.
4. transaction data authentication method according to claim 3, which is characterized in that described whether to allow for sky described in Proof rule verifies the field value, including:
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the field value Whether allow be verified for sky;
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, it is determined that institute Whether state field value allows to be verified for sky.
5. transaction data authentication method according to claim 3, which is characterized in that described to be verified using the data type Rule verifies the field value, including:
Obtain the data type of the field value;
If the data type in the data type and the data type proof rule is consistent, it is determined that the field value Data type is verified.
6. transaction data authentication method according to claim 3, which is characterized in that described to be verified using the data length Rule verifies the field value, including:
Obtain the data length of the field value;
If the data length in the data length and the data length proof rule is consistent, it is determined that the field value Data length is verified.
7. transaction data authentication method according to claim 1, which is characterized in that method further includes:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
8. a kind of transaction data authentication device, which is characterized in that including:Receiving module, determining module, authentication module and transmission mould Block;
The receiving module, for receive target document mark that any business platform is sent and with target document mark pair The transaction data answered;
The determining module, in the correspondence of preset document mark and proof rule, determining and the target list It is target verification rule that card, which identifies corresponding proof rule,;
The authentication module, for being verified to the transaction data using the target verification rule;
If the sending module closes for being verified in preset transmission platform, document mark and the corresponding of purpose platform In system, the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document is determined, The transaction data is sent to the purpose platform.
9. a kind of transaction data authentication system, which is characterized in that including:Multiple business platforms and application such as claim 1-7 appoint The block chain network of one the method, the block chain network are communicated with multiple business platforms respectively.
10. a kind of computer-readable medium for the non-volatile program code that can perform with processor, which is characterized in that described Program code makes the processor execute described any the methods of claim 1-7.
CN201810832808.4A 2018-07-25 2018-07-25 Transaction data verification method, device and system Active CN108694670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810832808.4A CN108694670B (en) 2018-07-25 2018-07-25 Transaction data verification method, device and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810832808.4A CN108694670B (en) 2018-07-25 2018-07-25 Transaction data verification method, device and system

Publications (2)

Publication Number Publication Date
CN108694670A true CN108694670A (en) 2018-10-23
CN108694670B CN108694670B (en) 2020-10-20

Family

ID=63851770

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810832808.4A Active CN108694670B (en) 2018-07-25 2018-07-25 Transaction data verification method, device and system

Country Status (1)

Country Link
CN (1) CN108694670B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112215466A (en) * 2020-09-08 2021-01-12 支付宝(杭州)信息技术有限公司 Transaction data supervision processing method and device and electronic equipment
CN113378549A (en) * 2021-06-29 2021-09-10 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN114880049A (en) * 2022-03-09 2022-08-09 深圳萨摩耶数字科技有限公司 Data processing method and device, electronic equipment and storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1535217A4 (en) * 2002-06-11 2006-06-21 First Data Corp Value processing network and methods
US20120303525A1 (en) * 2011-05-23 2012-11-29 Sharath Sahadevan Methods and systems for verifying regulation compliance
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN107240017A (en) * 2017-07-20 2017-10-10 捷德(中国)信息科技有限公司 Block chain trade managing system and method
CN107833060A (en) * 2017-11-13 2018-03-23 中国银行股份有限公司 The verification method and system of intelligent contract transaction in a kind of block chain
CN108027867A (en) * 2015-07-14 2018-05-11 Fmr有限责任公司 Calculate efficient transfer accounts processing, audit and searcher, method and system
CN108229981A (en) * 2018-01-29 2018-06-29 杭州云象网络技术有限公司 A kind of anti-fake source tracing method of supply chain finance based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP1535217A4 (en) * 2002-06-11 2006-06-21 First Data Corp Value processing network and methods
US20120303525A1 (en) * 2011-05-23 2012-11-29 Sharath Sahadevan Methods and systems for verifying regulation compliance
CN108027867A (en) * 2015-07-14 2018-05-11 Fmr有限责任公司 Calculate efficient transfer accounts processing, audit and searcher, method and system
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN107018119A (en) * 2016-08-30 2017-08-04 阿里巴巴集团控股有限公司 Authentication system, method and platform
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107240017A (en) * 2017-07-20 2017-10-10 捷德(中国)信息科技有限公司 Block chain trade managing system and method
CN107833060A (en) * 2017-11-13 2018-03-23 中国银行股份有限公司 The verification method and system of intelligent contract transaction in a kind of block chain
CN108229981A (en) * 2018-01-29 2018-06-29 杭州云象网络技术有限公司 A kind of anti-fake source tracing method of supply chain finance based on block chain

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112215466A (en) * 2020-09-08 2021-01-12 支付宝(杭州)信息技术有限公司 Transaction data supervision processing method and device and electronic equipment
CN113378549A (en) * 2021-06-29 2021-09-10 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN113378549B (en) * 2021-06-29 2023-02-14 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN114880049A (en) * 2022-03-09 2022-08-09 深圳萨摩耶数字科技有限公司 Data processing method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN108694670B (en) 2020-10-20

Similar Documents

Publication Publication Date Title
Mao et al. Novel automatic food trading system using consortium blockchain
CN108694670A (en) Transaction data authentication method, apparatus and system
CN109784633A (en) Device, method and the storage medium of business risk assessment
CN110659983A (en) Bank accounting data processing method and device, electronic equipment and storage medium
CN109034701A (en) International trade document transmission method, apparatus and system
CN109165959A (en) Supply chain querying method and device based on block chain
CN110175916A (en) Cash flow checking method and device
Heejung Participation of private investors in container terminal operation: influence of global terminal operators
Henesey et al. Improved load planning of RoRo vessels by adopting blockchain and internet-of-things
US20230019729A1 (en) System and Method of Providing Physically Authenticated Digital Tracking and Association for Objects and Products
CN109062936A (en) A kind of data query method, computer readable storage medium and terminal device
Kim et al. Efficient stowage plan with loading and unloading operations for shipping liners using foldable containers and shift cost-sharing
CN110222323A (en) A kind of voucher generation method, device, readable storage medium storing program for executing and terminal device
Boison et al. Blockchain ready port supply chain using distributed ledger
CN108492119A (en) Information anti-fake authentication method, device, equipment and medium based on block chain
CN110991962A (en) Freight waybill processing method and device based on block chain, computing equipment and medium
Suárez-Alemán et al. Port reforms in Latin America and the Caribbean: where we stand, how we got here, and what is left
CN117408522B (en) Tail payment risk early warning method, system and medium
Knutsen et al. Containerized immutable maritime data sharing utilizing Distributed Ledger Technologies
CN107133163A (en) A kind of method and apparatus for verifying description class API
CN109102246A (en) A kind of trade Synergistic method and trade cooperative system based on block chain
CN108898407A (en) Goods information retroactive method, apparatus and system
CN108921490A (en) A kind of sending method of notification information, storage medium and server
Al et al. Secure rfid protocol to manage and prevent tag counterfeiting with matryoshka concept
Cheng et al. A system dynamics approach to operational and strategic planning of a container terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CP03 Change of name, title or address

Address after: 519000 Rooms 806, 901 and 902, No. 29, Lanwan Lane, Tangjiawan Town, Xiangzhou District, Zhuhai City, Guangdong Province

Patentee after: Hongqiao Hi Tech Group Co.,Ltd.

Address before: 519000 1st floor, area D, South Software Park, No.1, Tangjiawan Software Park Road, Xiangzhou District, Zhuhai City, Guangdong Province

Patentee before: ZHUHAI HONGQIAO HIGH-TECH Co.,Ltd.

CP03 Change of name, title or address