CN108694670A - Transaction data authentication method, apparatus and system - Google Patents
Transaction data authentication method, apparatus and system Download PDFInfo
- Publication number
- CN108694670A CN108694670A CN201810832808.4A CN201810832808A CN108694670A CN 108694670 A CN108694670 A CN 108694670A CN 201810832808 A CN201810832808 A CN 201810832808A CN 108694670 A CN108694670 A CN 108694670A
- Authority
- CN
- China
- Prior art keywords
- transaction data
- rule
- verified
- field
- platform
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The present invention provides a kind of transaction data authentication method, apparatus and system, method is applied to block chain network, and block chain network is communicated with multiple business platforms respectively, and method includes:Receive the target document mark and transaction data corresponding with target document mark that any business platform is sent;In the correspondence of preset document mark and proof rule, determine that proof rule corresponding with target document mark is target verification rule;Transaction data is verified using target verification rule;If being verified, then in the correspondence of preset transmission platform, document mark and purpose platform, determine the corresponding purpose platform of business platform that target document mark is identified and sent with target document, send transaction data to purpose platform, the low technical problem of the flexibility of transaction data authentication system existing in the prior art is alleviated, the technique effect for improving transaction data authentication system flexibility has been reached.
Description
Technical field
The present invention relates to transaction data authentication technical field, more particularly, to a kind of transaction data authentication method, apparatus and
System.
Background technology
International trade (International Trade) is also referred to as had trade relations, and refers to kinds of goods and service transacting across border, and one
As be made of imports trade and the export trade, therefore also referred to as foreign trade.The participant of international trade can wrap
It includes:International trade consignee or consignor, international trade service supplier, international trade place operator and regulatory agency.It is each international
The participant of trade corresponds to a business platform respectively, and the transmission of data is traded between business platform.
In practical applications, due to actual operation flow demand, A business platforms need transmission transaction data to give B business
Data verification rule is both provided in platform and C business platforms, B business platforms and C business platforms, if A business platforms are transferred to B
The transaction data of business platform does not meet the rule of the data verification in B business platforms, then B business platforms rejection A business is flat
The transaction data of platform transmission.Similarly, if the transaction data that A business platforms are transferred to C business platforms is not met in C business platforms
Data verification rule, the then transaction data that C business platforms rejection A business platforms transmit.So when A business platforms transmit
The particular content of transaction data when change, the number in data verification rule and C business platforms in B business platforms
It will be changed accordingly according to proof rule, therefore, the problem for causing the flexibility of transaction data authentication system low.
Invention content
In view of this, the purpose of the present invention is to provide a kind of transaction data authentication method, apparatus and system, it is existing to alleviate
The technical problem for having the flexibility of transaction data authentication system present in technology low.
In a first aspect, an embodiment of the present invention provides a kind of transaction data authentication method, method is applied to block chain network,
The block chain network is communicated with multiple business platforms respectively, and method includes:
Receive the target document mark and transaction corresponding with the target document mark that any business platform is sent
Data;
In the correspondence of preset document mark and proof rule, test corresponding with the target document mark is determined
Card rule is target verification rule;
The transaction data is verified using the target verification rule;
If being verified, in the correspondence of preset transmission platform, document mark and purpose platform, determining and institute
It states target document mark and sends the corresponding purpose platform of business platform of the target document mark, send the number of deals
According to the purpose platform.
With reference to first aspect, an embodiment of the present invention provides the first possible embodiments of first aspect, wherein institute
It includes multiple aiming field marks and the field value corresponding with each aiming field mark, the target to state transaction data
Proof rule includes the correspondence between preset field identification and field validation rule, described to be advised using the target verification
Then the transaction data is verified, including:
Each aiming field is identified, the correspondence between the field identification and field validation rule
In, determine that field validation rule corresponding with aiming field mark is aiming field proof rule;
It is verified using the aiming field proof rule pair field value corresponding with aiming field mark;
If each of the transaction data field value is verified, it is determined that the transaction data authentication is logical
It crosses.
With reference to first aspect, an embodiment of the present invention provides second of possible embodiments of first aspect, wherein institute
Stating aiming field proof rule includes:Whether allow to verify for empty proof rule, data type proof rule and data length and advise
Then, described to be verified using the aiming field proof rule pair field value corresponding with aiming field mark, including:
Whether allow to verify the field value for empty proof rule using described;
If whether the field value allows to be verified for sky, using the data type proof rule to the word
Segment value is verified;
If the data type of the field value is verified, using the data length proof rule to the field value
It is verified;
If the data length of the field value is verified, it is determined that the field value is verified.
With reference to first aspect, an embodiment of the present invention provides the third possible embodiments of first aspect, wherein institute
Whether state allows to verify the field value for empty proof rule using described, including:
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the word
Whether segment value allows to be verified for sky;
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, then really
Whether the fixed field value allows to be verified for sky.
With reference to first aspect, an embodiment of the present invention provides the 4th kind of possible embodiments of first aspect, wherein institute
It states and the field value is verified using the data type proof rule, including:
Obtain the data type of the field value;
If the data type in the data type and the data type proof rule is consistent, it is determined that the field
The data type of value is verified.
With reference to first aspect, an embodiment of the present invention provides the 5th kind of possible embodiments of first aspect, wherein institute
It states and the field value is verified using the data length proof rule, including:
Obtain the data length of the field value;
If the data length in the data length and the data length proof rule is consistent, it is determined that the field
The data length of value is verified.
With reference to first aspect, an embodiment of the present invention provides the 6th kind of possible embodiments of first aspect, wherein side
Method further includes:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
Second aspect, the embodiment of the present invention also provide a kind of transaction data authentication device, including:Receiving module determines mould
Block, authentication module and sending module;
The receiving module, for receive target document mark that any business platform is sent and with the target document mark
Know corresponding transaction data;
The determining module, in the correspondence of preset document mark and proof rule, determining and the mesh
It is target verification rule to mark document and identify corresponding proof rule;
The authentication module, for being verified to the transaction data using the target verification rule;
The sending module, if for being verified, in preset transmission platform, pair of document mark and purpose platform
In should being related to, determine that the corresponding purpose of business platform for identifying and sending the target document mark with the target document is flat
Platform sends the transaction data to the purpose platform.
The third aspect, the embodiment of the present invention also provide a kind of transaction data authentication system, including:It multiple business platforms and answers
With the block chain network of any the method for such as first aspect, the block chain network is led to multiple business platforms respectively
Letter.
Fourth aspect, the embodiment of the present invention also provide a kind of meter for the non-volatile program code that can perform with processor
Calculation machine readable medium, said program code make the processor execute the method as described in first aspect is any.
The embodiment of the present invention brings following advantageous effect:Transaction data authentication method application provided in an embodiment of the present invention
In block chain network, the block chain network is communicated with multiple business platforms respectively, and method includes:It is flat to receive any business
The target document mark and transaction data corresponding with the target document mark that platform is sent;It identifies and verifies in preset document
In the correspondence of rule, determine that proof rule corresponding with the target document mark is target verification rule;Using described
Target verification rule verifies the transaction data;If being verified, in preset transmission platform, document mark and mesh
Platform correspondence in, determine and target document mark and to send the business platform that the target document identifies right
The purpose platform answered sends the transaction data to the purpose platform.
So when A business platforms need to transmit transaction data to B business platforms and C business platforms, the transmission of A business platforms
The particular content of transaction data when change, it is only necessary to change the proof rule in block chain network, need not be to B
The data verification rule in data verification rule and C business platforms in business platform is changed accordingly, is avoided due to working as A
When the particular content of the transaction data of business platform transmission changes, the data verification rule in B business platforms and C industry
The flexibility of transaction data authentication system is low caused by data verification rule in business platform will be changed accordingly
Therefore problem alleviates the low technical problem of the flexibility of transaction data authentication system existing in the prior art, has reached and carried
The technique effect of high transaction data authentication system flexibility.
Other features and advantages of the present invention will illustrate in the following description, also, partly become from specification
It obtains it is clear that understand through the implementation of the invention.The purpose of the present invention and other advantages are in specification, claims
And specifically noted structure is realized and is obtained in attached drawing.
To enable the above objects, features and advantages of the present invention to be clearer and more comprehensible, preferred embodiment cited below particularly, and coordinate
Appended attached drawing, is described in detail below.
Description of the drawings
It, below will be to specific in order to illustrate more clearly of the specific embodiment of the invention or technical solution in the prior art
Embodiment or attached drawing needed to be used in the description of the prior art are briefly described, it should be apparent that, in being described below
Attached drawing is some embodiments of the present invention, for those of ordinary skill in the art, before not making the creative labor
It puts, other drawings may also be obtained based on these drawings.
Fig. 1 is the flow chart of transaction data authentication method provided in an embodiment of the present invention;
Fig. 2 is the flow chart of step S103 in Fig. 1;
Fig. 3 is the flow chart of step S202 in Fig. 2;
Fig. 4 is the structural schematic diagram of transaction data authentication system provided in an embodiment of the present invention.
Specific implementation mode
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with attached drawing to the present invention
Technical solution be clearly and completely described, it is clear that described embodiments are some of the embodiments of the present invention, rather than
Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise
Lower obtained every other embodiment, shall fall within the protection scope of the present invention.
Currently, international trade (International Trade) is also referred to as had trade relations, refer to being handed over across the kinds of goods in border and service
Easily, it is generally made of imports trade and the export trade, therefore also referred to as foreign trade.The participant of international trade can
To include:International trade consignee or consignor, international trade service supplier, international trade place operator and regulatory agency.Each
The participant of international trade corresponds to a business platform respectively, and the transmission of data is traded between business platform.
In practical applications, due to actual operation flow demand, A business platforms need transmission transaction data to give B business
Data verification rule is both provided in platform and C business platforms, B business platforms and C business platforms, if A business platforms are transferred to B
The transaction data of business platform does not meet the rule of the data verification in B business platforms, then B business platforms rejection A business is flat
The transaction data of platform transmission.Similarly, if the transaction data that A business platforms are transferred to C business platforms is not met in C business platforms
Data verification rule, the then transaction data that C business platforms rejection A business platforms transmit.So when A business platforms transmit
The particular content of transaction data when change, the number in data verification rule and C business platforms in B business platforms
It will be changed accordingly according to proof rule, therefore, the problem for causing the flexibility of transaction data authentication system low is based on
This, a kind of transaction data authentication method, apparatus and system provided in an embodiment of the present invention can be alleviated existing in the prior art
The low technical problem of the flexibility of transaction data authentication system has reached the technology effect for improving transaction data authentication system flexibility
Fruit.
For ease of understanding the present embodiment, first to a kind of transaction data authentication side disclosed in the embodiment of the present invention
Method describes in detail, and method is applied to block chain network, and the block chain network is communicated with multiple business platforms respectively.
Illustratively, multiple business platforms may include:Consignee's business platform, consignor's business platform, service provide
Person's business platform, place operator's business platform and regulatory agency's business platform.
Illustratively, ISP's business platform may include:Declare at customs business platform, inspection declaration business platform, ship
For business platform, logistics transportation business platform, forwarder business platform, banking platform, insurance business platform and financing business
Platform etc..
Illustratively, the place operator business platform may include:Wharfage platform, is protected harbor service platform
Tax area business platform and supervision place business platform etc..
Illustratively, regulatory agency's business platform may include:Customs service platform, quarantine business platform, maritime affairs
Business platform, frontier inspection business platform, foreign currency operation platform, national tax business platform, businesses platform and port business platform etc..
As shown in Figure 1, the transaction data authentication method may comprise steps of.
Step S101, block chain network receive the target document mark that any business platform is sent and with the target
Document identifies corresponding transaction data.
Illustratively, the transaction data is the data in the document.The transaction data may include:Multiple targets
Field identification and the field value corresponding with each aiming field mark.The transaction data can be as shown in table 1.
Table 1
Aiming field identifies | Field value |
A field identifications | A field values |
B field identifies | B field values |
C field identifications | C field values |
D field identifies | D field values |
Step S102 is determined and the target document mark in the correspondence of preset document mark and proof rule
It is target verification rule to know corresponding proof rule.
Illustratively, the correspondence of the document mark and proof rule can be as shown in table 2.
Table 2
Document identifies | Proof rule |
E documents identify | E proof rules |
F documents identify | F proof rules |
G documents identify | G proof rules |
H documents identify | H proof rules |
I documents identify | I proof rules |
J documents identify | J proof rules |
Illustratively, if the target document is identified as H documents mark, it can determine that target verification rule is verified for H
Rule.
Step S103 verifies the transaction data using the target verification rule.
Illustratively, the target verification rule may include pair between preset field identification and field validation rule
It should be related to.Correspondence between field identification in H proof rules and field validation rule can be as shown in table 3.
Table 3
Field identification | Field validation rule |
A field identifications | H1Field validation rule |
B field identifies | H2Field validation rule |
C field identifications | H3Field validation rule |
D field identifies | H4Field validation rule |
Illustratively, H1Field validation rule is verified for a pair field value corresponding with A field identifications;H2Field is tested
Card rule is verified for a pair field value corresponding with B field mark;H3Field validation rule for pair with C field identifications pair
The field value answered is verified;H4Field validation rule is verified for a pair field value corresponding with D field mark.
As shown in Fig. 2, step S103 may comprise steps of.
Step S201 identifies each aiming field, between the field identification and field validation rule
In correspondence, determine that field validation rule corresponding with aiming field mark is aiming field proof rule.
Illustratively, for A field identifications, determine that aiming field proof rule is H1Field validation rule.For B field
Mark determines that aiming field proof rule is H2Field validation rule.For C field identifications, aiming field proof rule is determined
For H3Field validation rule.D field is identified, determines that aiming field proof rule is H4Field validation rule.
Step S202 is carried out using the aiming field proof rule pair field value corresponding with aiming field mark
Verification.
Illustratively, H is utilized1Field validation rule verifies a field values.Utilize H2Field validation rule is to b fields
Value is verified.Utilize H3Field validation rule verifies c field values.Utilize H4Field validation rule carries out d field values
Verification.
Illustratively, the aiming field proof rule may include:Whether allow to test for empty proof rule, data type
Card rule and data length proof rule.
As shown in figure 3, step S202 may comprise steps of.
Whether step S301 allows to verify the field value for empty proof rule using described.
Illustratively, it is illustrated by taking a field values as an example.Whether allowed for empty proof rule to a field values using described
It is verified.
Illustratively, step S301 may comprise steps of.
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the word
Whether segment value allows to be verified for sky.
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, then really
Whether the fixed field value allows to be verified for sky.
Step S302 utilizes data type verification rule if whether the field value allows to be verified for sky
Then the field value is verified.
Illustratively, if whether a field values allow to be verified for sky, the data type proof rule pair is utilized
A field values are verified.
Illustratively, described that the field value is verified using the data type proof rule, may include with
Lower step.
Obtain the data type of the field value.
Illustratively, data type can be:Initial form, multi-component system, recording unit, algebraic data type, abstract number
According to type, reftype or type function.
It is illustrated by taking numeric data type as an example.Numeric data type may include:Integer, long, single precision are floating
Point-type, double-precision floating point type and currency.
If the data type in the data type and the data type proof rule is consistent, it is determined that the field
The data type of value is verified.
Illustratively, it is illustrated by taking integer as an example, if the data type of a field values is integer, the data type is tested
Data type in card rule is also integer, it is determined that the data type of a field values is verified.If the data class of a field values
Type is integer, and the data type in the data type proof rule is single-precision floating point type, it is determined that the data class of a field values
Type verification does not pass through.
Step S303 utilizes the data length proof rule pair if the data type of the field value is verified
The field value is verified.
Illustratively, if the data type of a field values is verified, using the data length proof rule to a words
Segment value is verified.
Illustratively, described that the field value is verified using the data length proof rule, may include with
Lower step.
Obtain the data length of the field value.
Illustratively, data length can generally be indicated with byte.
If the data length in the data length and the data length proof rule is consistent, it is determined that the field
The data length of value is verified.
Illustratively, if the data length of a field values is 2 bytes, the data length in the data length proof rule
For 2 bytes, then it is determined that the data length of a field values is verified.
Step S304, if the data length of the field value is verified, it is determined that the field value is verified.
Illustratively, if the data length of a field values is verified, it is determined that a field values are verified.
Step S203, if each of described transaction data field value is verified, it is determined that the number of deals
According to being verified.
Illustratively, if a field values, b field values, c field values and d field values are verified, it is determined that the transaction
Data verification passes through.
Step S104, if being verified, in preset transmission platform, the correspondence of document mark and purpose platform
In, determine the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document, hair
Send the transaction data to the purpose platform.
Illustratively, the correspondence for sending platform, document mark and purpose platform can be as shown in table 4.
Table 4
Send platform | Document identifies | Purpose platform |
A business platforms | E documents identify | B business platforms |
B business platforms | F documents identify | C business platforms |
C business platforms | G documents identify | D business platforms |
D business platforms | H documents identify | E business platforms |
E business platforms | I documents identify | F business platforms |
F business platforms | J documents identify | G business platforms |
Illustratively, if D business platforms transmission H documents, which identify, is given block chain network, the purpose that block chain network determines
Platform is E business platforms.If being verified, block chain network sends transaction data to E business platforms.
In the embodiment of the present invention, transaction data authentication method provided in an embodiment of the present invention is applied to block chain network, institute
It states block chain network to communicate with multiple business platforms respectively, method includes:Receive the target list that any business platform is sent
Card mark and transaction data corresponding with the target document mark;In the correspondence of preset document mark and proof rule
In, determine that proof rule corresponding with the target document mark is target verification rule;It is right using the target verification rule
The transaction data is verified;If being verified, closed in preset transmission platform, document mark and the corresponding of purpose platform
In system, the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document is determined,
The transaction data is sent to the purpose platform.
So when A business platforms need to transmit transaction data to B business platforms and C business platforms, the transmission of A business platforms
The particular content of transaction data when change, it is only necessary to change the proof rule in block chain network, need not be to B
The data verification rule in data verification rule and C business platforms in business platform is changed accordingly, is avoided due to working as A
When the particular content of the transaction data of business platform transmission changes, the data verification rule in B business platforms and C industry
The flexibility of transaction data authentication system is low caused by data verification rule in business platform will be changed accordingly
Therefore problem alleviates the low technical problem of the flexibility of transaction data authentication system existing in the prior art, has reached and carried
The technique effect of high transaction data authentication system flexibility.
In practical applications, send transaction data business platform sent transaction data after, in this case it is not apparent that transaction data
Whether it is successfully sent, in order to solve this problem, in another embodiment of the present invention, the transaction data authentication method is also
May include:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
In the embodiment of the present invention, if the transaction data authentication that business platform is sent does not pass through, the transmission of block chain network is tested
Card is not by notifying to the business platform.After the business platform for sending transaction data receives verification not by notice, just
Know that transaction data is not successfully sent, needs to retransmit transaction data.If the business platform for sending transaction data does not receive
To verification not by notice, then business platform is known that transaction data is successfully sent.Thus it is guaranteed that transaction data is tested
The high efficiency and practicability of card process.
In another embodiment of the present invention, a kind of transaction data authentication device disclosed in the embodiment of the present invention is carried out
It is discussed in detail, including:Receiving module, determining module, authentication module and sending module;
The receiving module, for receive target document mark that any business platform is sent and with the target document mark
Know corresponding transaction data;
The determining module, in the correspondence of preset document mark and proof rule, determining and the mesh
It is target verification rule to mark document and identify corresponding proof rule;
The authentication module, for being verified to the transaction data using the target verification rule;
The sending module, if for being verified, in preset transmission platform, pair of document mark and purpose platform
In should being related to, determine that the corresponding purpose of business platform for identifying and sending the target document mark with the target document is flat
Platform sends the transaction data to the purpose platform.
In another embodiment of the present invention, a kind of transaction data authentication system disclosed in the embodiment of the present invention is carried out
It is discussed in detail, including:The block chain network of multiple business platforms and application such as any the method for above-described embodiment, the block
Chain network is communicated with multiple business platforms respectively.
Illustratively, multiple business platforms may include:Consignee's business platform, consignor's business platform, service provide
Person's business platform, place operator's business platform and regulatory agency's business platform.
Illustratively, ISP's business platform may include:Declare at customs business platform, inspection declaration business platform, ship
For business platform, logistics transportation business platform, forwarder business platform, banking platform, insurance business platform and financing business
Platform etc..
Illustratively, the place operator business platform may include:Wharfage platform, is protected harbor service platform
Tax area business platform and supervision place business platform etc..
Illustratively, regulatory agency's business platform may include:Customs service platform, quarantine business platform, maritime affairs
Business platform, frontier inspection business platform, foreign currency operation platform, national tax business platform, businesses platform and port business platform etc..
Illustratively, by taking the transaction data authentication system includes a block chain network and four business platforms as an example into
Row explanation.As shown in figure 4, the transaction data authentication system may include:Block chain network 11 and four business platforms, four
Business platform is respectively:Business platform 12, business platform 13, business platform 14 and business platform 15.Block chain network 11 is distinguished
It is communicated with business platform 12, business platform 13, business platform 14 and business platform 15.
In another embodiment of the present invention, to disclosed in the embodiment of the present invention it is a kind of with processor can perform it is non-
The computer-readable medium of volatile program code describes in detail, and said program code makes the processor execute above-mentioned reality
Apply any method of example.
Unless specifically stated otherwise, the opposite step of the component and step that otherwise illustrate in these embodiments, digital table
It is not limit the scope of the invention up to formula and numerical value.
The technique effect and preceding method embodiment phase of the device that the embodiment of the present invention is provided, realization principle and generation
Together, to briefly describe, device embodiment part does not refer to place, can refer to corresponding contents in preceding method embodiment.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description
It with the specific work process of device, can refer to corresponding processes in the foregoing method embodiment, details are not described herein.
In all examples being illustrated and described herein, any occurrence should be construed as merely illustrative, without
It is as limitation, therefore, other examples of exemplary embodiment can have different values.
It should be noted that:Similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined, then it further need not be defined and explained in subsequent attached drawing in a attached drawing.
Flow chart and block diagram in attached drawing show the system, method and computer journey of multiple embodiments according to the present invention
The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation
A part for a part for one module, section or code of table, the module, section or code includes one or more uses
The executable instruction of the logic function as defined in realization.It should also be noted that in some implementations as replacements, being marked in box
The function of note can also occur in a different order than that indicated in the drawings.For example, two continuous boxes can essentially base
Originally it is performed in parallel, they can also be executed in the opposite order sometimes, this is depended on the functions involved.It is also noted that
It is the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, can uses and execute rule
The dedicated hardware based system of fixed function or action is realized, or can use the group of specialized hardware and computer instruction
It closes to realize.
In addition, in the description of the embodiment of the present invention unless specifically defined or limited otherwise, term " installation ", " phase
Even ", " connection " shall be understood in a broad sense, for example, it may be being fixedly connected, may be a detachable connection, or be integrally connected;It can
Can also be electrical connection to be mechanical connection;It can be directly connected, can also indirectly connected through an intermediary, Ke Yishi
Connection inside two elements.For the ordinary skill in the art, above-mentioned term can be understood at this with concrete condition
Concrete meaning in invention.
In the description of the present invention, it should be noted that term "center", "upper", "lower", "left", "right", "vertical",
The orientation or positional relationship of the instructions such as "horizontal", "inner", "outside" be based on the orientation or positional relationship shown in the drawings, merely to
Convenient for the description present invention and simplify description, do not indicate or imply the indicated device or element must have a particular orientation,
With specific azimuth configuration and operation, therefore it is not considered as limiting the invention.In addition, term " first ", " second ",
" third " is used for description purposes only, and is not understood to indicate or imply relative importance.
What the embodiment of the present invention was provided is traded the computer program product of data verification method, including stores place
The computer readable storage medium of the executable non-volatile program code of device is managed, the instruction that said program code includes can be used for
The method described in previous methods embodiment is executed, specific implementation can be found in embodiment of the method, and details are not described herein.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed systems, devices and methods, it can be with
It realizes by another way.The apparatus embodiments described above are merely exemplary, for example, the division of the unit,
Only a kind of division of logic function, formula that in actual implementation, there may be another division manner, in another example, multiple units or component can
To combine or be desirably integrated into another system, or some features can be ignored or not executed.Another point, it is shown or beg for
The mutual coupling, direct-coupling or communication connection of opinion can be by some communication interfaces, device or unit it is indirect
Coupling or communication connection can be electrical, machinery or other forms.
The unit illustrated as separating component may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, you can be located at a place, or may be distributed over multiple
In network element.Some or all of unit therein can be selected according to the actual needs to realize the mesh of this embodiment scheme
's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, it can also
It is that each unit physically exists alone, it can also be during two or more units be integrated in one unit.
It, can be with if the function is realized in the form of SFU software functional unit and when sold or used as an independent product
It is stored in the executable non-volatile computer read/write memory medium of a processor.Based on this understanding, of the invention
Technical solution substantially the part of the part that contributes to existing technology or the technical solution can be with software in other words
The form of product embodies, which is stored in a storage medium, including some instructions use so that
One computer equipment (can be personal computer, server or the network equipment etc.) executes each embodiment institute of the present invention
State all or part of step of method.And storage medium above-mentioned includes:USB flash disk, mobile hard disk, read-only memory (ROM, Read-
Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can be with
Store the medium of program code.
Finally it should be noted that:Embodiment described above, only specific implementation mode of the invention, to illustrate the present invention
Technical solution, rather than its limitations, scope of protection of the present invention is not limited thereto, although with reference to the foregoing embodiments to this hair
It is bright to be described in detail, it will be understood by those of ordinary skill in the art that:Any one skilled in the art
In the technical scope disclosed by the present invention, it can still modify to the technical solution recorded in previous embodiment or can be light
It is readily conceivable that variation or equivalent replacement of some of the technical features;And these modifications, variation or replacement, do not make
The essence of corresponding technical solution is detached from the spirit and scope of technical solution of the embodiment of the present invention, should all cover the protection in the present invention
Within the scope of.Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. a kind of transaction data authentication method, which is characterized in that method is applied to block chain network, the block chain network difference
It is communicated with multiple business platforms, method includes:
Receive the target document mark and transaction data corresponding with the target document mark that any business platform is sent;
In the correspondence of preset document mark and proof rule, verification rule corresponding with the target document mark are determined
It is then target verification rule;
The transaction data is verified using the target verification rule;
If being verified, in the correspondence of preset transmission platform, document mark and purpose platform, determine and the mesh
Mark document mark and the corresponding purpose platform of business platform for sending target document mark, send the transaction data to
The purpose platform.
2. transaction data authentication method according to claim 1, which is characterized in that the transaction data includes multiple targets
Field identification and the field value corresponding with each aiming field mark, the target verification rule includes preset field
Correspondence between mark and field validation rule, it is described that the transaction data is tested using the target verification rule
Card, including:
Each aiming field is identified, in the correspondence between the field identification and field validation rule, really
Fixed field validation rule corresponding with aiming field mark is aiming field proof rule;
It is verified using the aiming field proof rule pair field value corresponding with aiming field mark;
If each of the transaction data field value is verified, it is determined that the transaction data authentication passes through.
3. transaction data authentication method according to claim 2, which is characterized in that the aiming field proof rule packet
It includes:Whether allow for empty proof rule, data type proof rule and data length proof rule, the utilization target word
Section proof rule pair field value corresponding with aiming field mark is verified, including:
Whether allow to verify the field value for empty proof rule using described;
If whether the field value allows to be verified for sky, using the data type proof rule to the field value
It is verified;
If the data type of the field value is verified, the field value is carried out using the data length proof rule
Verification;
If the data length of the field value is verified, it is determined that the field value is verified.
4. transaction data authentication method according to claim 3, which is characterized in that described whether to allow for sky described in
Proof rule verifies the field value, including:
If whether described allow for empty proof rule to be to allow for sky, and the field value is null value, it is determined that the field value
Whether allow be verified for sky;
Alternatively, if whether described allow to be not allow for sky, and the field value is not null value for empty proof rule, it is determined that institute
Whether state field value allows to be verified for sky.
5. transaction data authentication method according to claim 3, which is characterized in that described to be verified using the data type
Rule verifies the field value, including:
Obtain the data type of the field value;
If the data type in the data type and the data type proof rule is consistent, it is determined that the field value
Data type is verified.
6. transaction data authentication method according to claim 3, which is characterized in that described to be verified using the data length
Rule verifies the field value, including:
Obtain the data length of the field value;
If the data length in the data length and the data length proof rule is consistent, it is determined that the field value
Data length is verified.
7. transaction data authentication method according to claim 1, which is characterized in that method further includes:
If verification does not pass through, verification is sent not by notifying to the business platform for sending the target document mark.
8. a kind of transaction data authentication device, which is characterized in that including:Receiving module, determining module, authentication module and transmission mould
Block;
The receiving module, for receive target document mark that any business platform is sent and with target document mark pair
The transaction data answered;
The determining module, in the correspondence of preset document mark and proof rule, determining and the target list
It is target verification rule that card, which identifies corresponding proof rule,;
The authentication module, for being verified to the transaction data using the target verification rule;
If the sending module closes for being verified in preset transmission platform, document mark and the corresponding of purpose platform
In system, the corresponding purpose platform of business platform for identifying and sending the target document mark with the target document is determined,
The transaction data is sent to the purpose platform.
9. a kind of transaction data authentication system, which is characterized in that including:Multiple business platforms and application such as claim 1-7 appoint
The block chain network of one the method, the block chain network are communicated with multiple business platforms respectively.
10. a kind of computer-readable medium for the non-volatile program code that can perform with processor, which is characterized in that described
Program code makes the processor execute described any the methods of claim 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810832808.4A CN108694670B (en) | 2018-07-25 | 2018-07-25 | Transaction data verification method, device and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810832808.4A CN108694670B (en) | 2018-07-25 | 2018-07-25 | Transaction data verification method, device and system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108694670A true CN108694670A (en) | 2018-10-23 |
CN108694670B CN108694670B (en) | 2020-10-20 |
Family
ID=63851770
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810832808.4A Active CN108694670B (en) | 2018-07-25 | 2018-07-25 | Transaction data verification method, device and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108694670B (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112215466A (en) * | 2020-09-08 | 2021-01-12 | 支付宝(杭州)信息技术有限公司 | Transaction data supervision processing method and device and electronic equipment |
CN113378549A (en) * | 2021-06-29 | 2021-09-10 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN114880049A (en) * | 2022-03-09 | 2022-08-09 | 深圳萨摩耶数字科技有限公司 | Data processing method and device, electronic equipment and storage medium |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1535217A4 (en) * | 2002-06-11 | 2006-06-21 | First Data Corp | Value processing network and methods |
US20120303525A1 (en) * | 2011-05-23 | 2012-11-29 | Sharath Sahadevan | Methods and systems for verifying regulation compliance |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
CN107240017A (en) * | 2017-07-20 | 2017-10-10 | 捷德(中国)信息科技有限公司 | Block chain trade managing system and method |
CN107833060A (en) * | 2017-11-13 | 2018-03-23 | 中国银行股份有限公司 | The verification method and system of intelligent contract transaction in a kind of block chain |
CN108027867A (en) * | 2015-07-14 | 2018-05-11 | Fmr有限责任公司 | Calculate efficient transfer accounts processing, audit and searcher, method and system |
CN108229981A (en) * | 2018-01-29 | 2018-06-29 | 杭州云象网络技术有限公司 | A kind of anti-fake source tracing method of supply chain finance based on block chain |
-
2018
- 2018-07-25 CN CN201810832808.4A patent/CN108694670B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP1535217A4 (en) * | 2002-06-11 | 2006-06-21 | First Data Corp | Value processing network and methods |
US20120303525A1 (en) * | 2011-05-23 | 2012-11-29 | Sharath Sahadevan | Methods and systems for verifying regulation compliance |
CN108027867A (en) * | 2015-07-14 | 2018-05-11 | Fmr有限责任公司 | Calculate efficient transfer accounts processing, audit and searcher, method and system |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
CN107018119A (en) * | 2016-08-30 | 2017-08-04 | 阿里巴巴集团控股有限公司 | Authentication system, method and platform |
CN106548091A (en) * | 2016-10-14 | 2017-03-29 | 北京爱接力科技发展有限公司 | A kind of data deposit card, the method and device of checking |
CN107240017A (en) * | 2017-07-20 | 2017-10-10 | 捷德(中国)信息科技有限公司 | Block chain trade managing system and method |
CN107833060A (en) * | 2017-11-13 | 2018-03-23 | 中国银行股份有限公司 | The verification method and system of intelligent contract transaction in a kind of block chain |
CN108229981A (en) * | 2018-01-29 | 2018-06-29 | 杭州云象网络技术有限公司 | A kind of anti-fake source tracing method of supply chain finance based on block chain |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112215466A (en) * | 2020-09-08 | 2021-01-12 | 支付宝(杭州)信息技术有限公司 | Transaction data supervision processing method and device and electronic equipment |
CN113378549A (en) * | 2021-06-29 | 2021-09-10 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN113378549B (en) * | 2021-06-29 | 2023-02-14 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN114880049A (en) * | 2022-03-09 | 2022-08-09 | 深圳萨摩耶数字科技有限公司 | Data processing method and device, electronic equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN108694670B (en) | 2020-10-20 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Mao et al. | Novel automatic food trading system using consortium blockchain | |
CN108694670A (en) | Transaction data authentication method, apparatus and system | |
CN109784633A (en) | Device, method and the storage medium of business risk assessment | |
CN110659983A (en) | Bank accounting data processing method and device, electronic equipment and storage medium | |
CN109034701A (en) | International trade document transmission method, apparatus and system | |
CN109165959A (en) | Supply chain querying method and device based on block chain | |
CN110175916A (en) | Cash flow checking method and device | |
Heejung | Participation of private investors in container terminal operation: influence of global terminal operators | |
Henesey et al. | Improved load planning of RoRo vessels by adopting blockchain and internet-of-things | |
US20230019729A1 (en) | System and Method of Providing Physically Authenticated Digital Tracking and Association for Objects and Products | |
CN109062936A (en) | A kind of data query method, computer readable storage medium and terminal device | |
Kim et al. | Efficient stowage plan with loading and unloading operations for shipping liners using foldable containers and shift cost-sharing | |
CN110222323A (en) | A kind of voucher generation method, device, readable storage medium storing program for executing and terminal device | |
Boison et al. | Blockchain ready port supply chain using distributed ledger | |
CN108492119A (en) | Information anti-fake authentication method, device, equipment and medium based on block chain | |
CN110991962A (en) | Freight waybill processing method and device based on block chain, computing equipment and medium | |
Suárez-Alemán et al. | Port reforms in Latin America and the Caribbean: where we stand, how we got here, and what is left | |
CN117408522B (en) | Tail payment risk early warning method, system and medium | |
Knutsen et al. | Containerized immutable maritime data sharing utilizing Distributed Ledger Technologies | |
CN107133163A (en) | A kind of method and apparatus for verifying description class API | |
CN109102246A (en) | A kind of trade Synergistic method and trade cooperative system based on block chain | |
CN108898407A (en) | Goods information retroactive method, apparatus and system | |
CN108921490A (en) | A kind of sending method of notification information, storage medium and server | |
Al et al. | Secure rfid protocol to manage and prevent tag counterfeiting with matryoshka concept | |
Cheng et al. | A system dynamics approach to operational and strategic planning of a container terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CP03 | Change of name, title or address |
Address after: 519000 Rooms 806, 901 and 902, No. 29, Lanwan Lane, Tangjiawan Town, Xiangzhou District, Zhuhai City, Guangdong Province Patentee after: Hongqiao Hi Tech Group Co.,Ltd. Address before: 519000 1st floor, area D, South Software Park, No.1, Tangjiawan Software Park Road, Xiangzhou District, Zhuhai City, Guangdong Province Patentee before: ZHUHAI HONGQIAO HIGH-TECH Co.,Ltd. |
|
CP03 | Change of name, title or address |