Summary of the invention
This specification one or more embodiment describes the monitoring method and device of a kind of resource transfers data, using can
Communication network can not distort and trackability, resource transfers data are supervised, thus during reducing resource transfers
Risk.
According in a first aspect, providing a kind of monitoring method of resource transfers data, the method is by corresponding to the first net
First business side of the first node in network executes, and the first network is the trustable network of decentralization;The described method includes:
First resource is obtained from the first network and shifts data, and first resource transfer data are by being added described the
The second node of one network is distributed to the first network, and the second node corresponds to the second business side, for according to third
The guarantee resource that business side provides issues resource to multiple users and raises information, and the first resource transfer data include, described
Second business policy produces the record data of resource to the multiple user based on resource recruitment information;
Secondary resource is obtained from the first network and shifts data, and Secondary resource transfer data are by being added described the
The fourth node of one network is distributed to the first network, and the fourth node corresponds to the 4th business side, each for completing
The resource transfers of business side, the Secondary resource shift data and include, that the 4th business policy records each business side,
Resource relevant to resource recruitment information is transferred to data and/or resource produces data;
Data are shifted based on the first resource and Secondary resource transfer data carry out data verification.
In some embodiments, the first business side has key pair, and the key pair includes the first business side
The first public key and the first private key, the second business side, the 4th business side save first public key respectively, with respectively
The first resource is shifted into data, Secondary resource transfer data by being distributed to described the after first public key encryption
One network.
In some embodiments, the first resource transfer data include that multiple users are based on resource and raise information and turn
The contract information that first pipelined data of resource and user and the second business side are raised about resource out;
It is described based on the first resource transfer data and the Secondary resource transfer data carry out data verification include: by
Whether first pipelined data is compared with the contract information, therein at least one of following consistent with determination: transfer
Resource share, resource transfers time.
In some embodiments, the Secondary resource transfer data include that multiple users are based on resource and raise information and turn
The second pipelined data of resource and the second business side, the third business side are based on resource and raise information and be transferred to out
The third pipelined data of resource;
The first resource transfer data and Secondary resource transfer data progress data verification of being based on include: logical
Second pipelined data and the third pipelined data are crossed, the multiple user is verified and information is raised based on resource and is produced
Resource, if be transferred to the third business side.
In some embodiments, the first resource transfer data include that multiple users are based on resource and raise information and turn
First pipelined data of resource out, the Secondary resource transfer data include that multiple users are based on resource and raise information and produce
Second pipelined data of resource;
It is described based on the first resource transfer data and the Secondary resource transfer data carry out data verification include: by
Whether first pipelined data and second pipelined data are compared, true to verify first pipelined data.
In some embodiments, the method also includes: from the first network obtain by the first network has been added
Third node be distributed to the resource of the first network and raise scheme and resource and prove data, the third node corresponds to institute
Third business side is stated, by providing the guarantee resource, so that the second business side is described in third business side publication
Resource raises information, and the resource proves that data include, the proof data for guaranteeing resource;Based on the resource recruitment side
Case proves that data are verified to the resource.
In some embodiments, described that scheme is raised based on the resource, data, which carry out verifying packet, to be proved to the resource
Include at least one of following: verifying the resource proves the authenticity of data;Verify the resource share for guaranteeing resource, if no
The resource share that scheme is arranged is raised lower than the resource.
In some embodiments, the method also includes: from the first network obtain by the first network has been added
The 5th node be distributed to the resource of the first network compared with Nuclear Data, the 5th node corresponds to the 5th business side, described
For guaranteeing that resource is verified to described, the resource includes the 5th business side to described compared with Nuclear Data for 5th business side
Guarantee resource relatively core as a result, and/or the 5th business side whether for the third business side provide resource guarantee guarantee
As a result;The resource is verified compared with Nuclear Data.
In some embodiments, the method also includes: by the resource of the second business side raise approval of qualification and
Put on record data, be distributed to the first network, so that each node in the first network obtains the approval of qualification and puts on record
Data.
According to second aspect, a kind of monitoring device of resource transfers data is provided, described device is set in first network
First node, the first node correspond to the first business side, and the first network is the trustable network of decentralization;It is described
Device includes:
First acquisition unit is configured to obtain first resource transfer data from the first network, and the first resource turns
It moves data and the first network is distributed to by the second node that the first network has been added, the second node corresponds to second
Business side, the guarantee resource for being provided according to third business side issue resource to multiple users and raise information, first money
Source transfer data include that second business policy raises information based on the resource to the multiple user and produces resource
Record data;
Second acquisition unit is configured to obtain Secondary resource transfer data from the first network, and the Secondary resource turns
It moves data and the first network is distributed to by the fourth node that the first network has been added, the fourth node corresponds to the 4th
Business side, for completing the resource transfers of each business side, the Secondary resource transfer data include the 4th business policy
Data are transferred to each business side record, relevant to resource recruitment information resource and/or resource produces data;
Authentication unit, is configured to the first resource transfer data and Secondary resource transfer data carry out data
Verifying.
According to the third aspect, a kind of computer readable storage medium is provided, computer program is stored thereon with, when described
When computer program executes in a computer, enable computer execute first aspect method.
According to fourth aspect, a kind of calculating equipment, including memory and processor are provided, which is characterized in that described to deposit
It is stored with executable code in reservoir, when the processor executes the executable code, the method for realizing first aspect.
By the monitoring method and device of the resource transfers data that this specification embodiment provides, with the credible of decentralization
Based on network, data management is carried out to each business side by trustable network, the first business side passes through the as trustable network
One network obtains and shifts data by the first resource that the second node that first network has been added is issued, and the first net has been added
The fourth node publication Secondary resource of network shifts data, and wherein first resource transfer data and Secondary resource transfer data are wrapped respectively
It includes by the resource transfers data of different business side's records, it is possible thereby to be verified to resource transfers data.It can due to utilizing
Communication network can not distort characteristic, realize the network characterization of transparent circulation and the decentralization of each business side's information, so that
Problem occurs for any one participant, will not influence on data storage, it is thus possible to reduce the wind of resource transfers business
Danger.
Specific embodiment
With reference to the accompanying drawing, the scheme provided this specification is described.
The background of this specification scheme is illustrated first.It is especially a large amount of to raise during existing resource transfers
In the case where resource, in fact it could happen that such as resource flows to opaque, each side and deposits the problems such as card is inconsistent.It is logical with financing enterprise below
It crosses for the business that P2P platform (peer to peer lending, network loan platform) is financed, illustrates present in it
Problem.
Referring to FIG. 1, the operating process substantially process of P2P financial product is as follows: financing enterprise proposes financing package, and will
Assets, which are pledged or mortgaged, gives P2P enterprise (corresponding aforementioned P2P platform);P2P enterprise is by the assets keeping of financing enterprise in cooperation
Business bank, while assets progress assets are packaged into finance product (i.e. P2P financial product) and sold in P2P platform;It is a
People investor or investment institution are by buying the finance product, by fund by business bank's trustship in third party's trustship account
Or mechanism;Financing enterprise obtains required financing fund by third party's trustship account or mechanism, is used for enterprise operation demand.
In some implementations, may be incorporated into guarantee agency, the financing business of financing enterprise assured, with ensure financing enterprise because
In the case where the fund of unexpected insolvency individual investor or investment institution, user's loss is made up by guarantee agency.
Wherein, the fund flow bank (such as above-mentioned business bank) that P2P financial product is related to can be and produce with P2P finance
Any bank of publication enterprise (the above-mentioned P2P enterprise) cooperation of product, is also possible to a certain family specially specified or several commercial silvers
Row.The fund of all P2P financial products requires to circulate by this or these specified business bank.
Put on record in general, financial product can be issued to P2P enterprise by the regulatory agency by government authorization and carry out authorization,
And in the operation process of the above P2P financial product, P2P financial product is supervised.Above-mentioned regulatory agency is, for example, silver prison
Meeting, Banking Regulatory Bureau, finance are done etc..
In the above process, it is understood that there may be the problem of have:
Assets oversold: the Typical Representative of assets in general is bill, it is possible that the phenomenon that a ticket oversold, once melt
The case where money enterprise can not fulfil, can cause damages directly to investor;
Funds flow is opaque: regulatory agency often during entire fund flow, can not in real time or quasi real time see
To the flow direction of fund;P2P enterprise may occur from the behavior melted, i.e. financing enterprise and P2P enterprise is a company, or exist
Some directly or indirectly incidence relations, such as investment relation, parent company and subsidiary company etc.;
Financing package deposits card inconsistence problems: financing enterprise in order to smoothly take financing fund by various audits,
It is unsmooth and opaque using information flow, inconsistent audit is provided to guarantee agency, P2P platform, business bank, regulatory agency
Material;
Investor's financing contract deposits card problem: investor is often electronic contract in platform purchase P2P financial product at present
And taken care of by P2P platform, if electronic contract is broken one's promise or had modified to P2P platform, investor can not collect evidence.
In order to solve problem above, this specification embodiment provides a kind of implementation framework based on trustable network, such as Fig. 2 institute
Show.Referring to FIG. 2, trustable network is the distributed network of decentralization.Trustable network may include multiple nodes, such as node
101,102,103,104,105, etc..Each node in trustable network can realize distributed storage by common recognition mechanism,
And each node stores total data.That is, each node can upload data to trustable network, meanwhile, Ge Gejie
Point uploads the data of trustable network, other nodes can obtain.The realization mechanism of trustable network can guarantee each node
Data can not be tampered, and problem occurs for any one node, will not be influenced on data storage, to guarantee the true of data
Property.Data in trustable network can also be encrypted by Encryption Algorithm, promote data safety grade.The trustable network is for example
It can be block chain network etc..Number of nodes in trustable network can be any reasonable quantity, although Fig. 2 is illustratively drawn
The node of fixed quantity is gone out, but the trustable network number of nodes in this specification has not been constituted and limited.
Wherein, the node of trustable network can be with certain terminal device calculated with storage capacity.It is appreciated that one
A node may include one or more equipment, it is not limited here.Trustable network node can be carried out by corresponding business side
Maintenance.In this specification embodiment, each node is the node that the first network as trustable network is added, and corresponding different
Business side.
It is worth noting that can correspond with business side and node, same node can also be corresponded to multiple business sides,
This is without limitation.The life such as first node, second node, third node, fourth node, the 5th node in this specification embodiment
Name is only distinguished from the business function of corresponding business side, without distinguishing to physical device.Business side, it is believed that be
Related side in a certain business generating process, for example, by network loan platform (peer to peer lending,
P2P may include following one or more business side) in the business of platform financing: P2P platform, financing enterprise, business bank,
Participate in the users (common netizen) provided funds, monitoring party etc..
By the corresponding different nodes in each business side, the data that each business side can be made to upload first network have
Authenticity, the features such as can not distorting, is traceable, so as to effectively be supervised to resource transfers.The following specifically describes pass through
Monitoring method of the first network to resource transfers data.
Fig. 3 shows the monitoring method flow chart of the resource transfers data according to one embodiment.The executing subject of this method
It can be the corresponding first business side of first node in first network.That is, the first business side is in the present embodiment
Monitoring party.First network is, for example, trustable network shown in Fig. 2, and first node is, for example, node 201 shown in Fig. 2 etc..First industry
Business side can pass through each node interaction data in first node and first network.In the business financed by P2P platform,
First business side can be monitoring party, such as finance is done, silver-colored Insurance Regulatory Commission/office etc..For ease of description, in the present embodiment, lead to
The one-to-one mode of node and business side is crossed to be illustrated.
If Fig. 3 shows, method includes the following steps: step 31, first resource is obtained from first network and shifts data, first
Resource transfers data are distributed to first network by the second node that first network has been added, and second node corresponds to the second business
Side, the guarantee resource for being provided according to third business side issue resource to multiple users and raise information, and first resource shifts number
According to including, the second business policy to multiple users based on resource raise information and to the record number of second business side's transferring resource
According to;Step 32, Secondary resource being obtained from first network and shifting data, Secondary resource shifts data by being added the of first network
Four nodes are distributed to first network, and fourth node corresponds to the 4th business side, for completing the resource transfers of each business side, the
Two resource transfers data include that resource that the 4th business policy records each business side, relevant to resource recruitment information turns
Enter data and/or resource produces data;Step 33, data are carried out based on first resource transfer data and Secondary resource transfer data
Verifying.
Firstly, first business side obtains first resource from first network by first node and shifts data in step 31.
Here, first resource transfer data can be the data that first network is distributed to by the second node that first network has been added.It should
Node 202 in second node, such as Fig. 2, can correspond to the second business side.Second business side can be used as resource transfers industry
The intermediary agency of business, for facilitating the resource transfers business of other two sides, such as P2P platform.
It is appreciated that the second business side is used as intermediary agency, multiple resource sides of being transferred to and the resource side of producing can be faced.This
In, resource is transferred to a side and is known as third business side.That is, for some specifically resource transfers business, one
Third business side can obtain resource by multiple resource sides of being transferred to.Second business side can turn according to the resource of third business side
Request is moved, raises information to multiple resource sides of producing (user) publication resource.It multiple resource sides of producing can be according to such money
It raises information and chooses whether to produce resource in source.Further, publication resource in the second third business side business Fang Wei raises information
Before, the guarantee resource of third business side can also be first obtained, provides guarantee to produce resource for multiple resource sides of producing.
Wherein, guarantee that resource can raise for resource and foundation is provided.In some embodiments, guarantee that resource can be used for protecting
Demonstrate,prove authenticity, the information resources of validity that resource is raised.Such as major disease patient is from the information etc. of underprivileged home.?
In other embodiments, guarantee that resource can be the resource of value for the resource for no less than needing to raise.Guarantee that resource can be
Tangible (such as housing resources) are also possible to invisible (such as intellectual property resource, equity resource), can be single resource,
It can also be composed of multiple resources, herein without limitation.
For it easier comprehension, using resource transfer service as financing business as an example, third business side can be financing
Enterprise, the second business can be with for some P2P platform, multiple resources produce can be with multiple users for the P2P platform.Financing
Enterprise can carry out financing business with the cooperation of P2P platform.When cooperation, financing enterprise needs to provide assets (such as house property, copyright first
Etc.) as resource is guaranteed, it mortgages and/or pledges and give P2P platform.P2P platform can be issued after confirmation for financing enterprise
Resource raises information.For example, P2P platform can raise resource information package into finance product, the user towards P2P platform raises
Collect resource.The user of P2P platform can complete resource and produce by buying finance product.Optionally, for finance product and
Speech, it will usually make a promise return, therefore, the guarantee resource that financing enterprise is supplied to P2P platform can also be higher by the financing amount of money, have more
It part can be suitable with promise return.Guarantee resource at this time can not give user cost and return in financing enterprise
In the case of, for providing the user with compensation, to reduce or eliminate loss.
Resource is produced since multiple users can raise information by the resource of the second business side, the second business side
It has been can recorde that, information is raised based on resource for multiple users and produces the record data of resource, as being uploaded to the first net
The first resource of network shifts data.In the example of aforementioned financing business, multiple users' of second business side's P2P platform record
The record data for producing resource may include that multiple users buy the transaction journal data of finance product, can also be flat including P2P
Platform is supplied to financing contract data of user, etc..In one embodiment, first resource transfer data not only may include the
The record data for producing resource based on resource recruitment information for multiple users of two business sides record, can also include being directed to
Guarantee resource of third business side etc. records data.
It should be readily apparent to one skilled in the art that the second business side raises the publisher of information as resource, and have direct
A possibility that obtaining the resource that user produces, it is therefore, involved during the supervision to the second business side, resource are raised in order to realize
And resource can also be taken care of or be interfered by the 4th business side's (such as business bank etc.).
As a result, by step 32, the first business side obtains Secondary resource from first network by first node and shifts data,
Secondary resource shifts data and is distributed to first network by the fourth node that first network has been added.Wherein, fourth node here
Node 204 in e.g. Fig. 2, can correspond to the 4th business side.Resource transfers data can be to be carried out by the 4th business side
The data of record.
Specifically, the 4th business side can be the resource management platform that each business Fang Jun approves, for completing each business
The resource transfers of side.Such as in the business for being related to fund, the 4th business side can be business bank etc..It is with business bank
Example, in financing business example above-mentioned, P2P platform can take care of the guarantee that third business side provides by business bank and provide
Source, user can buy finance product by business bank's account, and financing enterprise can obtain the money raised by business bank
Gold.In some optional realizations, resource of the 4th business side to the multiple users for raising acquisition of information by above-mentioned resource
Management can also be realized by the special resource deposit mechanism of another party (such as special fund trustship department etc.), with and other
Resource distinguishes management.
In this way, the resource transfers activity of each business side all passes through the progress of the 4th business side.4th business side can recorde
Various resources flow direction between each business side.Correspondingly, first network is uploaded to by fourth node by the 4th business side
Secondary resource transfer data may include, that the 4th business policy records each business side, relevant to resource recruitment information
Resource is transferred to data and/or resource produces data.Such as in above-mentioned financing business, business bank is directed to the guarantor of P2P platform record
Demonstrate,prove the hosted data of resource, user is bought by business bank in the transaction journal data of P2P platform purchase finance product, user
The flowing water information etc. of the corresponding funds flow of finance product of P2P platform publication.
By step 31, step 32 it is found that since the related data of record is uploaded to decentralization by each business side
First network flows to data and resource and tends to be transparent.
Further, in order to which the funds flow to each business side realizes supervision, by step 33, the first business side is based on
First resource shifts data and Secondary resource transfer data carry out data verification.
Embodiment according to one aspect shifts data for first resource and/or Secondary resource shifts data, the first industry
Business side can verify data itself.
In one embodiment, first resource transfer data include that multiple users are based on resource and raise information and produce money
The contract information that first pipelined data in source and user and the second business side are raised about resource.To first resource transfer data
Verifying may include: to be compared the first pipelined data with contract information, with determination it is therein it is at least one of following whether one
It causes: transferring resource share, resource transfers time.
It is appreciated that in the resource transfers contract of the second business side and user, it will usually arrange the resource share of transfer, turn
The items such as shift time.By the resource share in the first pipelined data of verifying and contract information whether consistent, transfer time whether
With (such as resource transfers occur contract signing after predetermined amount of time in) in it is one or more, can be to avoid second
Business side is played tricks or is damaged in the interests of multiple users, such as above-mentioned financing business, and P2P platform is avoided to break one's promise or modify electronics
The problem of contract, investor can not collect evidence.Specifically, if in the resource share that user produces in the first pipelined data and contract
Unanimously, then otherwise do not passed through by verifying.If transfer time matches, by verifying, otherwise do not pass through.
In another embodiment, Secondary resource transfer data include that multiple users are based on resource and raise information and produce
Second pipelined data of resource and the second business side and/or third business side raise information based on resource and are transferred to resource
Third pipelined data.To Secondary resource transfer data verifying may include: by the second pipelined data and third pipelined data,
Verify the resource that multiple users raise information based on resource and produce, if be transferred to third business side.So, it can be ensured that logical
The resource for crossing the publication of the second business side, which raises the resource that information is raised, to reach third business side according to agreement.Further
Ground can solve because of the opaque problem of funds flow.It, can be to avoid in this way, in aforementioned P2P financial product operation process
P2P enterprise caused by funds flow is opaque is from the problems such as melting.
According to the embodiment of another aspect, first resource transfer data may include that multiple users are raised based on resource
Information and the first pipelined data for producing resource, Secondary resource transfer data may include that multiple users are based on resource and raise letter
Cease and produce the second pipelined data of resource;Data are shifted based on first resource and Secondary resource transfer data carry out data verification
It may include: to be compared the first pipelined data and the second pipelined data, it is whether true to verify the first pipelined data.
As can be seen from the above description, first resource transfer data and Secondary resource shift data, are by a business
Different business side record resource transfers data therefore, can be to the resource of each business side by the comparison of two item datas
Transfer data are mutually authenticated, to realize the supervision to each business side.For example, the first business side can shift first resource
Resource share, the time etc. that the multiple users recorded in data are produced based on resource recruitment information shift number with Secondary resource
It is compared according to the resource share that multiple users of middle record raise information based on resource and produce, to verify the second business policy
The authenticity of the record data of information is raised to resource.
According to a possible design, before the second third business side business Fang Wei issues resource recruitment information, may be used also
Guarantee that resource is verified with what is provided third business side.Third business side can provide resource recruitment side to the second business side
Case and for guarantee resource resource prove data.Wherein, resource transfers scheme, which includes at least, raises the amount of money, can also include money
Source uses one or more in repayment scheme under duration, recruitment validity period, promise return, time of payment, fortuitous event etc.
?.Resource proves that data can be third business side and raise the proof data that scheme provides the guarantee resource of guarantee for resource.Such as
It is preceding described, when resource is raised gratuitously to raise, guarantee that resource can be true, effective information resources, according to applied field
Scape is different, and resource proves that data are not also identical.Such as under the major disease fund raised scene of underprivileged home, resource is proved
Data can be hospital the diagnosis of disease is proved, family's poverty prove etc..When it is of equal value or paid recruitment that resource, which is raised,
Guarantee that resource can also provide the value for equaling or exceeding raised resource.At this point, guaranteeing that the resource of resource proves data for example
It can be the Certificate of House Property, intellectual property certificate etc..Wherein, resource proves that data can be saved by modes such as picture, videos.
For unified supervision, resource can be raised scheme and resource by third business side proves data, passes through third section
Point (node 203 in such as Fig. 2) packing is uploaded to first network, so that other business sides obtain related data from first network.
In one embodiment, the first business side can obtain these data from first network by first node, and be raised according to resource
Collection scheme proves that data are verified to resource.
Still by taking aforementioned financing business as an example, financing enterprise can by financing package (resource recruitment scheme), and for
The proof data (resource proof data) for the assets that P2P platform is mortgaged and/or pledged, are all uploaded to first network.Monitoring party (the
One business side) can based on the financing amount of money etc. involved in financing package, to the proof data of the assets mortgaged and/or pledged into
Row verifying.Such as: on the one hand, monitoring party can verify mortgage and/or whether the proof data for the assets pledged are true, effective;
On the other hand, the assets that monitoring party can verify mortgage and/or pledge, if be enough to compensate the financing amount of money (such as one ten
Whether the financing business of ten thousand RMB, the assets mortgaged and/or pledged have equal or higher value) etc..
It is appreciated that each business side can be made to obtain since related data is uploaded to first network by third business side
The related data taken is consistent, and can be proved to avoid third traffic direction each side offer different resource recruitment scheme and resource
The case where data.
In one embodiment, information is raised in order to further ensure that multiple users are directed to the resource that the second business side issues
And the resource benefit produced, it may be incorporated into the business side for carrying out resource guarantee, i.e. the 5th business side.5th business side is permissible
Data, which are checked, to be proved to the resource that third business side provides, and generates resource compared with Nuclear Data.The resource can be with compared with Nuclear Data
The verification result of authenticity verification is carried out to the guarantee resource that third business side provides including the 5th business side.The resource is compared with nucleus number
According to can also include guarantee result that whether the 5th business side assures third business side (such as confirmation is assured).Further
Corresponding data can be uploaded to first network by the 5th node (two nodes 205 in such as Fig. 2) by ground, the 5th business side.Such as
This, each business side including the first business side can be from the above-mentioned resource of first network compared with Nuclear Data.First business side is also
The resource can be verified compared with Nuclear Data.For example, the first business side can further verify the guarantor of third business side offer
Resource is demonstrate,proved, can also verify whether the 5th business side tenders guarantee.Optionally, guarantee agency can will guarantee that resource is compiled
Number, the unique corresponding Xiang Ziyuan of a number.In this way, can be to avoid assets oversold above-mentioned the problems such as.
By taking financing business as an example, monitoring party can determine that the financing behavior of financing enterprise is with reference to above-mentioned verification result data
No conjunction rule.In addition, P2P platform can also be determined whether with reference to guarantee agency (the 5th business side) verification result data for financing enterprise
Industry issues resource and raises information, and business bank can also determine whether to provide money for financing enterprise with reference to above-mentioned verification result data
Golden management service, etc..(investment of finance product can not be bought to the user for participating in financing according to financing package in financing enterprise
Person) when of equal value or higher value resource compensation is provided, monitoring party or P2P platform can also be according to the verification results of guarantee agency
Data, the guarantee resource that financing enterprise is provided are cashed, to compensate user's loss.When verification result data has the problems such as practising fraud
When, monitoring party may also require that guarantee agency's burden is corresponding and repay responsibility.
According to a kind of embodiment, the first business side can also will raise approval of qualification and standby to the resource of the second business side
Case data, are distributed to first network, so that each node in first network obtains approval of qualification and data of putting on record.In this way, each
Business side can verify the qualification of the second business side, provide foundation for corresponding service behavior.
It is appreciated that may have many nodes in network since first network is the trustable network of decentralization.For relating to
And information of sensitive data or private data, such as user involved in first resource transfer data, the transfer amount of money etc., the first net
Each node in network can obtain.Therefore, according to a kind of embodiment, the first business side can also have key pair, should
Key pair may include the first public key and the first private key, other business sides, such as the second business side, the 4th business side, and difference can
To save first public key, data relevant to resource transfers business are distributed to after first public key encryption respectively
One network.First network, the 4th industry are distributed to after first resource transfer data are passed through the first public key encryption such as the second business side
Business side is by Secondary resource transfer data by being distributed to first network after the first public key encryption.In this way, when the first business side passes through
After first node obtains the data encrypted by the first public key, it can be decrypted by the first private key.
Similarly, other business sides also can have secret key pair, can only be by right when the data need for confidentiality of a business side
It is limited the data of need for confidentiality be able to should to be passed through respectively this when limited business side of the node in first network is checked
After the public key of business side encrypts respectively, it is distributed to first network respectively, so that corresponding service side passes through own private key ciphertext data
It is checked, this is no longer going to repeat them.
It is worth noting that not limiting its technical solution although this specification is described in conjunction with financing for scene
Concrete application can be also used for major disease mutual assistance and raise money the scene of platform etc, it is not limited here.
Referring to FIG. 4, still illustrating the effect that this specification embodiment reaches by taking P2P financial product circulation process as an example.Such as
Shown in Fig. 4, during the circulation of P2P financial product, by the monitoring method of the resource transfers data of this specification embodiment, respectively
A business side mutually supervision is realized by the trustable network (first network) of decentralization.In the trustable network, finance does/office
Or silver-colored Insurance Regulatory Commission/office (the first business side), P2P enterprise (the second business side), financing enterprise (third business side), business bank
(the 4th business side), guarantee agency (the 5th business side) etc., can be credible to this by corresponding node trustable network access
Web Publishing data, and data are obtained from the trustable network.Wherein: P2P enterprise can recorde the money of investor (multiple users)
Produce number data, transaction journal data, financing trade contract (first resource transfer data) etc.;Financing enterprise can provide financing
Scheme guarantees that resource, assets (guaranteeing resource) prove data etc.;Business bank can recorde the fund flowing water of each business side
(Secondary resource transfer data) etc.;Guarantee agency can guarantee that resource is checked to what financing enterprise provided, such as according to money
Producing proves that assets are numbered in data;Finance does/and the authorization that can upload P2P enterprise of office or silver-colored Insurance Regulatory Commission/office puts on record data,
And it is verified at any time by the funds flow data that trustable network obtains each business side.Simultaneously as record
It wrong can not be somebody's turn to do in the data of first network, it is ensured that the authenticity of each business number formulary evidence.
Above procedure is looked back, this specification embodiment passes through trustable network pair based on the trustable network of decentralization
Each business side carries out data management, can not distort characteristic using trustable network, realize the transparent circulation of each business side's information.
Resource transfers service related information quasi real time uploads, and can combine supervision implementation principle and intelligent contract technology, provide in user
Damage prevents trouble before it happens before occurring.The network characterization of decentralization will not deposit data so that problem occurs for any one participant
Storage influences.In short, the monitoring method of resource transfers data can reduce the risk of resource transfers business.Further, also
Data can all be encrypted, be stored by ciphertext, promote data safety grade.
According to the embodiment of another aspect, a kind of monitoring device of resource transfers data is also provided.Fig. 5 is shown according to one
The schematic block diagram of the monitoring device of the resource transfers data of embodiment.As shown in figure 5, the monitoring device of resource transfers data
500 include: first acquisition unit 51, is configured to obtain first resource transfer data from first network, first resource shifts data
Second node by first network has been added is distributed to first network, and second node corresponds to the second business side, for according to the
The guarantee resource that three business sides provide issues resource to multiple users and raises information, and it includes the second industry that first resource, which shifts data,
Business policy produces the record data of resource to multiple users based on resource recruitment information;Second acquisition unit 52, configuration
Data are shifted to obtain Secondary resource from first network, Secondary resource shifts data and sent out by the fourth node that first network has been added
Cloth to first network, fourth node corresponds to the 4th business side, and for completing the resource transfers of each business side, Secondary resource turns
Moving data includes, it is that the 4th business policy record each business side, be transferred to the relevant resource of resource recruitment information data and/
Or resource produces data;Authentication unit 53, is configured to first resource transfer data and Secondary resource transfer data are counted
According to verifying.
According to a possible design, the first business side has key pair, and key pair includes the first public affairs of the first business side
Key and the first private key, the second business side, the 4th business side save the first public key respectively, with respectively by first resource shift data,
Secondary resource transfer data are by being distributed to first network after the first public key encryption.
In embodiment on the one hand, first resource transfer data include that multiple users are based on resource and raise information and turn
The contract information that first pipelined data of resource and user and the second business side are raised about resource out;
Authentication unit 53 is further configured to:
First pipelined data is compared with contract information, it is therein at least one of following whether consistent with determination: to turn
Move resource share, resource transfers time.
In embodiment on the other hand, Secondary resource transfer data include, multiple users be based on resource raise information and
The second pipelined data and the second business side and/or third business side for producing resource are based on resource and raise information and be transferred to money
The third pipelined data in source;
Authentication unit 53 is further configured to:
By the second pipelined data and third pipelined data, the money that multiple users raise information based on resource and produce is verified
Source, if be transferred to third business side.
In the embodiment of another aspect, first resource transfer data include, multiple users be based on resource raise information and
The first pipelined data of resource is produced, Secondary resource transfer data include that multiple users are based on resource and raise information and produce money
Second pipelined data in source;
Authentication unit 53 is further configured to:
First pipelined data and the second pipelined data are compared, it is whether true to verify the first pipelined data.
In a possible design, device 500 can also include:
Third acquiring unit (not shown) is configured to obtain from first network and be sent out by the third node that first network has been added
The resource of cloth to first network raises scheme and resource proves data, and third node corresponds to third business side, by providing guarantor
Resource is demonstrate,proved, so that the second business side is that third business side issues resource recruitment information, resource proves that data include guaranteeing resource
Prove data;
Authentication unit 53 proves that data are verified to resource but also it may be configured such that based on resource recruitment scheme.
In one further embodiment, authentication unit 53 is configurable to by least one of following, based on resource
Recruitment scheme proves that data are verified to resource:
Verifying resource proves the authenticity of data;
Verifying guarantees the resource share of resource, if raises the resource share that scheme is arranged not less than resource.
In one embodiment, device 500 can also include:
4th acquiring unit (not shown) is configured to obtain from first network and be sent out by the 5th node that first network has been added
Cloth to first network resource compared with Nuclear Data, the 5th node corresponds to the 5th business side, and the 5th business side is used for guaranteeing resource
Verified, resource compared with Nuclear Data include the 5th business side to the relatively core for guaranteeing resource as a result, and/or the 5th business side whether be
Third business side provides the guarantee result of resource guarantee;
Authentication unit 53 is but also it may be configured such that verify resource compared with Nuclear Data.
In one embodiment, device 500 can also include:
Release unit (not shown) is configured to that approval of qualification and data of putting on record, hair will be raised to the resource of the second business side
Cloth is to first network, so that each node in first network obtains the approval of qualification and data of putting on record.
It is worth noting that device 500 shown in fig. 5 is that device corresponding with the embodiment of the method shown in Fig. 3 is implemented
, the corresponding description in the embodiment of the method shown in Fig. 3 is equally applicable to device 500, and details are not described herein.
By apparatus above, data management is carried out to each business side by trustable network, utilizes can not usurping for trustable network
Change the network characterization of characteristic and decentralization, so that problem occurs for any one participant, shadow will not occur to data storage
It rings.To realize in resource transfers business, the transparent circulation of each business side's information is provided before damage occurs in user and is prevented in not
So, the risk of resource transfers business can be reduced.
According to the embodiment of another aspect, a kind of computer readable storage medium is also provided, is stored thereon with computer journey
Sequence enables computer execute method described in conjunction with Figure 3 when the computer program executes in a computer.
According to the embodiment of another further aspect, a kind of calculating equipment, including memory and processor, the memory are also provided
In be stored with executable code, when the processor executes the executable code, realize the method in conjunction with described in Fig. 3.
Those skilled in the art are it will be appreciated that in said one or multiple examples, function described in the invention
It can be realized with hardware, software, firmware or their any combination.It when implemented in software, can be by these functions
Storage in computer-readable medium or as on computer-readable medium one or more instructions or code transmitted.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects
It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention
Protection scope, all any modification, equivalent substitution, improvement and etc. on the basis of technical solution of the present invention, done should all
Including within protection scope of the present invention.