CN110119390B - Financial information outsourcing management system based on block chain - Google Patents

Financial information outsourcing management system based on block chain Download PDF

Info

Publication number
CN110119390B
CN110119390B CN201910382686.8A CN201910382686A CN110119390B CN 110119390 B CN110119390 B CN 110119390B CN 201910382686 A CN201910382686 A CN 201910382686A CN 110119390 B CN110119390 B CN 110119390B
Authority
CN
China
Prior art keywords
file
module
information
node
user node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910382686.8A
Other languages
Chinese (zh)
Other versions
CN110119390A (en
Inventor
陈冬梅
方瑞芬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Chenliang Information Technology Co ltd
Original Assignee
Guangzhou Chenliang Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Chenliang Information Technology Co ltd filed Critical Guangzhou Chenliang Information Technology Co ltd
Priority to CN201910382686.8A priority Critical patent/CN110119390B/en
Publication of CN110119390A publication Critical patent/CN110119390A/en
Application granted granted Critical
Publication of CN110119390B publication Critical patent/CN110119390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/144Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes

Abstract

The invention relates to the technical field of information safety, in particular to a financial information outsourcing management system based on a block chain, which comprises a file management subsystem, wherein the file management subsystem comprises a file processing module and a file uploading module, the file processing module is used for dividing a evidence-stored file into a plurality of data blocks after obtaining the evidence-stored file, the file uploading module is used for uploading all the data blocks to the block chain, the file processing module presets a file threshold value, when the evidence-stored file is larger than the file threshold value, the file processing module is used for generating a unique file identifier according to the evidence-stored file, the file uploading module is used for uploading the file identifier to the block chain, and a user node is used for obtaining the evidence-stored file according to the file identifier. By adopting the scheme, the situation of network congestion caused by transmission of large files on the block chain can be reduced.

Description

Financial information outsourcing management system based on block chain
Technical Field
The invention relates to the technical field of information security, in particular to a financial information outsourcing management system based on a block chain.
Background
With the deepening of banking reform and the development of computer technology, an information management and information sharing platform is built by utilizing advanced network technology, and the method is a new trend of financial industry management in a new era. The problems of complex flow, various data report classifications, large information updating workload of outsourcing service providers, difficulty in reliability examination of service quality evaluation results of the internal and external packages in the same industry and the like exist in the current information technology outsourcing management work, and the traditional information sharing platform cannot meet the current management situation. The novel application mode of the computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm based on the block chain technology application establishes the consensus mechanism through multi-party participation and formulation of algorithms, protocols and rules of the consensus process and access rules, and multi-party participating nodes form an alliance. The data information is uploaded to the chain of the block chain through the user node, and the information sharing node designated by the user is used as a sharing node to share the information, so that the information sharing in the alliance of the multi-party nodes is realized. However, the application of the current block chain is mainly data processing of short characters, numbers and the like, processing of larger files is less, and meanwhile, due to the fact that the storage space occupied by the files is large, great pressure is easily caused to a network when the files are transmitted and processed.
Disclosure of Invention
The invention aims to provide a financial information outsourcing management system based on a block chain, which can reduce the network congestion caused by the transmission of large files on the block chain.
The present invention provides a basic scheme: the financial information outsourcing management system based on the block chain comprises a file management subsystem, wherein the file management subsystem comprises a file processing module and a file uploading module,
the file processing module is preset with a file threshold value of a storage space for storing the evidence file, when the storage space is smaller than the file threshold value, the file processing module is used for dividing the evidence file into a plurality of data blocks after obtaining the evidence file, and obtaining hash tree subnodes which are the same in number and correspond to the data blocks one by one through a hash algorithm, the file uploading module is used for uploading all the data blocks and the hash tree subnodes to a block chain, obtaining storage node information for storing the evidence file, and sending the storage node information to a user node,
when the storage space is equal to or larger than the file threshold, the file processing module is used for generating a unique file identifier according to the characteristic parameters of the evidence-stored file, the file uploading module is used for uploading the file identifier to the block chain, then obtaining the storage node information of the evidence-stored file and sending the file identifier to the user node, and the user node is used for obtaining the evidence-stored file according to the storage node information or the file identifier.
The beneficial effects of the basic scheme are as follows: since the blockchain can quickly search the data on the chain, the data processed on the blockchain is mostly short characters and numbers, and the processing of the file is rarely mentioned. Through presetting a file threshold value of a storage space occupied by the certificate-storing file, when the storage space of the certificate-storing file is smaller than the file threshold value, the certificate-storing file is divided into a plurality of data blocks, and when the file is transmitted, the data blocks are directly transmitted. And when the sub-node of the hash tree generated by the file processing module is used for downloading or checking the evidence storage file in the follow-up process, verifying the integrity of the data block by the sub-node of the hash tree, thereby verifying the integrity of the evidence storage file. When the storage space of the certificate-storing file is equal to or larger than the file threshold value, the certificate-storing file is stored in the node server, the file identification of the certificate-storing file is generated according to the characteristic parameters of the certificate-storing file, such as basic attribute, the storage space and the file content, and the file identification is uploaded to the chain of the block chain. The file identification of each evidence file is unique, so that when the sharing node needs to acquire the evidence file, the storage node information is acquired according to the file identification, and the evidence file is acquired according to the storage node information. The evidence storage file is divided into data blocks and then uploaded or the file identification is generated according to the evidence storage file and uploaded, so that the pressure on a network when a large file is transmitted is relieved, and the condition of network congestion caused when the large file is transmitted on a block chain is further reduced.
The first preferred scheme is as follows: preferably, the file management subsystem further comprises a file verification module, and the file verification module is used for verifying the integrity of the evidence-stored file according to the sub-nodes of the hash tree and the hash algorithm after the user node obtains the evidence-stored file.
Has the advantages that: the certificate storage file is divided into data blocks, and the data blocks are lost or damaged in the transmission process, so that the file processing module obtains the hash tree child nodes corresponding to each data block through the hash algorithm, and the file verification module obtains the hash tree root nodes according to the hash algorithm and the hash tree child nodes after receiving the data blocks, so that the integrity of the data blocks is verified, and the aim of verifying the integrity of the certificate storage file is fulfilled.
The preferred scheme II is as follows: the system preferably further comprises an encryption management subsystem, wherein the encryption management subsystem comprises an encryption module and an upgrading module, the upgrading module is used for storing an encryption algorithm, when a user needs to upgrade the encryption algorithm, the upgrading algorithm is loaded into the upgrading module to serve as the encryption algorithm, and the encryption module is used for performing verification operation according to the encryption algorithm in the upgrading module.
Has the advantages that: the nodes of the block chain are authenticated through the encryption module, the upgrading module is used for storing the encryption algorithm, and when the encryption algorithm needs to be replaced or upgraded, the upgrading algorithm with a higher encryption standard or the upgrading algorithm which meets the encryption requirement is embedded into the upgrading module, so that the purpose of upgrading the encryption standard is achieved.
The preferable scheme is three: preferably, the encryption algorithm is an RSA asymmetric encryption algorithm, and the upgrade algorithm is a country or region specific encryption algorithm.
Has the advantages that: in the scheme, the encryption algorithm is preferably an RSA asymmetric encryption algorithm, the security is high, and the upgrading algorithm is an encryption algorithm designed by a user according to needs and meets various encryption requirements of the user.
The preferable scheme is four: preferably, the system also comprises a node management subsystem, wherein the node management subsystem comprises a node new building module, a node logout module and a node update module,
the node newly-built module is used for generating an identity according to user information after acquiring the user information when a user node needs to be newly added, issuing the identity to all nodes, recording the identity after consensus processing of all nodes, and finishing the effective operation of the user node;
the node logout module is used for issuing the identity identification to all nodes after acquiring a logout request and the identity identification when a user node needs to be logout, recording the logout request of the identity identification after consensus processing of all nodes, and finishing the invalidation operation of the user node;
and the node updating module is used for sequentially executing user node failure operation and user node validation operation according to the identity identification and the updating information after acquiring the updating request, the identity identification and the updating information when the user information of the user node needs to be updated.
Has the advantages that: the addition, deletion and update of the nodes on the block chain are operated through the node management subsystem, and when the node management subsystem cooperates with a third party, the third party is required to disclose related data to the third party or disclose related data, so that the third party is required to be added into the block chain, and the node management subsystem is used for adding the nodes of the third party. Similarly, when the cooperation is finished, the third-party node can be logged off through the node management subsystem.
The preferable scheme is five: preferably, as a fourth preferred embodiment, the node management subsystem further includes an authorization module, where the authorization module is configured to, when the valid user node shares information, obtain the sharing node, and generate and store an information sharing node table according to the sharing node, and the user node is configured to share information to the sharing node according to the information sharing node table.
Has the advantages that: the block chain is provided with a plurality of nodes, the user nodes only need to share information to part of the nodes, the part of the nodes are called sharing nodes, and the user nodes select the sharing nodes through the authorization module, so that the information sharing is only carried out on the sharing nodes needing to be known.
The preferable scheme is six: preferably, the system further comprises an operation management subsystem, wherein the operation management subsystem comprises an operation verification module and an operation execution module,
the operation verification module is used for generating a public and private key pair according to the identity and the operation information of the user node and an encryption algorithm in the encryption module after obtaining the identity and the operation information of the user node, storing a private key in the user node and issuing a public key to other nodes, generating signature information according to the private key and issuing the signature information and verification time to other nodes, and verifying the signature information by using the public key of the user node and verifying whether the verification time is consistent with the current time after the other nodes receive the signature information and the verification time;
the operation verification module is used for verifying the legality of the user node according to a Byzantine fault-tolerant consensus algorithm, when the signature information is verified successfully and the verification time is consistent with the current time, the user node is considered to be legal, when the user node and other nodes form consensus, the identity mark, the operation information and the verification time of the user are recorded, and the identity mark and the operation information are sent to the operation execution module.
Has the advantages that: when a user node needs to perform accounting operation, authentication is performed first, operation can be performed, a public and private key pair is generated through an encryption algorithm during authentication, a public key is disclosed on a chain, signature information is generated by using the private key, the signature information is verified through the public key on other nodes, verification time and current time are verified while the signature information is verified, and when a certain node verifies that the user node is legal, a verification result is fed back. According to the Byzantine fault-tolerant consensus algorithm, when more than two thirds of nodes consider the user node to be legal, the identity authentication is successful, the operation can be carried out, otherwise, the identity authentication is failed.
The preferable scheme is seven: preferably, as a sixth preferred scheme, the operation management subsystem further includes an operation publishing module, the operation execution module is configured to operate according to the operation information after receiving the identity and the operation information, when a new account book is required, the operation execution module is configured to generate a new account book according to the identity, the operation information and the current time, when an existing account book is required to be modified, the operation execution module is configured to generate an updated account book according to the operation information and the existing account book, and the operation execution module is configured to send the identity, the operation information and the new account book to the operation publishing module or send the identity, the operation information and the updated account book to the operation publishing module after operation.
Has the advantages that: after the identity authentication is successful, when the account book needs to be established, a new account book is generated according to the operation information of the user node, and when the existing account book needs to be modified, an updated account book is generated according to the operation information of the user node and the existing account book.
The preferable scheme is eight: as the optimization of the optimal solution seven, the operation publishing module is configured to, after receiving the identity identifier, the operation information and the newly created account book, publish the identity identifier, the operation information and the newly created account book to other nodes, after the user node and the other nodes form a consensus, record the newly created account book in the block chain, and feed back an operation success signal to the user node; the operation publishing module is used for receiving the identity identification, the operation information and the updated account book, then publishing the identity identification, the operation information and the updated account book to other nodes, and after the user node and other nodes form a consensus, updating the block chain according to the updated account book and feeding back an operation success signal to the user node; the operation publishing module is used for feeding back an operation failure signal to the user node when the user node and other nodes do not form a consensus.
Has the advantages that: when the account book needs to be newly built, the user node publishes the account book to other nodes on the chain through the operation publishing module, after the user node and the other nodes form a consensus, namely more than two thirds of the other nodes approve the operation to be legal, and the block chain is updated according to the newly built account book. When the existing account book needs to be modified, the user node publishes the account book to other nodes on the chain through the operation publishing module, after the user node and the other nodes form a consensus, namely more than two thirds of the other nodes approve the operation to be legal, and the block chain is updated according to the updated account book. When the user node and other nodes do not form a consensus, namely more than one third of other nodes do not recognize that the operation is legal, the operation fails and the block chain cannot be updated.
The preferable scheme is nine: preferably, the system further comprises a management terminal, the management terminal is used for acquiring the user information and then sending the user information to the node management subsystem, and the management terminal is used for respectively setting system permissions for all the nodes.
Has the advantages that: when nodes need to be added newly, a manager uploads user information through a management terminal, and the management terminal is used for setting system permissions for all the nodes, for example, some nodes have permissions of adding the nodes newly, some nodes have permissions of operating an account book, and some nodes only have permissions of checking.
Drawings
FIG. 1 is a logic block diagram of an embodiment of a financial information outsourced management system based on blockchain according to the invention.
Detailed Description
The following is further detailed by way of specific embodiments:
examples
As shown in fig. 1, the financial information outsourcing management system based on the block chain comprises a node management subsystem, a file management subsystem, an encryption management subsystem, an operation management subsystem and a management terminal, wherein the node management subsystem comprises a node newly-built module, a node logout module, a node update module and an authorization module, the file management subsystem comprises a file processing module, a file uploading module and a file verification module, the encryption management subsystem comprises an encryption module and an upgrading module, and the operation management subsystem comprises an operation verification module, an operation execution module and an operation publishing module.
The management terminal is used for acquiring the user information and then sending the user information to the node management subsystem, and the management terminal is used for respectively setting system permissions for all the nodes. And the node newly-built module is used for generating an identity according to the user information after acquiring the user information when a user node needs to be newly added, issuing the identity to all nodes, recording the identity after consensus processing of all nodes, and finishing the effective operation of the user node. For example, when a third party needs to join a block chain, a manager uploads user information through a management terminal, creates a new node for the third party, the newly created node needs to be subjected to consensus processing of other nodes, and after the consensus is successful, the other nodes can only approve or trust the newly created node. The management terminal sets system authority for the newly-built node, the system authority comprises operation authority, newly-added node authority, viewing authority and the like, the operation authority means that the node can operate the account book on the chain, the newly-added node authority means that the node can newly add nodes as required, for example, a third party can add nodes as required, and the viewing authority means that the account book on the chain can be viewed.
And the node logout module is used for issuing the identity identifier to all nodes after acquiring a logout request and the identity identifier when the user node needs to be logout, recording the logout request of the identity identifier after consensus processing of all nodes, and finishing the invalidation operation of the user node. And the node updating module is used for sequentially executing user node failure operation and user node validation operation according to the identity identification and the updating information after acquiring the updating request, the identity identification and the updating information when the user information of the user node needs to be updated. The authorization module is used for acquiring the sharing node when the effective user node shares the information, generating and storing an information sharing node table according to the sharing node, and the user node is used for sharing the information to the sharing node according to the information sharing node table. For example, there are A, B, C three nodes, and node a only wants to share information with node B, and node a sets node B as the sharing node through the authorization module, so that only node B is shared.
The file uploading module is used for uploading all the data blocks and the Hash tree subnodes to a block chain, and after the storage node information of the storage evidence file is obtained, the storage node information is sent to a user node. In this embodiment, the file processing module generates a unique file identifier according to the basic attribute, the storage space, and/or the file content of the certificate-deposited file, and the file uploading module is configured to upload the file identifier and the storage node information to the block chain, and after obtaining the storage node information of the certificate-deposited file, send the storage node information and the file identifier to the user node. The user node is used for acquiring the evidence storage file according to the information of the storage node or the file identification, and the file verification module is used for verifying the integrity of the evidence storage file according to the Hash tree sub-node and the Hash algorithm after the user node acquires the evidence storage file. For example, the file threshold is 500M, when the certificate-storing file is smaller than 500M, the certificate-storing file sharing information is uploaded in a mode of dividing the certificate-storing file into data blocks, and when the certificate-storing file is larger than 500M, the information is shared in a mode of uploading a file identifier.
The upgrading module is used for storing the encryption algorithm, when a user needs to upgrade the encryption algorithm, the upgrading algorithm is loaded into the upgrading module to be used as the encryption algorithm, and the encryption module is used for carrying out verification operation according to the encryption algorithm in the upgrading module. In this embodiment, the encryption algorithm is an RSA asymmetric encryption algorithm, and the upgrade algorithm is a country or region specific encryption algorithm.
The operation verification module is used for generating a public and private key pair according to the identity and the operation information of the user node and an encryption algorithm in the encryption module after obtaining the identity and the operation information of the user node, storing a private key in the user node and issuing a public key to other nodes, generating signature information according to the private key and issuing the signature information and verification time to other nodes, and verifying the signature information by using the public key of the user node and verifying whether the verification time is consistent with the current time after the other nodes receive the signature information and the verification time. The operation verification module is used for verifying the legality of the user node according to a Byzantine fault-tolerant consensus algorithm, when more than two thirds of other nodes are successfully verified, namely the signature information of the user node is successfully verified, and when the verification time is consistent with the current time, the user node is considered to be legal, and the user node and other nodes form consensus. When the user node and other nodes form a consensus, the identity mark, the operation information and the verification time of the user are recorded, and the identity mark and the operation information are sent to the operation execution module.
The operation execution module is used for receiving the identity identification and the operation information, then, the operation is carried out according to the operation information, when the new account book is needed, the operation execution module is used for generating the new account book according to the identity identification, the operation information and the current time, when the current account book is needed to be modified, the operation execution module is used for generating an updated account book according to the operation information and the current account book, and after the operation execution module is used for operating, the identity identification, the operation information and the new account book are sent to the operation publishing module or the identity identification, the operation information and the updated account book are sent to the operation publishing module. The operation publishing module is used for publishing the identity, the operation information and the newly-built account book to other nodes after receiving the identity, the operation information and the newly-built account book, recording the newly-built account book in a block chain after the user node and other nodes form consensus, and feeding back an operation success signal to the user node; the operation publishing module is used for receiving the identity identification, the operation information and the updated account book, then publishing the identity identification, the operation information and the updated account book to other nodes, and after the user node and other nodes form a consensus, updating the block chain according to the updated account book and feeding back an operation success signal to the user node; the operation publishing module is used for feeding back an operation failure signal to the user node when the user node and other nodes do not form a consensus, namely more than one third of other nodes fail to verify or the verification time is inconsistent with the current time.
The foregoing is merely an example of the present invention, and common general knowledge in the field of known specific structures and characteristics is not described herein in any greater extent than that known in the art at the filing date or prior to the priority date of the application, so that those skilled in the art can now appreciate that all of the above-described techniques in this field and have the ability to apply routine experimentation before this date can be combined with one or more of the present teachings to complete and implement the present invention, and that certain typical known structures or known methods do not pose any impediments to the implementation of the present invention by those skilled in the art. It should be noted that, for those skilled in the art, without departing from the structure of the present invention, several changes and modifications can be made, which should also be regarded as the protection scope of the present invention, and these will not affect the effect of the implementation of the present invention and the practicability of the patent. The scope of the claims of the present application shall be determined by the contents of the claims, and the description of the embodiments and the like in the specification shall be used to explain the contents of the claims.

Claims (10)

1. Financial information outsourcing management system based on block chain, its characterized in that: comprises a file management subsystem, wherein the file management subsystem comprises a file processing module and a file uploading module,
the file processing module is preset with a file threshold value of a storage space for storing the evidence file, when the storage space is smaller than the file threshold value, the file processing module is used for dividing the evidence file into a plurality of data blocks after obtaining the evidence file, and obtaining hash tree subnodes which are the same in number as the data blocks and correspond to the data blocks one by one through a hash algorithm, the file uploading module is used for uploading all the data blocks and the hash tree subnodes to a block chain, obtaining storage node information for storing the evidence file, and sending the storage node information to a user node,
when the storage space is equal to or larger than the file threshold, the file processing module is used for generating a unique file identifier according to the characteristic parameters of the evidence storing file, the file uploading module is used for uploading the file identifier to the block chain, then obtaining the storage node information of the evidence storing file and sending the file identifier to the user node, and the user node is used for obtaining the evidence storing file according to the storage node information or the file identifier.
2. The blockchain-based financial information outsourcing management system of claim 1, wherein: the file management subsystem further comprises a file verification module, and the file verification module is used for verifying the integrity of the evidence-stored file according to the Hash tree child nodes and the Hash algorithm after the user node obtains the evidence-stored file.
3. The blockchain-based financial information outsourcing management system of claim 1, wherein: the system also comprises an encryption management subsystem, wherein the encryption management subsystem comprises an encryption module and an upgrading module, the upgrading module is used for storing the encryption algorithm, when a user needs to upgrade the encryption algorithm, the upgrading algorithm is loaded into the upgrading module to be used as the encryption algorithm, and the encryption module is used for carrying out verification operation according to the encryption algorithm in the upgrading module.
4. The blockchain-based financial information outsourcing management system of claim 3, wherein: the encryption algorithm is an RSA asymmetric encryption algorithm, and the upgrade algorithm is a country or region specific encryption algorithm.
5. The blockchain-based financial information outsourcing management system of claim 3, wherein: also comprises a node management subsystem, wherein the node management subsystem comprises a node new building module, a node logout module and a node updating module,
the node newly-built module is used for generating an identity according to user information after acquiring the user information when a user node needs to be newly added, issuing the identity to all nodes, recording the identity after consensus processing of all nodes, and finishing the effective operation of the user node;
the node logout module is used for issuing the identity identification to all nodes after acquiring a logout request and the identity identification when a user node needs to be logout, recording the logout request of the identity identification after consensus processing of all nodes, and finishing the invalidation operation of the user node;
and the node updating module is used for sequentially executing user node failure operation and user node validation operation according to the identity identification and the updating information after acquiring the updating request, the identity identification and the updating information when the user information of the user node needs to be updated.
6. The blockchain-based financial information outsourcing management system of claim 5, wherein: the node management subsystem further comprises an authorization module, wherein the authorization module is used for acquiring the sharing node when the effective user node shares information, generating and storing an information sharing node table according to the sharing node, and the user node is used for sharing information to the sharing node according to the information sharing node table.
7. The blockchain-based financial information outsourcing management system of claim 5, wherein: also comprises an operation management subsystem which comprises an operation verification module and an operation execution module,
the operation verification module is used for generating a public and private key pair according to the identity and the operation information of the user node and an encryption algorithm in the encryption module after obtaining the identity and the operation information of the user node, storing a private key in the user node and issuing a public key to other nodes, generating signature information according to the private key and issuing the signature information and verification time to other nodes, and verifying the signature information by using the public key of the user node and verifying whether the verification time is consistent with the current time or not after the other nodes receive the signature information and the verification time;
the operation verification module is used for verifying the legality of the user node according to a Byzantine fault-tolerant consensus algorithm, when the signature information is verified successfully and the verification time is consistent with the current time, the user node is considered to be legal, when the user node and other nodes form consensus, the identity mark, the operation information and the verification time of the user are recorded, and the identity mark and the operation information are sent to the operation execution module.
8. The blockchain-based financial information outsourcing management system of claim 7, wherein: the operation management subsystem further comprises an operation publishing module, the operation executing module is used for receiving the identity identification and the operation information, then operates according to the operation information, when a new account book is needed, the operation executing module is used for generating the new account book according to the identity identification, the operation information and the current time, when the existing account book is needed to be modified, the operation executing module is used for generating an updated account book according to the operation information and the existing account book, and the operation executing module is used for sending the identity identification, the operation information and the new account book to the operation publishing module or sending the identity identification, the operation information and the updated account book to the operation publishing module after being operated according to the operation information.
9. The blockchain-based financial information outsourcing management system of claim 8, wherein: the operation publishing module is used for publishing the identity, the operation information and the newly-built account book to other nodes after receiving the identity, the operation information and the newly-built account book, recording the newly-built account book in a block chain after the user node and other nodes form consensus, and feeding back an operation success signal to the user node; the operation publishing module is used for publishing the identity, the operation information and the updated account book to other nodes after receiving the identity, the operation information and the updated account book, and updating a block chain according to the updated account book and feeding back an operation success signal to the user node after the user node and the other nodes form a consensus; and the operation publishing module is used for feeding back an operation failure signal to the user node when the user node and other nodes do not form a consensus.
10. The blockchain-based financial information outsourcing management system of claim 5, wherein: the system further comprises a management terminal, wherein the management terminal is used for acquiring the user information and then sending the user information to the node management subsystem, and the management terminal is used for respectively setting system permissions for all nodes.
CN201910382686.8A 2019-05-09 2019-05-09 Financial information outsourcing management system based on block chain Active CN110119390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910382686.8A CN110119390B (en) 2019-05-09 2019-05-09 Financial information outsourcing management system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910382686.8A CN110119390B (en) 2019-05-09 2019-05-09 Financial information outsourcing management system based on block chain

Publications (2)

Publication Number Publication Date
CN110119390A CN110119390A (en) 2019-08-13
CN110119390B true CN110119390B (en) 2021-04-06

Family

ID=67521977

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910382686.8A Active CN110119390B (en) 2019-05-09 2019-05-09 Financial information outsourcing management system based on block chain

Country Status (1)

Country Link
CN (1) CN110119390B (en)

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110633559A (en) * 2019-09-05 2019-12-31 南京中诚区块链研究院有限公司 Financial security evidence storage platform system and method based on block chain
CN110933249A (en) * 2019-11-22 2020-03-27 北京麦哲科技有限公司 Shooting instrument and shooting method thereof
CN111581668B (en) * 2020-05-15 2023-05-16 重庆帮帮链智能科技有限公司 Block chain data management system
CN112800481A (en) * 2021-01-13 2021-05-14 伙伴愿景(广东)智能科技有限公司 Online community member mutual credit deposit system and method based on block chain and storage medium
CN115051856A (en) * 2022-06-16 2022-09-13 中国银行股份有限公司 Block chain-based biological verification information input method, device and equipment

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411901A (en) * 2016-10-08 2017-02-15 北京三未信安科技发展有限公司 Digital identity-based cryptograph management method and system
CN107147748A (en) * 2017-07-07 2017-09-08 北京金山安全管理系统技术有限公司 File uploading method and device
CN109408461A (en) * 2018-09-14 2019-03-01 中国农业大学 A kind of distributed memory system and method for block chain

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9992028B2 (en) * 2015-11-26 2018-06-05 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106411901A (en) * 2016-10-08 2017-02-15 北京三未信安科技发展有限公司 Digital identity-based cryptograph management method and system
CN107147748A (en) * 2017-07-07 2017-09-08 北京金山安全管理系统技术有限公司 File uploading method and device
CN109408461A (en) * 2018-09-14 2019-03-01 中国农业大学 A kind of distributed memory system and method for block chain

Also Published As

Publication number Publication date
CN110119390A (en) 2019-08-13

Similar Documents

Publication Publication Date Title
CN110119390B (en) Financial information outsourcing management system based on block chain
US11349674B2 (en) Digital certificate management method and apparatus, computer device, and storage medium
CN111144881B (en) Selective access to asset transfer data
EP3454238B1 (en) Registration and authorization method, device and system
CN108964924B (en) Digital certificate verification method and device, computer equipment and storage medium
CN109542888B (en) Data modification and synchronization method, device, equipment and storage medium of block chain
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN115210741B (en) Partially ordered blockchain
CN110855777B (en) Node management method and device based on block chain
CN111797159A (en) Information management and access control in a database
JP2022529689A (en) Version history management using blockchain
JP2021524962A (en) Automatic data projection to smart contract groups on the blockchain
JP2023520859A (en) Faster view change for blockchain
CN111191294B (en) Single-node accounting method, system, equipment and storage medium based on block chain
CN111786812A (en) Node management method, node management device, computer equipment and storage medium
US20210374112A1 (en) Migration support system, migration support method, and node
CN111241593A (en) Data synchronization method and device for block chain nodes
CN113255014B (en) Data processing method based on block chain and related equipment
CN115605868A (en) Cross-network identity provisioning
CN111831740A (en) Synchronization of peers
CN111131336A (en) Resource access method, device, equipment and storage medium under multi-party authorization scene
CN114691669A (en) Electronic certificate storage method and device, electronic equipment and storage medium
JP2024509666A (en) Blockchain data segregation
CN110910110A (en) Data processing method and device and computer storage medium
CN108540447B (en) Block chain-based certificate verification method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant