CN110599322B - Data auditing method and device based on blockchain network - Google Patents

Data auditing method and device based on blockchain network Download PDF

Info

Publication number
CN110599322B
CN110599322B CN201910906437.4A CN201910906437A CN110599322B CN 110599322 B CN110599322 B CN 110599322B CN 201910906437 A CN201910906437 A CN 201910906437A CN 110599322 B CN110599322 B CN 110599322B
Authority
CN
China
Prior art keywords
data
auditing
uplink
business
business process
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910906437.4A
Other languages
Chinese (zh)
Other versions
CN110599322A (en
Inventor
张懿方
戴传兵
郭鹏
洪晓雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910906437.4A priority Critical patent/CN110599322B/en
Publication of CN110599322A publication Critical patent/CN110599322A/en
Application granted granted Critical
Publication of CN110599322B publication Critical patent/CN110599322B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/123Tax preparation or submission
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P90/00Enabling technologies with a potential contribution to greenhouse gas [GHG] emissions mitigation
    • Y02P90/30Computing systems specially adapted for manufacturing

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Human Resources & Organizations (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Software Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • General Health & Medical Sciences (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data auditing method and device based on a blockchain network, wherein the method comprises the following steps: the management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with the auditing object, generates a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and adds the plurality of target blocks to the business full-quantity chain; the data to be uplink comprises business flow data; when query information of the business processing authority of the auditing object sent by the request terminal is received, auditing the association relation among business flow data in a plurality of target blocks associated with the auditing object through a business total chain, generating feedback information of the business processing authority of the auditing object according to an auditing result, and sending the feedback information to the request terminal. By adopting the method and the device, the auditing efficiency of the business process data is improved.

Description

Data auditing method and device based on blockchain network
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to a data auditing method and apparatus based on a blockchain network.
Background
With the continuous development of computer networks, various flow links of the existing export tax refund can also be realized through the networks. However, since handling an export tax return business requires data verification among parties, such as verification of business related data for applying for handling an export tax return, verification of local tax office related data where the business is located, and verification of export tax return related data, there is also a higher requirement on how to handle the export tax return business quickly.
In the prior art, the relevant voucher data, the relevant logistics data of the logistics business and the relevant production data of the manufacturer are mainly given to the local tax bureau through the enterprise, and after the local tax bureau verifies all data sent by the received enterprise, the logistics business and the manufacturer, relevant mail can be generated, and the mail can prove that the enterprise has an export tax return condition. The local tax office will give the generated mail to the export tax office, which decides whether to transact the export tax service for the enterprise according to the validity of the mail. Because, in order to ensure the security among the parties, the data among the parties involved in handling an export tax return business (including enterprises, local tax offices and export tax offices) are isolated, the handling of the relevant export tax return business can be realized only by the complicated processing flow, which results in complicated business handling process and low handling efficiency.
Content of the application
The application provides a data auditing method and device based on a block chain network, which can improve auditing efficiency for business process data.
In one aspect, the present application provides a data auditing method based on a blockchain network, including:
the management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with the auditing object, generates a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and adds the plurality of target blocks to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; the business full chain is used for storing blocks corresponding to all business flow data; the blocks corresponding to all the business process data comprise the target blocks;
when query information of the business processing authority of the auditing object sent by a request terminal is received, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the query information, and acquiring association relations among business process data respectively included in the plurality of target blocks;
Verifying the association relation among a plurality of business process data, generating feedback information of the business processing authority of the verification object according to a verification result, and sending the feedback information to the request terminal; the feedback information comprises confirmation information that the auditing object has the service processing authority or prompt information that the auditing object does not have the service processing authority.
Wherein the obtaining the plurality of target blocks associated with the audit object from the traffic volume chain according to the query information comprises:
acquiring a logistics object and a production object which are associated with the auditing object;
acquiring a target block corresponding to the auditing object, a target block corresponding to the logistics object and a target block corresponding to the production object from the business full chain;
and determining transaction certificate data in a target block corresponding to the auditing object, logistics data in the target block corresponding to the logistics object and production data in the target block corresponding to the production object as the business flow data.
The auditing the association relation among the plurality of business process data generates feedback information of the business processing authority aiming at the auditing object according to the auditing result, and the method comprises the following steps:
When the transaction acceptance object contained in the transaction certificate data is detected to be the production object, determining that the auditing object and the production object have a transaction association relation, and detecting an object receiving object and an object sending object contained in the logistics data;
when the object receiving object is detected to be the auditing object and the object sending object is detected to be the production object, determining that an object matching association relationship is arranged among the logistics object, the production object and the auditing object, and comparing the transmission object attribute contained in the logistics data, the production object attribute contained in the production data and the transaction object attribute contained in the transaction certificate data;
and when the transmission object attribute, the production object attribute and the transaction object attribute are equal to each other, determining that the logistics object, the production object and the transaction initiating object have object matching association relations, and generating the confirmation information.
The auditing the association relation among the plurality of business process data generates feedback information of the business processing authority aiming at the auditing object according to the auditing result, and the method comprises the following steps:
Detecting the transaction time of the transaction certificate data, the logistics time of the logistics data and the production time of the production data;
and generating the confirmation information when the transaction time, the logistics time and the generation time meet the time association relation on a time axis.
The management node holds a key pair of a data submitting node to which each piece of data to be uplink belongs respectively; the key pair comprises a private key and a secret key of the data submitting node; the generating a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of to-be-uplink data includes:
decrypting the data to be uplink carried by each uplink request based on a private key of a data submitting node to which the data to be uplink belongs, so as to obtain signature and business flow data in the data to be uplink;
decrypting the signature based on the public key to obtain a first hash value in the signature;
performing hash operation on the business process data based on a hash algorithm to obtain a second hash value corresponding to the business process data;
when the first hash value and the second hash value are detected to be the same, the signature verification passes, and the target blocks are generated according to the data to be uplink.
The generating a plurality of target blocks according to the plurality of data to be uplink, adding the plurality of target blocks to a traffic full chain, includes:
encrypting the included business process data based on the public key corresponding to the data submitting node to which each piece of data to be uplink belongs to obtain encrypted data corresponding to each piece of business process data;
and generating target blocks corresponding to the business process data respectively according to the encrypted data corresponding to the business process data respectively, and adding the target blocks corresponding to the business process data respectively to the business full chain.
Wherein said adding the plurality of target blocks to a traffic full chain comprises:
generating index values corresponding to each target block in the target blocks based on a block height increment mechanism, and storing mapping relations between each index value and the corresponding data submitting node into an index mapping table;
adding said each target block having said index value to said traffic full chain.
In one aspect, the present application provides a data auditing apparatus based on a blockchain network, applied to a management node, including:
The first acquisition module is used for acquiring uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with the auditing object, respectively checking the to-be-uplink data based on a key pair of a data submitting node to which the to-be-uplink data belongs, and if the checking passes, generating a plurality of target blocks according to the to-be-uplink data, and adding the target blocks to a business full-volume chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; the business full chain is used for storing blocks corresponding to all business flow data; the blocks corresponding to all the business process data comprise the target blocks;
the second acquisition module is used for acquiring the plurality of target blocks associated with the auditing object from the business full chain according to the inquiry information when the inquiry information of the business processing permission of the auditing object sent by the request terminal is received, and acquiring the association relation between the business process data respectively included in the plurality of target blocks;
the auditing module is used for auditing the association relations among the plurality of business process data, generating feedback information of the business processing authorities of the auditing objects according to auditing results, and sending the feedback information to the request terminal; the feedback information comprises confirmation information that the auditing object has the service processing authority or prompt information that the auditing object does not have the service processing authority.
Wherein, the second acquisition module includes:
the first acquisition unit is used for acquiring a logistics object and a production object which are associated with the auditing object;
the block acquisition unit is used for acquiring a target block corresponding to the auditing object, a target block corresponding to the logistics object and a target block corresponding to the production object from the business full chain;
and the determining unit is used for determining transaction certificate data in the target block corresponding to the auditing object, logistics data in the target block corresponding to the logistics object and production data in the target block corresponding to the production object as the business process data.
Wherein, the audit module includes:
the first detection unit is used for determining that the auditing object and the production object have a transaction association relation when the transaction acceptance object contained in the transaction voucher data is detected to be the production object, and detecting an object receiving object and an object sending object contained in the logistics data;
the second detection unit is used for determining that the logistics object, the production object and the auditing object have object matching association relations when the object receiving object is detected to be the auditing object and the object sending object is detected to be the production object, and comparing the transmission object attribute contained in the logistics data, the production object attribute contained in the production data and the transaction object attribute contained in the transaction certificate data;
The first generation unit is used for determining that the logistics object, the production object and the transaction initiating object have object matching association relations when the transmission object attribute, the production object attribute and the transaction object attribute are equal to each other, and generating the confirmation information.
Wherein, the audit module includes:
the third detection unit is used for detecting the transaction time of the transaction certificate data, the logistics time of the logistics data and the production time of the production data;
and the second generation unit is used for generating the confirmation information when the transaction time, the logistics time and the generation time meet the time association relation on a time axis.
The management node holds a key pair of a data submitting node to which each piece of data to be uplink belongs respectively; the key pair comprises a private key and a secret key of the data submitting node; the first acquisition module includes:
the first decryption unit is used for decrypting the data to be uplink carried by each uplink request based on the private key of the data submitting node to which each data to be uplink belongs, and obtaining the signature and the business flow data in each data to be uplink;
The second decryption unit is used for decrypting the corresponding signature based on the public key of the data submitting node to which each piece of data to be uplink belongs, so as to obtain a first hash value in each signature;
the operation unit is used for carrying out hash operation on each business process data based on a hash algorithm to obtain a second hash value corresponding to each business process data;
and the fourth detection unit is used for generating the target blocks according to the to-be-uplink data when detecting that each first hash value is the same as the corresponding second hash value and the verification sign passes.
Wherein, the first acquisition module includes:
the encryption unit is used for encrypting the included business process data based on the public key corresponding to the data submitting node to which each piece of data to be uplink belongs, so as to obtain encrypted data corresponding to each piece of business process data;
the first adding unit is configured to generate target blocks corresponding to each business process data according to the encrypted data corresponding to each business process data, and add the target blocks corresponding to each business process data to the business full chain.
Wherein, the first acquisition module includes:
the mapping unit is used for respectively generating index values corresponding to each target block in the target blocks based on a block height increasing mechanism, and storing the mapping relation between each index value and the corresponding data submitting node into an index mapping table;
and a second adding unit, configured to add the each target block with the index value to the traffic full chain.
In one aspect, the present application provides a computer device comprising a memory and a processor, the memory storing a computer program which, when executed by the processor, causes the processor to perform the method of one of the above aspects.
An aspect of the present application provides a computer readable storage medium storing a computer program comprising program instructions which, when executed by a processor, cause the processor to perform the method of the above aspect.
The method comprises the steps that a management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with an auditing object, a plurality of target blocks are generated according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and the plurality of target blocks are added to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; when query information of the business processing authority of the auditing object sent by a request terminal is received, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the query information, and acquiring association relations among business process data respectively included in the plurality of target blocks; and auditing the association relation among the plurality of business process data, generating feedback information of the business processing permission of the auditing object according to the auditing result, and sending the feedback information to the request terminal. Therefore, the method provided by the application can acquire the business process data submitted by the data submitting nodes by the management node, and audit the acquired business process data so as to determine the business processing permission of the audit object corresponding to the business process data, so that the audit efficiency of the business process data is improved, and the determination efficiency of the business processing permission of the audit object is improved.
Drawings
In order to more clearly illustrate the technical solutions of the present application or the prior art, the following description will briefly introduce the drawings that are required to be used in the embodiments or the prior art descriptions, it is obvious that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic view of a scenario for data auditing provided herein;
FIG. 2 is a flow chart of a data auditing method based on a blockchain network provided by the present application;
FIG. 3 is a schematic view of a scenario of an acquisition block provided in the present application;
FIG. 4 is a schematic block diagram of a block according to the present disclosure;
FIG. 5 is a schematic diagram of a block chain network based data auditing apparatus according to the present application;
fig. 6 is a schematic structural diagram of a computer device provided in the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer. The blockchain comprises a series of blocks (blocks) which are mutually connected according to the sequence of the generated time, the new blocks are not removed once being added into the blockchain, and record data submitted by nodes in the blockchain system are recorded in the blocks.
Please refer to fig. 1, which is a schematic diagram of a scenario of data auditing provided in the present application. As shown in fig. 1, the data submitting node 100a, the data submitting node 101a and the data submitting node 102a are all 3 nodes associated with the auditing object, wherein the number of the data submitting nodes associated with the auditing object is determined according to the actual application scenario, and the limitation is not limited herein. The data commit node associated with the audit object can be understood as: when an audit object needs to transact a business, the audit object needs to transact the related business data provided by the associated data submitting node. The data submitting node 100a, the data submitting node 101a and the data submitting node 102a all send uplink requests to the management node 106a, and each uplink request carries corresponding data to be uplink, where the data to be uplink includes business process data and a signature of the business process data. The uplink request sent by the data submitting node 100a to the management node 106a is a uplink request 1, the data to be uplink carried in the uplink request 1 includes a business process data 1 and a signature 1, and the signature 1 is a signature of the business process data 1; the uplink request sent by the data submitting node 101a to the management node 106a is a uplink request 2, the data to be uplink carried in the uplink request 2 comprises business process data 2 and signature 2, and the signature 2 is the signature of the business process data 2; the uplink request sent by the data submitting node 102a to the management node 106a is a uplink request 3, where the data to be uplink carried in the uplink request 3 includes the business process data 3 and the signature 3, and the signature 3 is a signature of the business process data 3. The specific process of obtaining the signature of the business process data comprises the following steps: and carrying out hash operation on the business process data to obtain a hash value of the business process data, and encrypting the hash value through a private key of a data submitting node to which the business process data belongs to obtain a signature of the business process data.
The data to be uplink carried in the uplink request sent by each data submitting node is encrypted by the public key of the corresponding data submitting node, and the management node 106a can check the data to be uplink carried in the uplink request sent by each data submitting node through the key pair (including the public key and the private key) of each data submitting node. The label checking process specifically comprises the following steps: the management node 106a may sign the data to be uplink carried in the uplink request 1 by using the key pair of the data submitting node 100 a: the management node 106a may decrypt the data to be uplink carried in the uplink request 1 by using the private key of the data submitting node 100a, to obtain the business process data 1 and the signature 1 in the data to be uplink. Next, the management node 106a may decrypt the signature 1 using the public key of the data submitting node 100a to obtain a hash value corresponding to the business process data 1, which may be referred to as a first hash value corresponding to the business process data 1. The management node 106a may perform a hash operation on the obtained business process data 1 to obtain another hash value corresponding to the business process data 1, and the hash value may be referred to as a second hash value corresponding to the business process data 1. When the management node 106a detects that the first hash value corresponding to the business process data 1 is the same as the second hash value, it is determined that the signature of the data to be uplink carried in the uplink request 1 passes, and a corresponding target block can be generated according to the business process data 1 in the data to be uplink, where the target block includes the business process data 1. Similarly, the management node 106a may sign the data to be uplink carried in the uplink request 2 by using the key pair of the data submitting node 101 a: the management node 106a may decrypt the data to be uplink carried in the uplink request 2 by using the private key of the data submitting node 101a, to obtain the business process data 2 and the signature 2 in the data to be uplink. Next, the management node 106a may decrypt the signature 2 using the public key of the data submitting node 101a to obtain a hash value corresponding to the business process data 2, which may be referred to as a first hash value corresponding to the business process data 2. The management node 106a may perform a hash operation on the obtained business process data 2 to obtain another hash value corresponding to the business process data 2, and the hash value may be referred to as a second hash value corresponding to the business process data 2. When the management node 106a detects that the first hash value corresponding to the business process data 2 is the same as the second hash value, it is determined that the signature of the data to be uplink carried in the uplink request 2 passes, and a corresponding target block can be generated according to the business process data 2 in the data to be uplink, where the target block includes the business process data 2. Similarly, the management node 106a may sign the data to be uplink carried in the uplink request 3 by using the key pair of the data submitting node 102 a: the management node 106a may decrypt the data to be uplink carried in the uplink request 3 by using the private key of the data submitting node 102a, to obtain the business process data 3 and the signature 3 in the data to be uplink. Next, the management node 106a may decrypt the signature 3 using the public key of the data submitting node 102a to obtain a hash value corresponding to the business process data 3, which may be referred to as a first hash value corresponding to the business process data 3. The management node 106a may perform a hash operation on the obtained business process data 3 to obtain another hash value corresponding to the business process data 3, and the hash value may be referred to as a second hash value corresponding to the business process data 3. When the management node 106a detects that the first hash value corresponding to the business process data 3 is the same as the second hash value, it is determined that the signature of the data to be uplink carried in the uplink request 3 passes, and a corresponding target block can be generated according to the business process data 3 in the data to be uplink, where the target block includes the business process data 3.
The management node 106a may upload the generated target block corresponding to the business process data 1, the generated target block corresponding to the business process data 2, and the generated target block corresponding to the business process data 3 to the business full chain 108a, where the business full chain 108a is a block chain, and the business full chain 108a includes the blocks corresponding to the business process data that are uplink to all the data submitting nodes, that is, the business full chain 108a is formed by the blocks corresponding to all the business process data (that is, the business process data corresponding to all the data submitting nodes, including the business process data corresponding to the data submitting nodes 100a, 101a, and 102a, respectively) including all the target blocks, and the management node 106a may maintain and manage all the blocks in the business full chain 108 a. When the management node 106a receives the query information of the business process authority for the auditing object sent by the request terminal 112a, the management node 106a may obtain, on the business full-volume chain 108a, a target block associated with the auditing object, that is, a target block corresponding to a data submitting node associated with the auditing object, herein referred to as a target block corresponding to business process data 1 of the data submitting node 100a (may be referred to as block 1), a target block corresponding to business process data 2 of the data submitting node 101a (may be referred to as block 2), and a target block corresponding to business process data 3 of the data submitting node 102a (may be referred to as block 3), as shown in fig. 1, that is, a block 1, a block 2, and a block 3 in the block set 110 a. The block 1, the block 2 and the block 3 associated with the auditing object have corresponding association relationships, and the management node 106a can audit the association relationships among the block 1, the block 2 and the block 3 and generate feedback information according to the auditing result. The feedback information comprises confirmation information with business processing authority and prompt information without business processing authority of an auditing object, the prompt information is generated when the association relation among the auditing block 1, the auditing block 2 and the auditing block 3 is not matched, and the confirmation information is generated when the association relation among the auditing block 1, the auditing block 2 and the auditing block 3 is matched. The management node 106a may send the generated feedback information to the requesting terminal 112a, and the requesting terminal 112a may perform corresponding service handling according to the received feedback information. For example, when the request terminal 112a receives the confirmation information, the service included in the service processing authority may be transacted for the auditing object, and when the request terminal 112a receives the prompt information, the service requested to be transacted for the auditing object is not transacted.
Referring to fig. 2, a flow chart of a data auditing method based on a blockchain network provided in the present application, as shown in fig. 2, the method may include:
step S101, a management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with an auditing object, generates a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and adds the plurality of target blocks to a business full-quantity chain;
specifically, the method provided by the application can be applied to an export tax refund service, the audit object can be an enterprise applying for handling the export tax refund service, the plurality of data submitting nodes associated with the audit object can be nodes corresponding to the related objects needing to submit audit materials when handling the export tax refund for the enterprise, and the plurality of data submitting nodes can comprise nodes corresponding to the audit object (namely, the nodes corresponding to the enterprise), nodes corresponding to a producer of the audit object purchasing an article and nodes corresponding to a logistics provider of the producer consigning and delivering the article, wherein the management nodes, the nodes corresponding to the enterprise, the nodes corresponding to the producer and the nodes corresponding to the logistics provider are all block chain nodes in a block chain network. The management node, the enterprise-corresponding node, the manufacturer-corresponding node, and the logistic-corresponding node may each correspond to one or more servers. The plurality of to-be-uplink data associated with the audit object may be to-be-uplink data sent by a node corresponding to the enterprise to the management node, to-be-uplink data sent by a node corresponding to the producer to the management node, or/and to-be-uplink data sent by a node corresponding to the logistic provider to the management node.
Each data submitting node associated with the auditing object may send a uplink request to the management node, where the uplink request may carry corresponding data to be uplink, and the data to be uplink may include corresponding business process data, that is, the uplink request is used by the data submitting node to request the management node to add the business process data in the data to be uplink carried by the uplink request to a business full link held by the management node (that is, request uplink). When adding one business process data to the business full chain, the business full chain has a target block corresponding to the uplink business process data, and the management node can maintain (including an uplink block, acquire the uplink block, check the maintenance authority of the uplink block and the like) all target blocks corresponding to the uplink business process data of all data submitting nodes in the business full chain. The business total chain comprises blocks corresponding to all business process data, specifically, a plurality of auditing objects can be provided, each auditing object can be associated with a plurality of data submitting nodes, and the block corresponding to the business process data of the data submitting node associated with the auditing object can be called as a target block. Therefore, all the business process data refer to business process data corresponding to all data submitting nodes associated with all auditing objects. The business total chain comprises target blocks corresponding to business flow data of all data submitting nodes associated with all auditing objects. When the data submitting node is a node corresponding to the enterprise, the business process data to be included in the uplink data can be a purchase certificate when the enterprise purchases the article from the manufacturer; when the data submitting node is a node corresponding to a manufacturer, the business flow data to be included in the uplink data can be photos or videos of the production workshop pipelining operation activity of the manufacturer when the manufacturer produces the article; when the data submitting node is a node corresponding to the logistics provider, the business process data to be included in the uplink data can be logistics information (positioning information, namely, article conveying route information) of the logistics provider when the logistics provider conveys the articles, namely, the articles purchased by the enterprises at the manufacturers.
The management node holds the key pair of each data submitting node, and the management node can sign each data to be uplink through the key pair (including the public key and the private key of the data submitting node) of the data submitting node to which the data to be uplink belongs, respectively: taking the management node for checking one of the data to be uplink as an example, the management node can decrypt the data to be uplink by using the private key of the data submitting node to obtain the business process data and the signature in the data to be uplink, wherein the signature is the signature corresponding to the business process data. The process of obtaining the signature of the business process data comprises the following steps: and carrying out hash operation on the business process data through a hash algorithm to obtain a hash value of the business process data, and encrypting the hash value through a private key of a data submitting node to which the business process data belongs to, so as to obtain a signature of the business process data. Then, the management node may further decrypt the decrypted signature by using the public key of the data submitting node, to obtain a hash value of the business process data in the signature, which may be referred to as a first hash value. The management node may perform a hash operation on the service flow data decrypted from the data to be uplink to obtain a hash value, which may be referred to as a second hash value. If the management node detects that the first hash value obtained from the signature is the same as the second hash value, the management node determines that the business process data in the received data to be uplink is not tampered, generates a target block (the target block includes the business process data) according to the business process data, and adds the generated target block to a business full chain. Through the same signature verification process, signature verification can be performed on the received data to be uplink carried by each uplink request, each business process data is used as data needing to be uplink after the signature verification is passed, target blocks corresponding to the business process data included in each data to be uplink can be generated, and each generated target block is added into a business full-quantity chain. The block stored in the business full chain is the target block corresponding to the business flow data of all the data submitting nodes.
Optionally, the management node may encrypt the service flow data that needs to be uplink, and add the target block corresponding to the encrypted service flow data to the service full-volume chain. The management node may encrypt the included business process data based on the public key corresponding to the data submitting node to which each piece of data to be uplink belongs, to obtain encrypted data corresponding to each piece of business process data, generate the target block corresponding to each piece of business process data according to the encrypted data corresponding to each piece of business process data, and add the target block corresponding to each piece of business process data to the business full chain: after the management node passes the signature verification of the data to be uplink, the service flow data in the data to be uplink can be encrypted through the public key of the data submitting node corresponding to the data to be uplink, and in this way, the encrypted data corresponding to the service flow data in each data to be uplink can be obtained. The management node may use the encrypted data corresponding to each service flow data as the data to be uplink, that is, generate the corresponding target block according to each encrypted data, and add the corresponding target block of each encrypted data to the service full chain.
When the uplink is a target block corresponding to unencrypted business flow data, the management node can acquire the block corresponding to the business flow data from the business volume chain, and directly extract the corresponding business flow data from the acquired block. When the uplink is the target block corresponding to the encrypted business process data (i.e. the encrypted data), the management node can acquire the block corresponding to the encrypted data from the business full-size chain, and can decrypt the acquired block by using the private key of the data submitting node corresponding to the encrypted data so as to obtain the corresponding business process data in the block.
The management node can respectively generate index values corresponding to each target block in the target blocks based on a block height increasing mechanism, and store the mapping relation between each index value and the corresponding data submitting node into an index mapping table; adding said each target block having said index value to said traffic full chain: the block height increment mechanism is understood to be that each block in the traffic full chain (i.e. all target blocks of the uplink) is assigned a number, and the numbers are sequentially increased, and the later the number of the block added to the traffic full chain is larger. For example, block 1 is added to the traffic full chain at the first time, and block 1 is the first block added to the traffic full chain, then block 1 may be assigned a number of 001. Block 2 is added to the traffic full chain at a second time, which is later than the first time, block 2 may be assigned a number 002. Block 3 is added to the traffic full chain at a third time, which is later than the second time, block 3 may be assigned a number 003, which is sequentially recursively. The above number allocated to each block may also be referred to as an index value of each block, where the management node may store a mapping relationship between each index value and a corresponding data submitting node in an index mapping table, for example, the block 1 is generated according to service flow data in to-be-uplink data carried by an uplink request sent by the data submitting node 1 to the management node, and then a mapping relationship between an index value 001 corresponding to the block 1 and the data submitting node 1 may be stored in the index mapping table, and a mapping relationship between the index value and a node identifier of the data submitting node 1 may be stored in the index mapping table. The management node may add the target block to the traffic full chain to which the index value has been assigned. Subsequently, the management node can find all index values with mapping relation with the data submitting node in the index mapping table through the node identification of a certain data submitting node, and then find all blocks corresponding to the data submitting node in the service full-volume chain through all index values with mapping relation with the data submitting node. For example, all the blocks of the nodes corresponding to the enterprise are searched/obtained in the service full-volume chain through all index values which are searched in the index mapping table and have association relations with the nodes corresponding to the enterprise.
Fig. 3 is a schematic view of a scenario of acquiring a block provided in the present application. As shown in fig. 3, the management node b8 stores an index map b7 and a traffic total chain b1. Here, 3 data submitting nodes are taken as an example, and the 3 data submitting nodes are respectively a data submitting node 1, a data submitting node 2 and a data price improving node 3, and meanwhile, a service full chain b1 is taken as an example and 5 blocks are included, wherein the 5 blocks are respectively a block b2, a block b3, a block b4, a block b5 and a block b6, and the index value of each block is sequentially 000, 001, 002, 003 and 004. The index mapping table b7 stores a mapping relationship between an index value of each block in the service full chain b1 and a corresponding data submitting node, including: index value 000 corresponds to data commit node 1, indicating that the block with index value 000 in traffic volume chain b1 is generated by the traffic flow data of data commit node 1, index value 001 corresponds to data commit node 1, index value 002 corresponds to data commit node 2, index value 003 corresponds to data commit node 3, and index value 004 corresponds to data commit node 1. When the management node b8 wants to find the block of the data submitting node 1, it can obtain the index values corresponding to the data submitting node 1 from the index mapping table b7, including the index value 000, the index value 001 and the index value 004, and then the management node b8 can obtain the block b2, the block b3 and the block b5 from the traffic volume chain through the obtained index value 000, index value 001 and index value 004. When the management node b8 wants to find a block of the data submitting node 2, it can obtain that the index value corresponding to the data submitting node 2 includes the index value 002 from the index mapping table b7, and then the management node b8 can obtain the block b4 from the traffic full chain through the obtained index value 002. When the management node b8 wants to find a block of the data submitting node 3, it can obtain that the index value corresponding to the data submitting node 3 includes the index value 003 from the index mapping table b7, and then the management node b8 can obtain the block b5 from the traffic full chain through the obtained index value 003.
It should be noted that, if the data to be uplinked is encrypted by the correct public key of the data submitting node, when the data to be uplinked is decrypted by using the wrong private key (for example, the private key of the data submitting node is not the corresponding private key), the decryption will fail, and the business process data and the signature in the data to be uplinked are not obtained. Otherwise, if the data to be uplinked is encrypted by the wrong public key (for example, the public key of the data submitting node is not the corresponding public key), when the correct private key of the data submitting node is used to decrypt the data to be uplinked, the decryption is also failed, and thus the business process data and the signature in the data to be uplinked are not obtained.
Wherein each block in the traffic full chain will include a block header and a block body. If the target block of the generated business process data is the first block in the business full chain, the block header included in the block stores the input information characteristic value (i.e. random number), version number, timestamp and difficulty value, and the block main body stores the input information (which may be the business process data or the first hash value corresponding to the business process data). If the target block of the generated business process data is not the first block in the business full chain, the block header of the block included in the block stores the input information characteristic value of the current block (i.e. the block of the generated business process data), the block header characteristic value, the version number, the timestamp and the difficulty value of the parent block (i.e. the last block of the current block, i.e. the block added last on the business full chain before the block of the business process data is added on the business full chain), and so on, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, thereby ensuring the safety of the input information in the block. Fig. 4 is a schematic structural diagram of a block provided in the present application. As shown in fig. 4, block c1 may be the first block in the traffic volume chain to be the first block in the chain to include the input information characteristic value, version number, timestamp and difficulty value, without the block header characteristic value of the parent block. Block c2 is the second block in the traffic total chain, block c1 is the parent block of block c2, and block c2 includes the block header feature value of the parent block (i.e., block c 1) in addition to the input information feature value, version number, timestamp, and difficulty value. Similarly, the block c2 is a parent block of the block c3, and the block c3 includes a block header characteristic value of the block c2 in addition to the input information characteristic value, the version number, the timestamp and the difficulty value.
Step S102, when receiving inquiry information of the business processing authority of the auditing object sent by a request terminal, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the inquiry information, and acquiring association relations among business process data respectively included in the plurality of target blocks;
specifically, the request terminal may refer to an object for auditing the business process data submitted by the data submitting node, for example, the request terminal may be a client corresponding to the export refund office. The enterprise can apply for processing the export tax refund business to the export tax refund office, and the export tax refund office needs to audit the business process data submitted by the management node by a plurality of data submitting nodes associated with the enterprise so as to judge whether the enterprise has the condition of processing the export tax refund business. When the management node obtains the query information of the service processing authority of the auditing object sent by the request terminal, the data submitting node associated with the auditing object (may obtain the node identifier of the data submitting node associated with the auditing object) may be obtained according to the query information, and a plurality of blocks corresponding to the data submitting node associated with the auditing object (that is, a plurality of target blocks corresponding to the data submitting node associated with the auditing object may be obtained from the service full-size chain) may be obtained. The plurality of target blocks obtained here refer to a plurality of target blocks (e.g., a target block corresponding to the enterprise, a block corresponding to the producer, and a block corresponding to the logistic provider) corresponding to business process data of a data submitting node associated with a certain audit object (e.g., the enterprise). For example, the audit object is an enterprise, and the management node may obtain, according to the query information, a logistics object (i.e., a node identifier of a node corresponding to the logistics provider) and a production object (i.e., a node identifier of a node corresponding to the producer) associated with the enterprise, so that the management node may obtain, in a service full-volume chain, a target block corresponding to the audit object, a target block corresponding to the logistics object, and a target block corresponding to the production object (or may obtain according to the index value). The business process data in the target block corresponding to the auditing object (i.e. the enterprise) is transaction certificate data (e.g. purchase certificate, which may be purchase order, receipt, contract, etc.), the business process data in the target block corresponding to the logistics object is logistics data (e.g. the logistics information, i.e. the positioning information, the article transportation route information), and the business process data in the target block corresponding to the production object is production data (e.g. photos or videos of the production shop pipelining activity of the producer when producing the article).
The management node can acquire the association relation between the business process data in the target blocks to be checked according to the type of the query information. For example, if the query information is that the enterprise (i.e., the auditing object) has the condition of transacting the export tax refund, the association relationship required to be audited may be obtained, including a transaction association relationship, an object matching association relationship and an article matching association relationship. The association relation to be audited can be set by oneself, and different association relations to be audited can be set for different types of inquiry information. If the query information is the same as whether the enterprise (i.e. the auditing object) has the condition of transacting the export tax refund, the association relationship needing auditing can also be obtained, including the time association relationship.
Step S103, auditing the association relation among a plurality of business process data, generating feedback information of the business processing authority of the auditing object according to the auditing result, and sending the feedback information to the request terminal;
specifically, the management node may audit the association relationship between the plurality of business process data (one business process data corresponding to one target block) in the plurality of obtained target blocks. When the obtained association relationship needing to be audited is the transaction association relationship, the object matching association relationship and the article matching association relationship, the auditing process specifically comprises the following steps: firstly, auditing the transaction association relation, when a management node detects that a transaction acceptance object contained in the transaction certificate data is the production object, determining that the auditing object and the production object have the transaction association relation, and detecting an object receiving object and an object sending object contained in the logistics data: the management node may scan and identify the transaction receipt data in the target block corresponding to the obtained audit object, so as to obtain a transaction receipt object in the transaction receipt data, where the transaction receipt object may be understood as an object for receiving an order, that is, a seller (the audit object is a buyer). When the obtained transaction acceptance object is the producer corresponding to the auditing object, the transaction acceptance object and the production object are indicated to have transaction association relation, namely transaction behaviors exist between the auditing object and the production object. After determining that the auditing object and the production object have the transaction association relationship, the auditing object can be further matched with the association relationship, and the management node can detect the object receiving object and the object sending object contained in the logistics data. When the management node detects that the article receiving object is the auditing object and the article sending object is the production object, determining that the logistics object, the production object and the auditing object have an object matching association relationship, and comparing the transmission article attribute contained in the logistics data, the production article attribute contained in the production data and the transaction article attribute contained in the transaction certificate data: the management node may perform data identification (e.g., text identification) on the logistics data in the target block corresponding to the obtained logistics object, so as to obtain a sender (i.e., the object sending out the article) and a receiver (i.e., the object receiving the article) in the logistics data. When the sender in the logistics data is the production object corresponding to the auditing object and the receiver is the auditing object, the logistics object, the production object and the auditing object are indicated to have the object matching association relation. Further, the management node may verify that the items match the association relationship, and compare the transmission item attribute contained in the logistics data, the production item attribute contained in the production data, and the transaction item attribute contained in the transaction credential data. And when the management node compares the transmission object attribute, the production object attribute and the transaction object attribute to be the same, determining that the logistics object, the production object and the transaction initiating object have object matching association relations, and generating the confirmation information. The article attributes may include, among others, the number of articles, the type of article (e.g., the type of apparel (which may also be classified as clothing, pants, shoes, skirt, etc.), or the type of jewelry), and the material of the article (e.g., cotton, linen, silver, gold, etc.). The management node can identify the logistics data (such as text identification and image identification) and acquire the attribute of the transmitted article (namely the article attribute of the transmitted article) contained in the logistics data; the management node can identify the production data (such as image identification and video frame capture identification) and acquire the production item attribute (namely the item attribute of the item produced by the producer) contained in the production data; the management node may identify the transaction credential data (e.g., text identification and image identification), and obtain the transaction item attribute (i.e., the item attribute of the item transacted by both the auditing object and the production object) included in the transaction credential data. The management node may compare the transmission article attribute, the production article attribute and the transaction article attribute with each other in a similarity (or referred to as consistency), and when the transmission article attribute, the production article attribute and the transaction article attribute are equal to each other, it indicates that the logistics object, the production object and the transaction initiating object have an article matching association relationship. The feedback information comprises confirmation information and prompt information, wherein the confirmation information is generated when the management node carries out auditing and passing on the association relationship among the auditing object, the production object and the logistics object and confirms that the auditing object has corresponding service processing authority (such as the condition of transacting export tax refund). The prompt information is generated when the management node does not pass the examination of the association relation among the examination object, the production object and the logistics object and confirms that the examination object does not have the corresponding service processing right. When the management node audits that the auditing objects, the production objects and the logistics objects have the transaction association relationship, the object matching association relationship and the object matching association relationship, the management node indicates that the auditing of the association relationship among the auditing objects, the production objects and the logistics objects is passed, and the confirmation information can be generated. When the management node audits that at least one of the transaction association relationship, the object matching association relationship and the object matching association relationship is not possessed among the audit object, the production object and the logistics object, the management node indicates that the audit of the association relationship among the audit object, the production object and the logistics object is not passed, and the prompt information can be generated. The management node can send the generated feedback information to the request terminal, and the request terminal can determine whether to transact corresponding service for the auditing object according to the received feedback information. For example, when the request terminal receives the confirmation information sent by the management node, the corresponding export tax return service can be transacted for the auditing object, and when the request terminal receives the prompt information sent by the management node, the corresponding export tax return service is not transacted for the auditing object.
Optionally, when the obtained association relationship to be audited includes the above-mentioned time association relationship, the management node may detect a transaction time of the transaction credential data, a logistics time of the logistics data, and a production time of the production data: that is, the management node may identify the transaction credential data, identifying the transaction time (e.g., the time to sign an order or contract) in the transaction credential data; the management node can identify the logistics data, and the logistics time (such as logistics bill receiving time, article delivery time, time of reaching a certain transfer station in the conveying process, harvesting time and the like) in the logistics data is identified; the management node may identify the production data, identify a production time (a start time, an end time, an intermediate transition time, etc. of the production item (the intermediate transition time may include a production progress for the item), etc. in the production data. And when the management node detects that the transaction time, the logistics time and the generation time meet the time association relation on the time axis, generating the confirmation information. For example, the time association relationship on the time axis includes: the transaction time and the production time must be before the logistics time (for example, before the delivery time of the article), and the transaction time may precede the production time or be later than the production time, where the specific standard of the time association relationship may be specifically set according to the actual application scenario, which is not limited herein. And when the management node detects that the transaction time, the logistics time and the generation time do not meet the time association relation on the time axis, generating the prompt information. The process of generating the feedback information for the service processing authority of the audit object described in the data processing method in fig. 2 is described by taking one audit object as an example, and when a plurality of audit objects exist, the process of generating the feedback information corresponding to each audit object is independent and the same.
By the method, the blockchain network is applied to the export tax refund business, and the articles involved in the export tax refund business can be subjected to the basis information searching and auditing in the whole period process of production (the production process of a producer), transportation (the transportation process of a logistics provider) and transaction (the transaction process of an enterprise and the producer). Moreover, due to the non-tamper property of the blockchain network, the auditing accuracy and the security of the export tax refund business are improved.
The method comprises the steps that a management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with an auditing object, a plurality of target blocks are generated according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and the plurality of target blocks are added to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; when query information of the business processing authority of the auditing object sent by a request terminal is received, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the query information, and acquiring association relations among business process data respectively included in the plurality of target blocks; and auditing the association relation among the plurality of business process data, generating feedback information of the business processing permission of the auditing object according to the auditing result, and sending the feedback information to the request terminal. Therefore, the method provided by the application can acquire the business process data submitted by the data submitting nodes by the management node, and audit the acquired business process data so as to determine the business processing permission of the audit object corresponding to the business process data, so that the audit efficiency of the business process data is improved, and the determination efficiency of the business processing permission of the audit object is improved.
Fig. 5 is a schematic structural diagram of a data auditing apparatus based on a blockchain network. As shown in fig. 5, the data auditing apparatus 1 may include: a first acquisition module 11, a second acquisition module 12 and an auditing module 13;
the first obtaining module 11 is configured to obtain uplink requests corresponding to a plurality of to-be-uplink data associated with an audit object, generate a plurality of target blocks according to the uplink requests corresponding to the to-be-uplink data, and add the target blocks to a service full-volume chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; the business full chain is used for storing blocks corresponding to all business flow data; the blocks corresponding to all the business process data comprise the target blocks;
the second obtaining module 12 is configured to obtain, when query information about service processing rights of the auditing object sent by a request terminal is received, the plurality of target blocks associated with the auditing object from the service full-volume chain according to the query information, and obtain association relations between the service flow data respectively included in the plurality of target blocks;
The auditing module 13 is used for auditing the association relations among a plurality of business process data, generating feedback information of the business processing authority aiming at the auditing object according to the auditing result, and sending the feedback information to the request terminal; the feedback information comprises confirmation information that the auditing object has the service processing authority or prompt information that the auditing object does not have the service processing authority.
The specific function implementation manners of the first acquiring module 11, the second acquiring module 12, and the auditing module 13 refer to step S101-step S103 in the embodiment corresponding to fig. 2, and are not described herein.
The second acquiring module 12 includes a first acquiring unit 121, a block acquiring unit 122, and a determining unit 123:
a first acquiring unit 121 configured to acquire a logistics object and a production object associated with the audit object;
a block obtaining unit 122, configured to obtain, in the business full chain, a target block corresponding to the audit object, a target block corresponding to the logistics object, and a target block corresponding to the production object;
and the determining unit 123 is configured to determine, as the business process data, transaction credential data in a target block corresponding to the audit object, logistics data in a target block corresponding to the logistics object, and production data in a target block corresponding to the production object.
The specific function implementation manner of the first obtaining unit 121, the block obtaining unit 122, and the determining unit 123 is referred to step S102 in the embodiment corresponding to fig. 2, and will not be described herein.
Wherein, the auditing module 13 includes a first detecting unit 131, a second detecting unit 132, and a first generating unit 133:
a first detection unit 131, configured to determine that a transaction association relationship is provided between the audit object and the production object when it is detected that the transaction acceptance object included in the transaction credential data is the production object, and detect an article receiving object and an article issuing object included in the logistics data;
a second detecting unit 132, configured to determine that an object matching association relationship is provided among the logistics object, the production object, and the auditing object when the object for receiving the article is detected as the auditing object and the object for issuing the article is detected as the production object, and compare a transmission article attribute included in the logistics data, a production article attribute included in the production data, and a transaction article attribute included in the transaction credential data;
the first generating unit 133 is configured to determine that the logistic object, the production object, and the transaction initiating object have an object matching association relationship when the transmission object attribute, the production object attribute, and the transaction object attribute are the same, and generate the confirmation information.
The specific functional implementation manner of the first detecting unit 131, the second detecting unit 132, and the first generating unit 133 is referred to step S103 in the embodiment corresponding to fig. 2, and will not be described herein.
Wherein, the auditing module 13 includes a third detecting unit 134 and a second generating unit 135:
a third detecting unit 134, configured to detect a transaction time of the transaction credential data, a logistics time of the logistics data, and a production time of the production data;
the second generating unit 135 is configured to generate the confirmation information when the transaction time, the logistics time and the generation time satisfy a time association relationship on a time axis.
In step S103 in the embodiment corresponding to fig. 2, the specific function implementation manner of the third detecting unit 134 and the second generating unit 135 is shown, and will not be described herein.
The management node holds a key pair of a data submitting node to which each piece of data to be uplink belongs respectively; the key pair comprises a private key and a secret key of the data submitting node; the first acquisition module 11 includes a first decryption unit 111, a second decryption unit 112, an operation unit 113, and a fourth detection unit 114:
A first decryption unit 111, configured to decrypt the data to be uplink carried by each uplink request based on a private key of a data submitting node to which each data to be uplink belongs, so as to obtain a signature and business flow data in each data to be uplink;
a second decryption unit 112, configured to decrypt the corresponding signature based on the public key of the data submitting node to which each piece of data to be uplink belongs, so as to obtain a first hash value in each signature;
an operation unit 113, configured to perform hash operation on each service flow data based on a hash algorithm, to obtain a second hash value corresponding to each service flow data;
and the fourth detecting unit 114 is configured to generate the plurality of target blocks according to the plurality of to-be-uplink data when detecting that each first hash value is the same as the corresponding second hash value and the tag passes.
The specific functional implementation manner of the first decryption unit 111, the second decryption unit 112, the operation unit 113, and the fourth detection unit 114 is shown in step S101 in the embodiment corresponding to fig. 2, and will not be described herein.
The first obtaining module 11 includes an encryption unit 115 and a first adding unit 116:
An encryption unit 115, configured to encrypt the included business process data based on the public key corresponding to the data submitting node to which each piece of data to be uplink belongs, so as to obtain encrypted data corresponding to each piece of business process data;
the first adding unit 116 is configured to generate, according to the encrypted data corresponding to each business process data, a target block corresponding to each business process data, and add the target block corresponding to each business process data to the business full chain.
In step S101 in the embodiment corresponding to fig. 2, the specific function implementation manner of the encryption unit 115 and the first adding unit 116 is shown, and will not be described herein.
Wherein the first obtaining module 11 includes a mapping unit 117 and a second adding unit 118:
a mapping unit 117, configured to generate an index value corresponding to each target block of the plurality of target blocks based on a block height increment mechanism, and store a mapping relationship between each index value and a corresponding data submitting node in an index mapping table;
a second adding unit 118, configured to add the each target block with the index value to the traffic full chain.
In the specific functional implementation manner of the mapping unit 117 and the second adding unit 118, please refer to step S101 in the embodiment corresponding to fig. 2, and a detailed description is omitted herein.
The method comprises the steps that a management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with an auditing object, a plurality of target blocks are generated according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and the plurality of target blocks are added to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; when query information of the business processing authority of the auditing object sent by a request terminal is received, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the query information, and acquiring association relations among business process data respectively included in the plurality of target blocks; and auditing the association relation among the plurality of business process data, generating feedback information of the business processing permission of the auditing object according to the auditing result, and sending the feedback information to the request terminal. Therefore, the method provided by the application can acquire the business process data submitted by the data submitting nodes by the management node, and audit the acquired business process data so as to determine the business processing permission of the audit object corresponding to the business process data, so that the audit efficiency of the business process data is improved, and the determination efficiency of the business processing permission of the audit object is improved.
Fig. 6 is a schematic structural diagram of a computer device provided in the present application. As shown in fig. 6, the computer device 1000 may include: processor 1001, network interface 1004, and memory 1005, in addition, the computer device 1000 may further comprise: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 6, an operating system, a network communication module, a user interface module, and a device control application program may be included in the memory 1005, which is one type of computer storage medium.
In the computer device 1000 shown in FIG. 6, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be configured to invoke the device control application stored in the memory 1005 to implement the description of the blockchain network-based data auditing method in the embodiment corresponding to fig. 2.
It should be understood that the computer device 1000 described in the present application may perform the description of the blockchain network-based data auditing method in the embodiment corresponding to fig. 2, and may also perform the description of the data auditing apparatus 1 in the embodiment corresponding to fig. 5, which is not repeated herein. In addition, the description of the beneficial effects of the same method is omitted.
Furthermore, it should be noted here that: the present application further provides a computer readable storage medium, in which a computer program executed by the aforementioned data auditing apparatus 1 is stored, and the computer program includes program instructions, when executed by the processor, can execute the description of the blockchain network-based data auditing method in the corresponding embodiment of fig. 2, and therefore, will not be described in detail herein. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer storage medium related to the present application, please refer to the description of the method embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
The foregoing disclosure is only illustrative of the preferred embodiments of the present application and is not intended to limit the scope of the claims herein, as the equivalent of the claims herein shall be construed to fall within the scope of the claims herein.

Claims (10)

1. A blockchain network-based data auditing method, comprising:
the management node obtains uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with the auditing object, generates a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and adds the plurality of target blocks to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; the business full chain is used for storing blocks corresponding to all business flow data; the blocks corresponding to all the business process data comprise the target blocks;
when query information of the business processing authority of the auditing object sent by a request terminal is received, acquiring a plurality of target blocks associated with the auditing object from the business full chain according to the query information, and acquiring association relations among business process data respectively included in the plurality of target blocks;
Verifying the association relation among a plurality of business process data, generating feedback information of the business processing authority of the verification object according to a verification result, and sending the feedback information to the request terminal; the feedback information comprises confirmation information that the auditing object has the service processing authority or prompt information that the auditing object does not have the service processing authority.
2. The method of claim 1, wherein the obtaining the plurality of target tiles associated with the audit object from the traffic volume chain based on the query information comprises:
acquiring a logistics object and a production object which are associated with the auditing object;
acquiring a target block corresponding to the auditing object, a target block corresponding to the logistics object and a target block corresponding to the production object from the business full chain;
and determining transaction certificate data in a target block corresponding to the auditing object, logistics data in the target block corresponding to the logistics object and production data in the target block corresponding to the production object as the business flow data.
3. The method according to claim 2, wherein auditing the association relationship between the plurality of business process data, and generating feedback information of the business processing rights for the auditing object according to the auditing result, comprises:
When the transaction acceptance object contained in the transaction certificate data is detected to be the production object, determining that the auditing object and the production object have a transaction association relation, and detecting an object receiving object and an object sending object contained in the logistics data;
when the object receiving object is detected to be the auditing object and the object sending object is detected to be the production object, determining that an object matching association relationship is arranged among the logistics object, the production object and the auditing object, and comparing the transmission object attribute contained in the logistics data, the production object attribute contained in the production data and the transaction object attribute contained in the transaction certificate data;
and when the transmission object attribute, the production object attribute and the transaction object attribute are equal to each other, determining that the logistics object, the production object and the transaction initiating object have object matching association relations, and generating the confirmation information.
4. The method according to claim 2, wherein auditing the association relationship between the plurality of business process data, and generating feedback information of the business processing rights for the auditing object according to the auditing result, comprises:
Detecting the transaction time of the transaction certificate data, the logistics time of the logistics data and the production time of the production data;
and generating the confirmation information when the transaction time, the logistics time and the generation time meet the time association relation on a time axis.
5. The method of claim 1, wherein the management node holds a key pair of a data commit node to which each data to be uplinked respectively belongs; the key pair comprises a private key and a secret key of the data submitting node; the generating a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of to-be-uplink data includes:
decrypting the data to be uplink carried by each uplink request based on a private key of a data submitting node to which the data to be uplink belongs, so as to obtain signature and business flow data in the data to be uplink;
decrypting the corresponding signatures based on the public key of the data submitting node to which each piece of data to be uplink belongs, so as to obtain a first hash value in each signature;
performing hash operation on each business process data based on a hash algorithm to obtain a second hash value corresponding to each business process data;
When each first hash value is detected to be the same as the corresponding second hash value, the signature verification passes, and the target blocks are generated according to the data to be uplink.
6. The method of claim 1, wherein the generating a plurality of target blocks from the plurality of data to be uplinked, adding the plurality of target blocks to a traffic full chain, comprises:
encrypting the included business process data based on the public key corresponding to the data submitting node to which each piece of data to be uplink belongs to obtain encrypted data corresponding to each piece of business process data;
and generating target blocks corresponding to the business process data respectively according to the encrypted data corresponding to the business process data respectively, and adding the target blocks corresponding to the business process data respectively to the business full chain.
7. The method of claim 1, wherein adding the plurality of target tiles to a traffic full chain comprises:
generating index values corresponding to each target block in the target blocks based on a block height increment mechanism, and storing mapping relations between each index value and corresponding data submitting nodes into an index mapping table;
Adding said each target block having said index value to said traffic full chain.
8. A blockchain network-based data auditing apparatus for use with a management node, comprising:
the first acquisition module is used for acquiring uplink requests respectively corresponding to a plurality of pieces of to-be-uplink data associated with the auditing object, generating a plurality of target blocks according to the uplink requests respectively corresponding to the plurality of pieces of to-be-uplink data, and adding the plurality of target blocks to a business full-quantity chain; the uplink request carries the data to be uplink; the data to be uplink comprises business flow data; the business full chain is used for storing blocks corresponding to all business flow data; the blocks corresponding to all the business process data comprise the target blocks;
the second acquisition module is used for acquiring the plurality of target blocks associated with the auditing object from the business full chain according to the inquiry information when the inquiry information of the business processing permission of the auditing object sent by the request terminal is received, and acquiring the association relation between the business process data respectively included in the plurality of target blocks;
The auditing module is used for auditing the association relations among the plurality of business process data, generating feedback information of the business processing authorities of the auditing objects according to auditing results, and sending the feedback information to the request terminal; the feedback information comprises confirmation information that the auditing object has the service processing authority or prompt information that the auditing object does not have the service processing authority.
9. A computer device comprising a memory and a processor, the memory storing a computer program that, when executed by the processor, causes the processor to perform the steps of the method of any of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method of any of claims 1-7.
CN201910906437.4A 2019-09-24 2019-09-24 Data auditing method and device based on blockchain network Active CN110599322B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910906437.4A CN110599322B (en) 2019-09-24 2019-09-24 Data auditing method and device based on blockchain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910906437.4A CN110599322B (en) 2019-09-24 2019-09-24 Data auditing method and device based on blockchain network

Publications (2)

Publication Number Publication Date
CN110599322A CN110599322A (en) 2019-12-20
CN110599322B true CN110599322B (en) 2023-05-26

Family

ID=68862909

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910906437.4A Active CN110599322B (en) 2019-09-24 2019-09-24 Data auditing method and device based on blockchain network

Country Status (1)

Country Link
CN (1) CN110599322B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113572715B (en) * 2020-04-29 2023-01-31 青岛海尔洗涤电器有限公司 Data transmission method and system based on block chain
CN111639857B (en) * 2020-05-29 2024-06-28 中国平安财产保险股份有限公司 Order intelligent auditing method and device, electronic equipment and storage medium
CN111783144A (en) * 2020-08-20 2020-10-16 支付宝(杭州)信息技术有限公司 Data processing method and device based on block chain
CN114726736B (en) * 2020-12-18 2023-12-05 中国联合网络通信集团有限公司 Data supervision method, first supervision node, supervised node and data supervision device

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016201961A1 (en) * 2015-06-19 2016-12-22 中兴通讯股份有限公司 Image data processing method and device
CN110213357A (en) * 2019-05-22 2019-09-06 深圳壹账通智能科技有限公司 Business datum backing method, device, computer equipment and storage medium
CN110245186A (en) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 A kind of method for processing business and relevant device based on block chain
CN110263085A (en) * 2019-04-23 2019-09-20 阿里巴巴集团控股有限公司 Data processing system, method, calculating equipment and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2016201961A1 (en) * 2015-06-19 2016-12-22 中兴通讯股份有限公司 Image data processing method and device
CN110263085A (en) * 2019-04-23 2019-09-20 阿里巴巴集团控股有限公司 Data processing system, method, calculating equipment and storage medium based on block chain
CN110245186A (en) * 2019-05-21 2019-09-17 深圳壹账通智能科技有限公司 A kind of method for processing business and relevant device based on block chain
CN110213357A (en) * 2019-05-22 2019-09-06 深圳壹账通智能科技有限公司 Business datum backing method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110599322A (en) 2019-12-20

Similar Documents

Publication Publication Date Title
CN110599322B (en) Data auditing method and device based on blockchain network
Hasan et al. Blockchain-based proof of delivery of physical assets with single and multiple transporters
KR102502247B1 (en) Safe and Traceable Manufacturing Parts
CN110601856B (en) Data interaction method and device based on block chain network
US20200043001A1 (en) Pet Food Traceability System and Method Therefor
WO2020001105A1 (en) Blockchain-based data verification method and apparatus, and electronic device
CN107431622A (en) The blocking tracking in supply chain occurs
CN107636662A (en) Web content certification
CN110493268B (en) Data processing method, device and equipment based on block chain network and storage medium
AU2020279093A1 (en) Method and system for generalized provenance solution for blockchain supply chain applications
CN112328689A (en) Universal asset business ecosystem based on block chain
US11304059B2 (en) Techniques for determining authenticity of an item
CN110599107B (en) Logistics data processing method and device based on block chain
US11516001B2 (en) Method and system for generalized provenance solution for blockchain supply chain applications
CN108537047B (en) Method and device for generating information based on block chain
CN111095863A (en) Block chain based system and method for communicating, storing and processing data over a block chain network
Singhal et al. Anti-counterfeit product system using blockchain technology
CN116777476A (en) Medicine credible tracing method based on public key searchable encryption
JP2008004042A (en) Method of electronic commerce
CN110349322B (en) Invoice data verification method, device and equipment
US20200175512A1 (en) Key Generation in Secure Electronic Payment Systems
CN112070567A (en) Quality control system based on block chain and control method thereof
KR102346085B1 (en) Method for Trading Ownership of Products
CN114298698A (en) Transaction settlement method and device
KR102347272B1 (en) Method for Authenticating Ownership of Products

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant