CN110879835A - Data processing method, device and equipment based on block chain and readable storage medium - Google Patents

Data processing method, device and equipment based on block chain and readable storage medium Download PDF

Info

Publication number
CN110879835A
CN110879835A CN201911200611.XA CN201911200611A CN110879835A CN 110879835 A CN110879835 A CN 110879835A CN 201911200611 A CN201911200611 A CN 201911200611A CN 110879835 A CN110879835 A CN 110879835A
Authority
CN
China
Prior art keywords
electronic contract
contract
target
legal
asset transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911200611.XA
Other languages
Chinese (zh)
Other versions
CN110879835B (en
Inventor
蔡弋戈
秦青
杨晨
王乐庆
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911200611.XA priority Critical patent/CN110879835B/en
Publication of CN110879835A publication Critical patent/CN110879835A/en
Application granted granted Critical
Publication of CN110879835B publication Critical patent/CN110879835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The application discloses a data processing method, a device, equipment and a readable storage medium based on a block chain, which belong to the technical field of computers, and the method comprises the following steps: acquiring a first electronic contract sent by a first user terminal, and linking the first electronic contract to a block chain; acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier; and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification. By the adoption of the method and the device, efficiency of finding default data can be improved.

Description

Data processing method, device and equipment based on block chain and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method, apparatus, device, and readable storage medium based on a block chain.
Background
With the development of computer technology, paperless office work becomes possible, and electronic contracts are produced accordingly. Compared with an electronic contract, the traditional paper contract has volatility, so that the electronic contract can better meet the requirements of people.
In the prior art, the default provision is searched from the electronic contract, which mainly depends on comparing the evidence text with the electronic contract manually, and the manual searching mode consumes more manpower and time, so that the efficiency of searching the default provision is low.
Content of application
The application provides a data processing method, a device and equipment based on a block chain and a readable storage medium, which can improve the efficiency of searching default data.
In one aspect, an embodiment of the present invention provides a data processing method based on a block chain, including:
acquiring a first electronic contract sent by a first user terminal, and linking the first electronic contract to a block chain;
acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
verifying the validity of the second electronic contract according to the target block;
if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification.
The digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on the private key of the first user terminal;
the obtaining a first electronic contract and linking the first electronic contract to a blockchain includes:
acquiring a public key of the first user terminal, the first electronic contract and the digital signature;
verifying the digital signature of the first electronic contract based on the public key;
and if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
Wherein the verifying the validity of the second electronic contract according to the target block comprises:
determining a first hash value of the first electronic contract based on the target block;
determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract has validity.
Wherein, the identifying the key evidence information in the evidence information includes:
acquiring a general default keyword;
matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified which are matched with the general default keywords from the evidence information;
identifying the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified and the contract object identifier text to be verified;
and determining the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier as the key evidence information.
Wherein, the searching the default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier includes:
acquiring the general default keywords;
matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source texts, legal asset transfer texts and legal contract object identification texts which are matched with the general default keywords from the second electronic contract;
identifying a legal time interval, a legal asset transfer amount and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text and the legal contract object identifier text;
and matching the key evidence information with the legal time interval, the legal asset transfer amount and the legal contract object identification to determine the default data.
Wherein the matching the key evidence information with the legal time interval, the legal asset transfer amount and the legal contract object identifier to determine the default data includes:
matching the behavior occurrence timestamp with the legal time interval, and determining the behavior occurrence timestamp outside the legal time interval as first difference data;
matching the target asset transfer amount with the legal asset transfer amount, and determining the target asset transfer amount different from the legal asset transfer amount as second difference data;
matching the target contract object identification with the legal contract object identification, and determining a target contract object identification different from the legal contract object identification as third difference data;
searching for clause information respectively corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract;
and determining the searched clause information as the default data of the second electronic contract.
Wherein, still include:
determining the number of default clauses of the second electronic contract based on the default data;
if the number of the default clauses is larger than or equal to the threshold value, returning the default data and the number of the default clauses to the second user terminal;
if the number of the default clauses is smaller than the threshold value, generating error information, and returning the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
An embodiment of the present application provides a data processing apparatus based on a block chain, including:
the uplink module is used for acquiring a first electronic contract sent by a first user terminal and uplink the first electronic contract to a block chain;
the acquisition module is used for acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
the verification module is used for verifying the validity of the second electronic contract according to the target block;
the identification module is used for identifying key evidence information in the evidence information if the second electronic contract has validity; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and the searching module is used for searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier.
The digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on the private key of the first user terminal;
the above-mentioned chain module includes:
a first obtaining unit, configured to obtain a public key of the first user terminal, the first electronic contract, and the digital signature;
the signature verification unit is used for verifying the digital signature of the first electronic contract based on the public key;
and the adding unit is used for generating a block according to the first electronic contract and adding the block into the block chain if the digital signature is a legal signature.
Wherein, above-mentioned verification module includes:
a first determination unit configured to determine a first hash value of the first electronic contract based on the target block;
the first determining unit is further configured to determine a second hash value of the second electronic contract;
and a second determining unit configured to determine that the second electronic contract is valid if the first hash value is the same as the second hash value.
Wherein, above-mentioned identification module includes:
a second obtaining unit, configured to obtain a general default keyword;
a first matching unit, configured to match a plurality of text fields in the evidence information according to the general default keyword, and search, from the evidence information, a time source text to be verified, an asset transfer text to be verified, and a contract object identification text to be verified that are matched with the general default keyword;
a first identification unit, configured to identify the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified, and the contract object identifier text to be verified;
a third determining unit, configured to determine the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier as the key evidence information.
Wherein, the searching module comprises:
a third obtaining unit, configured to obtain the general default keyword;
a second matching unit, configured to match a plurality of text fields in the second electronic contract according to the general default keyword, and search, from the second electronic contract, a legal time source text, a legal asset transfer text, and a legal contract object identification text that match the general default keyword;
a second identification unit, configured to identify a legal time interval, a legal asset transfer amount, and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text, and the legal contract object identifier text;
and a third matching unit, configured to match the key evidence information with the legal time interval, the legal asset transfer amount, and the legal contract object identifier, and determine the default data.
Wherein, the third matching unit includes:
a matching subunit, configured to match the behavior occurrence timestamp with the legal time interval, and determine a behavior occurrence timestamp outside the legal time interval as first difference data;
the matching subunit is further configured to match the target asset transfer amount with the legal asset transfer amount, and determine a target asset transfer amount different from the legal asset transfer amount as second difference data;
the matching subunit is further configured to match the target contract object identifier with the legal contract object identifier, and determine a target contract object identifier different from the legal contract object identifier as third difference data;
a searching subunit, configured to search, in the second electronic contract, clause information corresponding to the first difference data, the second difference data, and the third difference data, respectively;
and the determining subunit is configured to determine the found clause information as the default data of the second electronic contract.
Wherein, still include:
a determining module, configured to determine a default amount of money of the second electronic contract based on the default data;
a returning module, configured to return the default data and the default clause number to the second user terminal if the default clause number is greater than or equal to a threshold;
the returning module is further configured to generate error information and return the error information to the second user terminal if the number of default terms is smaller than a threshold; the error information is used for prompting that the evidence information is invalid evidence.
An aspect of an embodiment of the present application provides a computer device, including: a processor and a memory;
the memory stores a computer program that, when executed by the processor, causes the processor to perform the method as in the embodiments of the present application.
An aspect of the embodiments of the present application provides a computer-readable storage medium, in which a computer program is stored, where the computer program includes program instructions, and the program instructions, when executed by a processor, perform a method as in the embodiments of the present application.
The method includes the steps that a first electronic contract sent by a first user terminal is obtained, and the first electronic contract is linked to a block chain; acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier; and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification. In the above description, by acquiring the first electronic contract and linking the first electronic contract, the nonvolatile property and the non-tamper resistance of the first electronic contract can be ensured, and by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, it can be verified whether the second electronic contract is valid, and the efficiency of verifying the contract can be improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a diagram of a network architecture provided by an embodiment of the present application;
fig. 2a is a schematic scene diagram of a data processing method based on a block chain according to an embodiment of the present application;
fig. 2b is a schematic view of a scene of another data processing method based on a block chain according to an embodiment of the present application;
fig. 3 is a schematic flowchart of a data processing method based on a block chain according to an embodiment of the present application;
fig. 4a and fig. 4b are schematic diagrams of a scenario provided by an embodiment of the present application;
fig. 5 is a schematic flow chart of block link point return information according to an embodiment of the present disclosure;
fig. 6 is a schematic structural diagram of a data processing apparatus based on a block chain according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Fig. 1 is a diagram of a network architecture according to an embodiment of the present application. As shown in fig. 1, the network architecture may include a block chain node and a user terminal cluster, where the user terminal cluster may include a plurality of user terminals, as shown in fig. 1, and specifically may include a user terminal 100a, a user terminal 100b, user terminals 100c and …, and a user terminal 100 n.
As shown in fig. 1, the user terminal 100a, the user terminal 100b, the user terminals 100c, …, and the user terminal 100n may respectively have a network connection with the above-mentioned blockchain node, so that each user terminal may perform data interaction with the blockchain node through the network connection.
As shown in fig. 1, each ue in the ue cluster may be integrally installed with a target application, and when the target application runs in each ue, the target application may respectively interact with the block link points shown in fig. 1. The target application may include an application having a function of displaying data information such as text, images, audio, and video.
In the embodiment of the present application, one user terminal may be selected from the multiple user terminals shown in fig. 1 as a target user terminal, where the target user terminal may include: and intelligent terminals with data information display and playing functions are carried by smart phones, tablet computers, desktop computers and the like. For example, in the embodiment of the present application, the user terminal 100a shown in fig. 1 may be used as the target user terminal, and the target user terminal may be integrated with the target application, and at this time, the target user terminal may implement data interaction between a service data platform corresponding to the target application and a block link point.
Please refer to fig. 2a, which is a scene diagram illustrating a data processing method based on a block chain according to an embodiment of the present application. In fig. 2a, a user terminal 100a may be a first user terminal, and after a target application is accessed by a first user in the user terminal 100a, the first user may upload a first electronic contract that the first user wants to store in the target application, where the first electronic contract carries a digital signature obtained by the user terminal 100a performing signature based on a private key, and after receiving the first electronic contract, a blockchain node may verify the digital signature based on a public key of the user terminal, and after the verification passes, confirm that the digital signature is a legal signature. The ue 100a may send the first electronic contract to a blockchain node, which may generate a block 1001 according to the first electronic contract, and the blockchain node may add the block 1001 to the blockchain 100 to complete the uplink process for the first electronic contract, that is, after uplink, the first electronic contract is stored in the blockchain 100.
Further, please refer to fig. 2b, which is a schematic view of another block chain-based data processing method according to an embodiment of the present application. In fig. 2b, the user terminal 100b may be a second user terminal, and after the second user accesses the target application in the user terminal 100b, the second user may upload a second electronic contract and evidence information that the second user wants to verify in the target application, where the second electronic contract may be a duplicate of the first electronic contract in fig. 2a, and then the second electronic contract may be matched with the first electronic contract to complete the verification, so as to verify the authenticity of the second electronic contract; the evidence information may be additional evidence provided for any contract object in the first electronic contract to prove that another contract object violates contractual provisions. If the first electronic contract is a contract signed by the object a and the object B, and the object B violates the rules of the first electronic contract, the object a may use an event that the object B violates the rules as the evidence information, the object a may submit the second electronic contract and the evidence information to the second user, and the second user may send the second electronic contract and the evidence information to the blockchain node through the second user terminal to determine whether the object B violates the contract. As shown in fig. 2b, the user terminal 100b may send the second electronic contract and the evidence information to a blockchain node, the blockchain node may obtain a block 1001 containing the first electronic contract from the blockchain 100, determine a hash value of the first electronic contract according to the block 1001, the blockchain node may calculate the hash value of the second electronic contract based on the obtained second electronic contract, the blockchain node may compare the hash value of the first electronic contract with the hash value of the second electronic contract, and if the two hash values are the same, prove that the contents of the second electronic contract and the first electronic contract are consistent, may determine that the second electronic contract is not tampered, and may determine that the second electronic contract has validity. Subsequently, the block link point may identify key evidence information of the evidence information, where the key evidence information may include a behavior occurrence timestamp (e.g., a rule for which time and date object B violates a specific time and date), a target asset transfer amount (e.g., specific asset data that object B should transfer to object a), and a target contract object (e.g., object a or object B or other object such as a house, an antique, etc.), and the block link point may find, from the second electronic contract, that object B specifically violates the term information in the second electronic contract, which is the breach data of the second electronic contract, according to the behavior occurrence timestamp, the target asset transfer amount, and the target contract object.
Please refer to fig. 3, which is a flowchart illustrating a data processing method based on a block chain according to an embodiment of the present application. As shown in fig. 3, the data processing method may include:
step S101, obtain a first electronic contract sent by a first user terminal, and uplink the first electronic contract to a block chain.
In the application, the first electronic contract carries a digital signature obtained by signing the first user terminal based on a private key, after the block chain node acquires the first electronic contract, the first electronic contract can be checked based on a public key of the first user terminal, if the first electronic contract is verified successfully, the digital signature is a legal signature, the block chain node can generate a block according to the first electronic contract, the block is added into a block chain, and uplink of the first electronic contract is completed.
Step S102, obtaining a second electronic contract and evidence information sent by a second user terminal, and obtaining a block including the first electronic contract from the block chain as a target block.
In the present application, the second electronic contract is copy information of the first electronic contract, and the evidence information may be additional evidence provided for any contract object in the first electronic contract, and the additional evidence is used for proving that another contract object in the second electronic contract violates contract rules in the second electronic contract. For example, if the first electronic contract is a contract signed by object a and object B, and object B violates the rule of the first electronic contract, object a may use an event that object B violates the rule as evidence information, object a may submit a duplicate contract (second electronic contract) of the first electronic contract and the evidence information to the second user, the second user may upload the second electronic contract and the evidence information to the second user terminal, the second user terminal may send the second electronic contract and the evidence information to a block chain node, and the block chain node may obtain the block generated according to the first electronic contract from a block chain as a target block.
Step S103, verifying the validity of the second electronic contract according to the target block.
In this application, the block chain node may determine the first hash value of the first electronic contract according to the obtained target block, the block chain node may calculate the second hash value of the second electronic contract according to the second electronic contract, the block chain node may compare the first hash value with the second hash value, if the first hash value is the same as the second hash value, it may be determined that the contents of the second electronic contract and the first electronic contract are consistent, it may be determined that the second electronic contract has not been tampered, and the second electronic contract has validity.
Step S104, if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identification.
In this application, the key evidence information may include a behavior occurrence timestamp, a target asset transfer amount, and a target contract object identifier, wherein the behavior occurrence timestamp may include a contract object in the second electronic contract, such as the contract object may be object a or object B or house M or value item N, the behavior occurrence timestamp may be an occurrence time of a violation of the term information in the second electronic contract, and the target asset transfer amount may be asset data in the second electronic contract.
The blockchain node can acquire a general default keyword from the database, the general default keyword can be preset in advance and stored in the database, the general default keyword can be a text representing time and date (such as xx month xx day), a text representing asset data (such as sensitive vocabularies including ten-thousand yuan, house collateral deposit, deal amount and the like) and a text representing an object (such as name a, building B, object C and the like), the blockchain node can match a plurality of text fields in the evidence information according to the general default keyword, search the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified which are matched with the general default keyword from the evidence information, and search the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified based on the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified, the block link point can identify key evidence information of the evidence information, namely, the action occurrence timestamp, the target asset transfer amount and the target contract object identifier.
Step S105, searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier.
In this application, the default data refers to the term information determined by the blockchain node in the second electronic contract based on the key evidence information, where the term information is the contract term violated by the contract object, for example, if term 3 in the second electronic contract is between 2/month 2/2017 and 2/month 2/2019, object B in the second electronic contract needs to transfer 10 ten thousand dollars of assets to object a, and the key evidence information identified by the blockchain node based on the evidence information provided by object a is a behavior occurrence timestamp 2019.7.5, and the target asset transfer amount is 0, it can indicate that object B has not transferred assets to object a until 7/month 5/2019, and it can be determined that object B violates term 3 of the second electronic contract, and then term 3 is the default data.
The blockchain node can acquire the general default keyword from a database, match a plurality of text fields of the second electronic contract according to the general default keyword, search legal time source texts, legal asset transfer texts and legal contract object identification texts which are matched with the general default keyword from the second electronic contract, identify legal time intervals, legal asset transfer amounts and legal contract object identifications of the second electronic contract according to the legal time source texts, the legal asset transfer texts and the legal contract object identification texts, the blockchain node can identify the legal time intervals, the legal asset transfer amounts and the legal contract object identifications of the second electronic contract, the blockchain node can match the behavior occurrence timestamps with the legal time intervals, determine behavior occurrence timestamps outside the legal time intervals as first difference data, and the blockchain node can match the target transfer amounts with the legal asset transfer amounts, determining a target asset transfer amount different from the legal asset transfer amount as second difference data, determining the target contract object identifier and the legal contract object identifier by the block link point as third difference data, and finding clause information respectively corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract by the block link point, wherein the clause information is default data of the second electronic contract.
In the above description, by acquiring the first electronic contract and linking the first electronic contract, the nonvolatile property and the non-tamper resistance of the first electronic contract can be ensured, and by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, it can be verified whether the second electronic contract is valid, and the efficiency of verifying the contract can be improved.
Please refer to fig. 4a and fig. 4b, which are schematic views of a scene provided in the embodiment of the present application. As shown in fig. 4a, a first ue may send a first electronic contract 1000 to a blockchain node, where the first electronic contract 1000 includes a plurality of clause information, contract objects are an object a and an object B, a blockchain node may generate a block 1001 according to the first electronic contract 1000, and the blockchain node may add the block 1001 to the blockchain 100, so that the first electronic contract 1000 is linked to the blockchain 100, where a specific link process of the first electronic contract 1000 may refer to step S101 in the embodiment corresponding to fig. 3, which is not described herein again. As shown in fig. 4b, the second user terminal may send the second electronic contract 2000 and the evidence information 3000 to the blockchain node, where the second electronic contract 2000 and the first electronic contract 1000 include the same terms, after the blockchain node receives the second electronic contract 2000, the second hash value of the second electronic contract 2000 may be calculated, the blockchain node may obtain the block 1001 including the first electronic contract 1000 from the blockchain 100, based on the block 1001, the blockchain node may determine the first hash value of the first electronic contract 1000, the blockchain node may compare the first hash value with the second hash value, and if the comparison result is the same, it may be determined that the content of the second electronic contract 2000 has not been tampered, it may be determined that the second electronic contract 2000 has validity, as shown in fig. 4b, the second electronic contract 2000 and the content of the first electronic contract 1000 are the same, therefore, if the comparison results are the same, the block link points determine the to-be-verified text 3001 of the evidence information 3000 based on the general default keywords, and based on the to-be-verified text 3001, the block link points may identify the key evidence information 3002 of the evidence information 3000, where the specific implementation manner of identifying the key evidence information 3002 from the evidence information 3000 may refer to step S104 in the embodiment corresponding to fig. 3, and details thereof are not repeated. Subsequently, the block link point may determine the key term information 3003 from the second electronic contract 2000 based on the general default keyword, where the key term information 3003 includes a legal time interval, a legal asset transfer amount, and a legal contract object identifier, and a specific implementation manner of determining the key term information 3003 from the second electronic contract 2000 may refer to the description in step S105 in the embodiment corresponding to fig. 3, which is not described herein again. Subsequently, the block link point may match the key term information 3003 with the key evidence information 3002 to determine default data of the second electronic contract 1000. The specific implementation manner of determining the default data of the second electronic contract 1000 may refer to step S105 in the embodiment corresponding to fig. 3, which is not described herein again.
Fig. 5 is a schematic flow chart illustrating a block link point return message according to an embodiment of the present disclosure. As shown in fig. 5, the process may include:
step S201, determining the default amount of money of the second electronic contract based on the default data.
In this application, the default data may be the clause information of the second electronic contract, and the block link points may count the default clause amount.
Step S202, if the number of the default clauses is greater than or equal to the threshold, returning the default data and the number of the default clauses to the second user terminal.
In this application, the threshold may be 1, and when the default amount of money is greater than or equal to 1, the block link point may return the default data and the default amount of terms to the second user terminal together, so that the second user corresponding to the second user terminal sees the information of the second electronic contract specifically violated by the evidence in the evidence information.
Step S203, if the number of the default clauses is less than the threshold value, generating error information, and returning the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
In this application, when the default amount of money is less than 1, which represents that the evidence information is not enough to prove that the second electronic contract is violated, the block link point may generate an error message to return to the second user terminal, so that the second user can check that the evidence information is an invalid evidence.
In the above description, by acquiring the first electronic contract and linking the first electronic contract, the nonvolatile property and the non-tamper resistance of the first electronic contract can be ensured, and by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, it can be verified whether the second electronic contract is valid, and the efficiency of verifying the contract can be improved.
Further, please refer to fig. 6, which is a schematic structural diagram of a data processing apparatus based on a block chain according to an embodiment of the present application. As shown in fig. 6, the data processing apparatus 1 may include: a chain loading module 11, an acquisition module 12, a verification module 13, an identification module 14 and a search module 15.
A uplink module 11, configured to obtain a first electronic contract sent by a first user equipment, and uplink the first electronic contract to a block chain;
an obtaining module 12, configured to obtain a second electronic contract and evidence information sent by a second user terminal, and obtain a block including the first electronic contract from the block chain, where the block is used as a target block;
a verification module 13, configured to verify validity of the second electronic contract according to the target block;
an identification module 14, configured to identify key evidence information in the evidence information if the second electronic contract has validity; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and the searching module 15 is configured to search the default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier.
The specific implementation manners of the uplink module 11, the obtaining module 12, the verifying module 13, the identifying module 14 and the searching module 15 can refer to steps S101 to S105 in the embodiment corresponding to fig. 3, which are not described herein again.
Referring to fig. 6, the uplink module 11 may include a first obtaining unit 111, an identifying unit 112, and an adding unit 113.
A first obtaining unit 111, configured to obtain a public key of the first user terminal, the first electronic contract, and the digital signature;
a signature verification unit 112, configured to verify the digital signature of the first electronic contract based on the public key;
an adding unit 113, configured to generate a block according to the first electronic contract if the digital signature is a valid signature, and add the block to the block chain.
The specific implementation manners of the first obtaining unit 111, the signature verification unit 112, and the adding unit 113 may refer to step S101 in the embodiment corresponding to fig. 3, which is not described herein again.
Referring to fig. 6, the verification module 13 may include: a first determining unit 131 and a second determining unit 132.
A first determining unit 131, configured to determine a first hash value of the first electronic contract based on the target block;
the first determining unit 131 is further configured to determine a second hash value of the second electronic contract;
a second determining unit 132, configured to determine that the second electronic contract is valid if the first hash value is the same as the second hash value.
The specific implementation manners of the first determining unit 131 and the second determining unit 132 can refer to step S103 in the embodiment corresponding to fig. 3, and are not described herein again.
Referring to fig. 6, the identification module 14 may include: a second obtaining unit 141, a first matching unit 142, a first identifying unit 143, and a third determining unit 144.
A second obtaining unit 141, configured to obtain a general default keyword;
a first matching unit 142, configured to match a plurality of text fields in the evidence information according to the general default keyword, and search, from the evidence information, a time source text to be verified, an asset transfer text to be verified, and a contract object identification text to be verified that are matched with the general default keyword;
a first identifying unit 143, configured to identify the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified, and the contract object identifier text to be verified;
a third determining unit 144, configured to determine the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier as the key evidence information.
The specific implementation manners of the second obtaining unit 141, the first matching unit 142, the first identifying unit 143, and the third determining unit 144 may refer to step S104 in the embodiment corresponding to fig. 3, and are not described herein again.
Referring to fig. 6, the lookup module 15 may include: a third acquiring unit 151, a second matching unit 152, a second identifying unit 153, and a third matching unit 154.
A third obtaining unit 151, configured to obtain the general default keyword;
a second matching unit 152, configured to match a plurality of text fields in the second electronic contract according to the general default keyword, and search, from the second electronic contract, a legal time source text, a legal asset transfer text, and a legal contract object identification text that match the general default keyword;
a second identifying unit 153, configured to identify a legal time interval, a legal asset transfer amount, and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text, and the legal contract object identifier text;
a third matching unit 154, configured to match the key evidence information with the legal time interval, the legal asset transfer amount, and the legal contract object identifier, and determine the default data.
The specific implementation manner of the third obtaining unit 151, the second matching unit 152, the second identifying unit 153, and the third matching unit 154 may refer to step S105 in the embodiment corresponding to fig. 3, and is not described herein again.
Referring to fig. 6, the third matching unit 154 may include: matching subunit 1541, finding subunit 1542, and determining subunit 1543.
A matching subunit 1541, configured to match the behavior occurrence timestamp with the legal time interval, and determine a behavior occurrence timestamp outside the legal time interval as first difference data;
the matching subunit 1541 is further configured to match the target asset transfer amount with the legal asset transfer amount, and determine a target asset transfer amount different from the legal asset transfer amount as second difference data;
the matching subunit 1541 is further configured to match the target contract object identifier with the legal contract object identifier, and determine a target contract object identifier different from the legal contract object identifier as third difference data;
a searching subunit 1542, configured to search, in the second electronic contract, clause information corresponding to the first difference data, the second difference data, and the third difference data, respectively;
a determining subunit 1543, configured to determine the found clause information as the default data of the second electronic contract.
The specific implementation manners of the matching subunit 1541, the searching subunit 1542 and the determining subunit 1543 can refer to step S105 in the embodiment corresponding to fig. 3, which is not described herein again.
Referring to fig. 6, the data processing apparatus 1 may include a uplink module 11, an acquisition module 12, a verification module 13, an identification module 14, and a search module 15, and may further include a determination module 16 and a return module 17.
A determining module 16, configured to determine a default amount of money of the second electronic contract based on the default data;
a returning module 17, configured to return the default data and the default clause number to the second user terminal if the default clause number is greater than or equal to a threshold value;
the returning module 17 is further configured to generate error information if the number of default terms is smaller than a threshold, and return the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
The specific implementation manner of the determining module and the returning module may refer to steps S201 to S203 in the embodiment corresponding to fig. 5, which is not described herein again.
The method includes the steps that a first electronic contract sent by a first user terminal is obtained, and the first electronic contract is linked to a block chain; acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier; and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification. In the above description, by acquiring the first electronic contract and linking the first electronic contract, the nonvolatile property and the non-tamper resistance of the first electronic contract can be ensured, and by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, it can be verified whether the second electronic contract is valid, and the efficiency of verifying the contract can be improved.
Further, please refer to fig. 7, which is a schematic structural diagram of a computer device according to an embodiment of the present application. As shown in fig. 7, the apparatus 1 in the embodiment corresponding to fig. 6 may be applied to the computer device 1000, and the computer device 1000 may include: the processor 1001, the network interface 1004, and the memory 1005, and the computer apparatus 1000 further includes: a user interface 1003, and at least one communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display) and a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a standard wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may optionally be at least one memory device located remotely from the processor 1001. As shown in fig. 7, a memory 1005, which is a kind of computer-readable storage medium, may include therein an operating system, a network communication module, a user interface module, and a device control application program.
In the computer device 1000 shown in fig. 7, the network interface 1004 may provide a network communication function; the user interface 1003 is an interface for providing a user with input; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
acquiring a first electronic contract sent by a first user terminal, and linking the first electronic contract to a block chain;
acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
verifying the validity of the second electronic contract according to the target block;
if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification.
In one embodiment, the digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
when the processor 1001 executes the above-mentioned obtaining of the first electronic contract and links the first electronic contract into the block chain, the following steps are specifically executed:
acquiring a public key of the first user terminal, the first electronic contract and the digital signature;
verifying the digital signature of the first electronic contract based on the public key;
and if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
In one embodiment, when the processor 1001 performs the verifying the validity of the second electronic contract according to the target block, the following steps are specifically performed:
determining a first hash value of the first electronic contract based on the target block;
determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract has validity.
In an embodiment, when the processor performs the identifying of the key evidence information in the evidence information, the processor specifically performs the following steps:
acquiring a general default keyword;
matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified which are matched with the general default keywords from the evidence information;
identifying the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified and the contract object identifier text to be verified;
and determining the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier as the key evidence information.
In an embodiment, when the processor 1001 searches for default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identifier, specifically perform the following steps:
acquiring the general default keywords;
matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source texts, legal asset transfer texts and legal contract object identification texts which are matched with the general default keywords from the second electronic contract;
identifying a legal time interval, a legal asset transfer amount and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text and the legal contract object identifier text;
and matching the key evidence information with the legal time interval, the legal asset transfer amount and the legal contract object identification to determine the default data.
In one embodiment, when the matching of the key evidence information with the legal time interval, the legal asset transfer amount, and the legal contract object identifier is performed to determine the default data, the processor 1001 specifically performs the following steps:
matching the behavior occurrence timestamp with the legal time interval, and determining the behavior occurrence timestamp outside the legal time interval as first difference data;
matching the target asset transfer amount with the legal asset transfer amount, and determining the target asset transfer amount different from the legal asset transfer amount as second difference data;
matching the target contract object identification with the legal contract object identification, and determining a target contract object identification different from the legal contract object identification as third difference data;
searching for clause information respectively corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract;
and determining the searched clause information as the default data of the second electronic contract.
In one embodiment, the processor 1001 further performs the following steps:
determining the number of default clauses of the second electronic contract based on the default data;
if the number of the default clauses is larger than or equal to the threshold value, returning the default data and the number of the default clauses to the second user terminal;
if the number of the default clauses is smaller than the threshold value, generating error information, and returning the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
The method includes the steps that a first electronic contract sent by a first user terminal is obtained, and the first electronic contract is linked to a block chain; acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier; and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identification. In the above description, by acquiring the first electronic contract and linking the first electronic contract, the nonvolatile property and the non-tamper resistance of the first electronic contract can be ensured, and by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, it can be verified whether the second electronic contract is valid, and the efficiency of verifying the contract can be improved.
Further, here, it is to be noted that: an embodiment of the present application further provides a computer-readable storage medium, where a computer program executed by the aforementioned data processing computer device 1000 is stored in the computer-readable storage medium, and the computer program includes program instructions, and when the processor executes the program instructions, the description of the data processing method in the embodiment corresponding to fig. 3 to fig. 5 can be executed, so that details are not repeated here. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in embodiments of the computer-readable storage medium referred to in the present application, reference is made to the description of embodiments of the method of the present application.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. A data processing method based on a block chain is characterized by comprising the following steps:
acquiring a first electronic contract sent by a first user terminal, and linking the first electronic contract to a block chain;
acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
verifying the validity of the second electronic contract according to the target block;
if the second electronic contract has validity, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier.
2. The method according to claim 1, wherein the digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
the obtaining a first electronic contract and linking the first electronic contract into a blockchain includes:
acquiring a public key of the first user terminal, the first electronic contract and the digital signature;
verifying the digital signature of the first electronic contract based on the public key;
and if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
3. The method of claim 1, wherein verifying the validity of the second electronic contract according to the target block comprises:
determining a first hash value of the first electronic contract based on the target block;
determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract has validity.
4. The method of claim 1, wherein the identifying key evidence information in the evidence information comprises:
acquiring a general default keyword;
matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified which are matched with the general default keywords from the evidence information;
identifying the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified and the contract object identifier text to be verified;
determining the behavior occurrence timestamp, the target asset transfer amount, and the target contract object identification as the key evidence information.
5. The method of claim 4, wherein said finding breach data in the second electronic contract based on the action occurrence timestamp, the target asset transfer amount, and the target contract object identification comprises:
acquiring the general default keywords;
matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source texts, legal asset transfer texts and legal contract object identification texts which are matched with the general default keywords from the second electronic contract;
identifying a legal time interval, a legal asset transfer amount and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text and the legal contract object identifier text;
and matching the key evidence information with the legal time interval, the legal asset transfer amount and the legal contract object identification to determine the default data.
6. The method of claim 5, wherein said matching said key evidence information with said legal time interval, said legal asset transfer amount, and said legal contract object identification to determine said breach data comprises:
matching the behavior occurrence timestamp with the legal time interval, and determining the behavior occurrence timestamp outside the legal time interval as first difference data;
matching the target asset transfer amount with the legal asset transfer amount, and determining the target asset transfer amount different from the legal asset transfer amount as second difference data;
matching the target contract object identification with the legal contract object identification, and determining a target contract object identification different from the legal contract object identification as third difference data;
searching for clause information respectively corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract;
determining the found clause information as the default data of the second electronic contract.
7. The method of claim 1, further comprising:
determining a number of default funds of the second electronic contract based on the default data;
if the number of the default clauses is larger than or equal to the threshold value, returning the default data and the number of the default clauses to the second user terminal;
if the number of default clauses is smaller than the threshold value, generating error information, and returning the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
8. A blockchain-based data processing apparatus, comprising:
the uplink module is used for acquiring a first electronic contract sent by a first user terminal and uplink the first electronic contract to a block chain;
the acquisition module is used for acquiring a second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
a verification module for verifying the validity of the second electronic contract according to the target block;
the identification module is used for identifying key evidence information in the evidence information if the second electronic contract has validity; the key evidence information comprises a behavior occurrence timestamp, a target asset transfer amount and a target contract object identifier;
and the searching module is used for searching default data in the second electronic contract according to the behavior occurrence timestamp, the target asset transfer amount and the target contract object identifier.
9. A computer device, comprising: a processor and a memory;
the memory stores a computer program which, when executed by the processor, causes the processor to perform the steps of the method of any one of claims 1 to 7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method of any of claims 1 to 7.
CN201911200611.XA 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium Active CN110879835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911200611.XA CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911200611.XA CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110879835A true CN110879835A (en) 2020-03-13
CN110879835B CN110879835B (en) 2024-02-09

Family

ID=69729656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911200611.XA Active CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110879835B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231771A (en) * 2020-12-11 2021-01-15 浙江数秦科技有限公司 Block chain-based electronic contract online signing and security method

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180005186A1 (en) * 2016-06-30 2018-01-04 Clause, Inc. System and method for forming, storing, managing, and executing contracts
CN108737403A (en) * 2018-05-10 2018-11-02 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109064120A (en) * 2018-07-10 2018-12-21 马上游科技股份有限公司 Tourism electric contract number deposit system based on region chain and deposit card method
CN109087056A (en) * 2018-06-15 2018-12-25 平安科技(深圳)有限公司 Electronic contract signs method, apparatus and server
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
US20190132350A1 (en) * 2017-10-30 2019-05-02 Pricewaterhousecoopers Llp System and method for validation of distributed data storage systems
CN109992993A (en) * 2019-02-27 2019-07-09 平安科技(深圳)有限公司 Assets information processing method, device, equipment and storage medium based on block chain
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180005186A1 (en) * 2016-06-30 2018-01-04 Clause, Inc. System and method for forming, storing, managing, and executing contracts
US20190132350A1 (en) * 2017-10-30 2019-05-02 Pricewaterhousecoopers Llp System and method for validation of distributed data storage systems
CN108737403A (en) * 2018-05-10 2018-11-02 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109087056A (en) * 2018-06-15 2018-12-25 平安科技(深圳)有限公司 Electronic contract signs method, apparatus and server
CN109064120A (en) * 2018-07-10 2018-12-21 马上游科技股份有限公司 Tourism electric contract number deposit system based on region chain and deposit card method
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN109992993A (en) * 2019-02-27 2019-07-09 平安科技(深圳)有限公司 Assets information processing method, device, equipment and storage medium based on block chain
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231771A (en) * 2020-12-11 2021-01-15 浙江数秦科技有限公司 Block chain-based electronic contract online signing and security method

Also Published As

Publication number Publication date
CN110879835B (en) 2024-02-09

Similar Documents

Publication Publication Date Title
CN109428886B (en) Method and system for review verification and trustworthiness scoring via blockchain
US10250381B1 (en) Content validation using blockchain
CN110674140B (en) Block chain-based content processing method, device, equipment and storage medium
US20230410177A1 (en) Distributed database structures for anonymous information exchange
CN105894028B (en) User identification method and device
US20210168156A1 (en) System and method for verification of reliability and validity of crowd sourcing users
CN115668194A (en) Cross-partition calls in a partition's tamper-resistant data store
US20200320039A1 (en) Systems and methods for data distillation
CN114047854B (en) Information interaction method and device for document processing, electronic equipment and storage medium
CN115114372A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN110879835B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN111639903A (en) Review processing method for architecture change and related equipment
CN109672608B (en) Method for transmitting messages according to time
CN115563942A (en) Contract generation method and device, electronic equipment and computer readable medium
CN108886631B (en) Electronic data inspection system, electronic data inspection method, and storage medium
CN115618304A (en) Data feature code-based domain-undisputed data set publishing method and system
CN108632348B (en) Service checking method and device
CN112434677B (en) Contract auditing method, device, equipment and storage medium
CN109471790A (en) Send nuclear parameter comparison method and device, computer installation and readable storage medium storing program for executing
CN117171185B (en) Logistics data changing method and related equipment based on industrial identification
CN115618120B (en) Public number information pushing method, system, terminal equipment and storage medium
CN117290401B (en) Data transaction method and system
CN115604000B (en) Override detection method, device, equipment and storage medium
CN116862679B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN116861013B (en) CIM data credibility improving method

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant