CN110879835B - Block chain-based data processing method, device, equipment and readable storage medium - Google Patents

Block chain-based data processing method, device, equipment and readable storage medium Download PDF

Info

Publication number
CN110879835B
CN110879835B CN201911200611.XA CN201911200611A CN110879835B CN 110879835 B CN110879835 B CN 110879835B CN 201911200611 A CN201911200611 A CN 201911200611A CN 110879835 B CN110879835 B CN 110879835B
Authority
CN
China
Prior art keywords
electronic contract
contract
legal
target
asset transfer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911200611.XA
Other languages
Chinese (zh)
Other versions
CN110879835A (en
Inventor
蔡弋戈
秦青
杨晨
王乐庆
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911200611.XA priority Critical patent/CN110879835B/en
Publication of CN110879835A publication Critical patent/CN110879835A/en
Application granted granted Critical
Publication of CN110879835B publication Critical patent/CN110879835B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • G06Q50/188Electronic negotiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2151Time stamp

Abstract

The application discloses a data processing method, device, equipment and readable storage medium based on a blockchain, and the application belongs to the technical field of computers, and the method comprises the following steps: acquiring a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain; acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from a block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification; and searching the default data in the second electronic contract according to the behavior occurrence time stamp, the target asset transfer quantity and the target contract object identification. By adopting the method and the device, the efficiency of searching the default data can be improved.

Description

Block chain-based data processing method, device, equipment and readable storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data processing method, apparatus, device and readable storage medium based on a blockchain.
Background
With the development of computer technology, office paperless work has become possible, and electronic contracts have also been developed. Compared with the electronic contract, the traditional paper contract has volatility, so the electronic contract can meet the demands of people.
In the prior art, the method for searching the default terms from the electronic contract mainly relies on manual comparison of the evidence text and the electronic contract, and the manual searching method consumes more manpower and time, so that the efficiency of searching the default terms is low.
Content of the application
The application provides a data processing method, device and equipment based on a blockchain and a readable storage medium, which can improve the efficiency of searching illegal data.
In one aspect, an embodiment of the present application provides a data processing method based on a blockchain, including:
acquiring a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain;
acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
verifying the validity of the second electronic contract according to the target block;
If the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification;
and searching default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identification.
The digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
the obtaining the first electronic contract, and the uplink of the first electronic contract to the blockchain includes:
acquiring the public key of the first user terminal, the first electronic contract and the digital signature;
signing the digital signature of the first electronic contract based on the public key;
if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
Wherein verifying the validity of the second electronic contract according to the target block includes:
determining a first hash value of the first electronic contract based on the target block;
Determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract is valid.
Wherein the identifying key evidence information in the evidence information includes:
acquiring general default keywords;
matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified, which are matched with the general default keywords, from the evidence information;
identifying the behavior occurrence time stamp, the target asset transfer amount and the target contract object identification based on the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified;
and determining the action occurrence time stamp, the target asset transfer quantity and the target contract object identification as the key evidence information.
Wherein searching for default data in the second electronic contract based on the behavior occurrence time stamp, the target asset transfer amount, and the target contract object identifier includes:
Acquiring the general default keywords;
matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source text, legal asset transfer text and legal contract object identification text matched with the general default keywords from the second electronic contract;
based on the legal time source text, the legal asset transfer text and the legal contract object identification text, identifying a legal time interval, a legal asset transfer amount and a legal contract object identification of the second electronic contract;
and matching the key evidence information with the legal time interval, the legal asset transfer quantity and the legal contract object identifier to determine the default data.
Wherein the matching the key evidence information with the legal time interval, the legal asset transfer amount and the legal contract object identifier to determine the default data includes:
matching the behavior occurrence time stamp with the legal time interval, and determining the behavior occurrence time stamp outside the legal time interval as first difference data;
Matching the target asset transfer amount with the legal asset transfer amount, and determining a target asset transfer amount different from the legal asset transfer amount as second difference data;
matching the target contract object identifier with the legal contract object identifier, and determining a target contract object identifier different from the legal contract object identifier as third difference data;
searching for term information corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract;
and determining the searched clause information as the default data of the second electronic contract.
Wherein, still include:
determining the default amount of the second electronic contract based on the default data;
if the default amount is greater than or equal to a threshold value, the default data and the default amount are returned to the second user terminal;
if the number of the default deposit is smaller than a threshold value, generating error information, and returning the error information to the second user terminal; the error message is used for prompting that the evidence information is invalid evidence.
An aspect of an embodiment of the present application provides a data processing apparatus based on a blockchain, including:
The system comprises a first user terminal, a second user terminal, a block chain module and a linking module, wherein the first user terminal is used for sending a first electronic contract to the block chain;
the acquisition module is used for acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
the verification module is used for verifying the validity of the second electronic contract according to the target block;
the identification module is used for identifying key evidence information in the evidence information if the second electronic contract is effective; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification;
and the searching module is used for searching the default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identifier.
The digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
the uplink module includes:
a first obtaining unit configured to obtain a public key of the first user terminal, the first electronic contract, and the digital signature;
The signature verification unit is used for verifying the digital signature of the first electronic contract based on the public key;
and the adding unit is used for generating a block according to the first electronic contract and adding the block into the block chain if the digital signature is legal.
Wherein, the verification module comprises:
a first determining unit configured to determine a first hash value of the first electronic contract based on the target block;
the first determining unit is further configured to determine a second hash value of the second electronic contract;
and a second determining unit configured to determine that the second electronic contract is valid if the first hash value is the same as the second hash value.
Wherein, above-mentioned identification module includes:
the second acquisition unit is used for acquiring general default keywords;
the first matching unit is used for matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified, which are matched with the general default keywords, from the evidence information;
the first identifying unit is used for identifying the action occurrence time stamp, the target asset transfer amount and the target contract object identification based on the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified;
And a third determining unit configured to determine the behavior occurrence time stamp, the target asset transfer amount, and the target contract object identifier as the key evidence information.
Wherein, the above-mentioned searching module includes:
a third obtaining unit, configured to obtain the general default keyword;
the second matching unit is used for matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source texts, legal asset transfer texts and legal contract object identification texts matched with the general default keywords from the second electronic contract;
the second identifying unit is used for identifying the legal time interval, the legal asset transfer amount and the legal contract object identification of the second electronic contract based on the legal time source text, the legal asset transfer text and the legal contract object identification text;
and the third matching unit is used for matching the key evidence information with the legal time interval, the legal asset transfer quantity and the legal contract object identifier to determine the default data.
Wherein the third matching unit includes:
A matching subunit, configured to match the action occurrence timestamp with the legal time interval, and determine an action occurrence timestamp that is outside the legal time interval as first difference data;
the matching subunit is further configured to match the target asset transfer amount with the legal asset transfer amount, and determine a target asset transfer amount different from the legal asset transfer amount as second difference data;
the matching subunit is further configured to match the target contract object identifier with the legal contract object identifier, and determine a target contract object identifier different from the legal contract object identifier as third difference data;
a searching subunit, configured to search, in the second electronic contract, term information corresponding to the first difference data, the second difference data, and the third difference data, respectively;
and a determining subunit configured to determine the found term information as the default data of the second electronic contract.
Wherein, still include:
the determining module is used for determining the default amount of the second electronic contract based on the default data;
the return module is used for returning the default data and the default amount to the second user terminal if the default amount is greater than or equal to a threshold value;
The return module is further configured to generate error information if the number of the default deposit is smaller than a threshold value, and return the error information to the second user terminal; the error message is used for prompting that the evidence information is invalid evidence.
In one aspect, a computer device is provided, including: a processor and a memory;
the memory stores a computer program that, when executed by the processor, causes the processor to perform a method as in the embodiments of the present application.
In one aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program comprising program instructions that, when executed by a processor, perform a method as in embodiments of the present application.
The method comprises the steps of obtaining a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain; acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification; and searching default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identification. As can be seen from the above, by acquiring the first electronic contract and linking the first electronic contract, the non-volatility and the non-tamper-resistance of the first electronic contract can be ensured, by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, whether the second electronic contract is valid or not can be verified, the efficiency of verifying the contract can be improved, and in the case that the second electronic contract is valid, the key evidence information of the evidence information is identified, the key evidence information is matched with the second electronic contract, the default data can be found in the second electronic contract, and the efficiency of finding the default data can be improved.
Drawings
In order to more clearly illustrate the embodiments of the invention or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, it being obvious that the drawings in the following description are only some embodiments of the invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a network architecture diagram provided in an embodiment of the present application;
FIG. 2a is a schematic diagram of a block chain based data processing method according to an embodiment of the present application;
FIG. 2b is a schematic diagram of another exemplary block chain based data processing method according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of a data processing method based on a blockchain according to an embodiment of the present disclosure;
FIGS. 4a and 4b are schematic views of a scenario provided by embodiments of the present application;
FIG. 5 is a schematic flow chart of a block chain node return message provided in an embodiment of the present application;
FIG. 6 is a schematic diagram of a block chain based data processing apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Please refer to fig. 1, which is a network architecture diagram provided in an embodiment of the present application. As shown in fig. 1, the network architecture may include a blockchain node and a user terminal cluster, where the user terminal cluster may include a plurality of user terminals, and as shown in fig. 1, may specifically include a user terminal 100a, a user terminal 100b, a user terminal 100c, …, and a user terminal 100n.
As shown in fig. 1, the user terminals 100a, 100b, 100c, …, 100n may respectively make network connections with the blockchain nodes described above, so that each user terminal may interact with the blockchain nodes through the network connections.
As shown in fig. 1, each user terminal in the user terminal cluster may be integrally provided with a target application, and when the target application runs in each user terminal, data interaction may be performed between each user terminal and the blockchain node shown in fig. 1. The target application may include an application having a function of displaying data information such as text, image, audio, and video.
The embodiment of the present application may select one user terminal from the plurality of user terminals shown in fig. 1 as a target user terminal, where the target user terminal may include: smart phones, tablet computers, desktop computers and the like carry smart terminals with the functions of displaying and playing data information. For example, in the embodiment of the present application, the user terminal 100a shown in fig. 1 may be used as the target user terminal, where the target user terminal may be integrated with the target application, and at this time, the target user terminal may implement data interaction between the service data platform corresponding to the target application and the blockchain node.
Fig. 2a is a schematic diagram of a data processing method based on a blockchain according to an embodiment of the present application. In fig. 2a, the user terminal 100a may be a first user terminal, after the first user accesses a target application in the user terminal 100a, the first user may upload a first electronic contract that the first user wants to store in the target application, where the first electronic contract carries a digital signature obtained by signing the user terminal 100a based on a private key, and after receiving the first electronic contract, the blockchain node may verify the digital signature based on a public key of the user terminal, and after the verification is passed, it is confirmed that the digital signature is a legal signature. The user terminal 100a may send the first electronic contract to a blockchain node, the blockchain node may generate a block 1001 according to the first electronic contract, and the blockchain node may add the block 1001 to the blockchain 100 to complete the uplink process of the first electronic contract, that is, the first electronic contract is stored in the blockchain 100 after uplink.
Further, please refer to fig. 2b, which is a schematic diagram illustrating a scenario of another blockchain-based data processing method according to an embodiment of the present application. In fig. 2b, the user terminal 100b may be a second user terminal, after the second user accesses the target application in the user terminal 100b, the second electronic contract and evidence information that the second user wants to check may be uploaded in the target application, where the second electronic contract may be a duplicate contract of the first electronic contract in fig. 2a, and then the second electronic contract and the first electronic contract may be matched to complete the check, so as to verify the authenticity of the second electronic contract; the evidence information may provide additional evidence for any of the contract objects in the first electronic contract for proving that another contract object violates the contract definition. If the first electronic contract is a contract signed by the object a and the object B, and the object B violates the rule of the first electronic contract, the object a may use an event of the object B violating the rule as evidence information, the object a may submit the second electronic contract and the evidence information to the second user, and the second user may send the second electronic contract and the evidence information to the blockchain node through the second user terminal, so as to determine whether the object B has a violation. As shown in fig. 2b, the user terminal 100b may send the second electronic contract and evidence information to a blockchain node, the blockchain node may obtain a block 1001 including the first electronic contract from the blockchain 100, determine a hash value of the first electronic contract according to the block 1001, calculate the hash value of the second electronic contract based on the obtained second electronic contract, and the blockchain node may compare the hash value of the first electronic contract with the hash value of the second electronic contract, and if the two hash values are the same, prove that the content of the second electronic contract is consistent with the content of the first electronic contract, and may determine that the second electronic contract is not tampered, and may determine that the second electronic contract is valid. Subsequently, the blockchain node may identify key evidence information for the evidence information, where the key evidence information may include a behavior occurrence time stamp (e.g., a specification of at which time and date object B is violated), a target asset transfer amount (e.g., specific asset data to which object B should be transferred to object a), and a target contract object (e.g., object a or object B or other objects such as houses, antiques, etc.), and the blockchain node may find, from the second electronic contract, that the object B is specifically violated the term information in the second electronic contract, which is the violation data of the second electronic contract, based on the behavior occurrence time stamp, the target asset transfer amount, and the target contract object.
Fig. 3 is a flowchart of a data processing method based on a blockchain according to an embodiment of the present application. As shown in fig. 3, the data processing method may include:
step S101, a first electronic contract sent by a first user terminal is obtained, and the first electronic contract is uplink to a block chain.
In the application, the first electronic contract carries a digital signature obtained by signing the first user terminal based on a private key, after the blockchain node obtains the first electronic contract, the first electronic contract can be checked based on a public key of the first user terminal, if verification is successful, the digital signature is legal, the blockchain node can generate a block according to the first electronic contract, and the block is added into a blockchain to finish the uplink of the first electronic contract.
Step S102, obtaining second electronic contract and evidence information sent by a second user terminal, and obtaining a block containing the first electronic contract from the block chain as a target block.
In the application, the second electronic contract is copy information of the first electronic contract, and the evidence information can be additional evidence provided for any contract object in the first electronic contract, wherein the additional evidence is used for proving that another contract object in the second electronic contract violates contract regulation in the second electronic contract. If the first electronic contract is a contract signed by the object a and the object B, and the object B violates the rule of the first electronic contract, the object a may use an event that the object B violates the rule as evidence information, the object a may submit a copy contract (a second electronic contract) of the first electronic contract and the evidence information to the second user, the second user may upload the second electronic contract and the evidence information to the second user terminal, the second user terminal may send the second electronic contract and the evidence information to a blockchain node, and the blockchain node may obtain the block generated according to the first electronic contract from a blockchain as a target block.
Step S103, verifying the validity of the second electronic contract according to the target block.
In the application, the blockchain node can determine the first hash value of the first electronic contract according to the obtained target block, the blockchain node can calculate the second hash value of the second electronic contract according to the second electronic contract, the blockchain node can compare the first hash value with the second hash value, if the first hash value is the same as the second hash value, the consistency of the content of the second electronic contract with the content of the first electronic contract can be determined, the second electronic contract is not tampered, and the second electronic contract has validity.
Step S104, if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information includes a behavior occurrence time stamp, a target asset transfer amount, and a target contract object identification.
In the present application, the key evidence information may include a behavior occurrence time stamp, a target asset transfer amount, and a target contract object identifier, where the behavior occurrence time stamp target contract object identifier may include a contract object in a second electronic contract, for example, the contract object may be an object a or an object B or a house M or a value article N, and the behavior occurrence time stamp may be an occurrence time violating term information in the second electronic contract, and the target asset transfer amount may be asset data in the second electronic contract.
The blockchain node may obtain a general default keyword from the database, the general default keyword may be preset in advance, the general default keyword may be a text representing a time date (such as xx year xx month xx day), a text representing asset data (such as sensitive words of hundred thousand yuan, house collateral deposit, amount of delivery and the like), and a text representing an object (such as person name a, building B, article C and the like), the blockchain node may match a plurality of text fields in the evidence information according to the general default keyword, find a to-be-verified time source text, a to-be-verified asset transfer text and a to-be-verified contract object identification text matched with the general default keyword from the evidence information, and identify key evidence information of the evidence information based on the to-be-verified time source text, the to-be-verified asset transfer text and the to-be-verified contract object identification text, that is, the occurrence time stamp of the behavior, the target asset transfer amount and the target contract object identification.
Step S105, searching the default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer amount and the target contract object identification.
In the present application, the default data refers to term information determined by the blockchain node in the second electronic contract based on the key evidence information, where the term information is a contract term violated by a contract object, for example, if, during a period from 2 nd of 2 months of 2017 to 2 nd of 2019, the object B in the second electronic contract needs to transfer an asset to the object a for 10 ten thousand yuan, and if the key evidence information identified by the blockchain node based on the evidence information provided by the object a is a behavior occurrence timestamp of 2019.7.5 and the target asset transfer amount is 0, it may be indicated that the object B does not transfer an asset to the object a until 5 th of 7 months of 2019, then it may be determined that the object B violates the term 3 of the second electronic contract, and the term 3 is the default data.
The blockchain node can acquire the universal default key word from the database, match a plurality of text fields of the second electronic contract according to the universal default key word, find a legal time source text, a legal asset transfer text and a legal contract object identification text which are matched with the universal default key word from the second electronic contract, and match the target contract object identification with the legal contract object identification according to the legal time source text, the legal asset transfer text and the legal contract object identification text, the blockchain node can identify a legal time interval, a legal asset transfer amount and a legal contract object identification of the second electronic contract, match the behavior occurrence time stamp with the legal time interval, determine the behavior occurrence time stamp which is outside the legal time interval as first difference data, determine the target asset transfer amount which is different from the legal asset transfer amount as second difference data, and determine the target asset transfer amount which is different from the legal asset transfer amount as second contract data, and the blockchain node can match the target contract object identification with the legal contract object identification as second contract object identification, and determine the difference data of the second contract item and the second contract item information which is different from the second contract item information, and the second contract item information which is different from the second contract item information.
As can be seen from the above, by acquiring the first electronic contract and linking the first electronic contract, the non-volatility and the non-tamper-resistance of the first electronic contract can be ensured, by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, whether the second electronic contract is valid or not can be verified, the efficiency of verifying the contract can be improved, and in the case that the second electronic contract is valid, the key evidence information of the evidence information is identified, the key evidence information is matched with the second electronic contract, the default data can be found in the second electronic contract, and the efficiency of finding the default data can be improved.
Please refer to fig. 4a and fig. 4b, which are schematic diagrams of a scenario provided in an embodiment of the present application. As shown in fig. 4a, the first user terminal may send the first electronic contract 1000 to the blockchain node, where the first electronic contract 1000 includes a plurality of item information, the contract objects are object a and object B, the blockchain node may generate a block 1001 according to the first electronic contract 1000, and the blockchain node may add the block 1001 to the blockchain 100, so that the first electronic contract 1000 is uplink to the blockchain 100, where the specific uplink process of the first electronic contract 1000 may refer to step S101 in the embodiment corresponding to fig. 3 and will not be described herein. As shown in fig. 4b, the second user terminal may send the second electronic contract 2000 and the evidence information 3000 to the blockchain node, the second electronic contract 2000 is consistent with terms included in the first electronic contract 1000, the blockchain link point may calculate a second hash value of the second electronic contract 2000 after receiving the second electronic contract 2000, the blockchain node may obtain a block 1001 including the first electronic contract 1000 from the blockchain 100, based on the block 1001, the blockchain node may determine a first hash value of the first electronic contract 1000, the blockchain node may compare the first hash value with the second hash value, if the comparison result is the same, it may be determined that the content of the second electronic contract 2000 is not tampered with, it may be determined that the second electronic contract 2000 has validity, as shown in fig. 4b, and the second electronic contract 2000 is consistent with the content of the first electronic contract 1000, so that the comparison result is the same, the block link point determines the text 3001 to be verified of the evidence information 3000 based on the general breach keyword, and based on the text 3001 to be verified, the block link node may identify the key evidence information 3002 of the evidence information 3000, wherein the specific implementation of identifying the key evidence information 3002 from the evidence information 3000 may refer to step S104 in the embodiment corresponding to fig. 3, which is not repeated herein. Subsequently, the blockchain node may determine the key term information 3003 from the second electronic contract 2000 based on the general default key word, where the key term information 3003 includes a legal time interval, a legal asset transfer amount, and a legal contract object identifier, and a specific implementation manner of determining the key term information 3003 from the second electronic contract 2000 may be referred to the description in step S105 in the embodiment corresponding to fig. 3, which is not described herein. Subsequently, the blockchain node can match the key clause information 3003 with the key evidence information 3002 to determine breach data of the second electronic contract 1000. The specific implementation manner of determining the default data of the second electronic contract 1000 may refer to step S105 in the embodiment corresponding to fig. 3, which is not described herein.
Fig. 5 is a schematic flow chart of a block chain node return message according to an embodiment of the present application. As shown in fig. 5, the process may include:
step S201, determining the default amount of the second electronic contract based on the default data.
In the present application, the default data may be term information of the second electronic contract, and the blockchain node may count the number of default credits.
Step S202, if the amount of the default deposit is greater than or equal to a threshold value, the default data and the amount of the default deposit are returned to the second user terminal.
In this application, the threshold may be 1, and when the number of the default terms is greater than or equal to 1, the blockchain node may return the default data and the number of the default terms to the second user terminal, so that the second user corresponding to the second user terminal may check the term information of the second electronic contract, where the evidence in the evidence information specifically violates.
Step S203, if the number of the default deposit is smaller than a threshold value, generating error information, and returning the error information to the second user terminal; the error message is used for prompting that the evidence information is invalid evidence.
In the present application, when the number of the default credit is less than 1, that is, the evidence information is insufficient to prove that the second electronic contract is violated, the blockchain node may generate error information and return the error information to the second user terminal, so that the second user can check the evidence information as invalid evidence.
As can be seen from the above, by acquiring the first electronic contract and linking the first electronic contract, the non-volatility and the non-tamper-resistance of the first electronic contract can be ensured, by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, whether the second electronic contract is valid or not can be verified, the efficiency of verifying the contract can be improved, and in the case that the second electronic contract is valid, the key evidence information of the evidence information is identified, the key evidence information is matched with the second electronic contract, the default data can be found in the second electronic contract, and the efficiency of finding the default data can be improved.
Further, please refer to fig. 6, which is a schematic diagram illustrating a block chain-based data processing apparatus according to an embodiment of the present application. As shown in fig. 6, the data processing apparatus 1 may include: the device comprises a uplink module 11, an acquisition module 12, a verification module 13, an identification module 14 and a search module 15.
The uplink module 11 is configured to obtain a first electronic contract sent by a first user terminal, and uplink the first electronic contract into a blockchain;
an obtaining module 12, configured to obtain second electronic contract and evidence information sent by a second user terminal, and obtain a block including the first electronic contract from the blockchain as a target block;
A verification module 13, configured to verify the validity of the second electronic contract according to the target block;
an identification module 14, configured to identify key evidence information in the evidence information if the second electronic contract is valid; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification;
and the searching module 15 is configured to search the second electronic contract for default data according to the action occurrence timestamp, the target asset transfer amount and the target contract object identifier.
The specific implementation manners of the uplink module 11, the acquisition module 12, the verification module 13, the identification module 14, and the search module 15 may refer to step S101-step S105 in the embodiment corresponding to fig. 3, and are not described herein.
Referring to fig. 6, the uplink module 11 may include a first acquisition unit 111, a signature verification unit 112, and an addition unit 113.
A first obtaining unit 111 configured to obtain a public key of the first user terminal, the first electronic contract, and the digital signature;
a signing checking unit 112, configured to sign the digital signature of the first electronic contract based on the public key;
And an adding unit 113 configured to generate a block according to the first electronic contract and add the block to the blockchain if the digital signature is a legal signature.
The specific implementation manner of the first obtaining unit 111, the signature verification unit 112, and the adding unit 113 may refer to step S101 in the embodiment corresponding to fig. 3, and will not be described herein.
Referring to fig. 6, the verification module 13 may include: the first determination unit 131 and the second determination unit 132.
A first determining unit 131, configured to determine a first hash value of the first electronic contract based on the target block;
the first determining unit 131 is further configured to determine a second hash value of the second electronic contract;
and a second determining unit 132 configured to determine that the second electronic contract is valid if the first hash value is the same as the second hash value.
The specific implementation manner of the first determining unit 131 and the second determining unit 132 may refer to step S103 in the embodiment corresponding to fig. 3, and will not be described herein.
Referring to fig. 6, the identification module 14 may include: a second acquisition unit 141, a first matching unit 142, a first identification unit 143, and a third determination unit 144.
A second obtaining unit 141, configured to obtain a general default keyword;
a first matching unit 142, configured to match a plurality of text fields in the evidence information according to the universal default key, and search the evidence information for a time source text to be verified, an asset transfer text to be verified, and a contract object identifier text to be verified, which are matched with the universal default key;
a first identifying unit 143, configured to identify the action occurrence time stamp, the target asset transfer amount, and the target contract object identifier based on the time source text to be verified, the asset transfer text to be verified, and the contract object identifier text to be verified;
a third determining unit 144, configured to determine the action occurrence time stamp, the target asset transfer amount, and the target contract object identifier as the key evidence information.
The specific implementation manner of the second obtaining unit 141, the first matching unit 142, the first identifying unit 143, and the third determining unit 144 may refer to step S104 in the embodiment corresponding to fig. 3, and will not be described herein.
Referring to fig. 6, the search module 15 may include: a third acquisition unit 151, a second matching unit 152, a second identification unit 153, and a third matching unit 154.
A third obtaining unit 151, configured to obtain the general default keyword;
a second matching unit 152, configured to match a plurality of text fields in the second electronic contract according to the general default key, and search, from the second electronic contract, a legal time source text, a legal asset transfer text, and a legal contract object identifier text that are matched with the general default key;
a second identifying unit 153, configured to identify a legal time interval, a legal asset transfer amount, and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text, and the legal contract object identifier text;
and a third matching unit 154 configured to match the key evidence information with the legal time interval, the legal asset transfer amount, and the legal contract object identifier, and determine the default data.
The specific implementation manner of the third obtaining unit 151, the second matching unit 152, the second identifying unit 153, and the third matching unit 154 may refer to step S105 in the embodiment corresponding to fig. 3, and will not be described herein.
Referring to fig. 6, the third matching unit 154 may include: a matching sub-unit 1541, a search sub-unit 1542, and a determination sub-unit 1543.
A matching subunit 1541, configured to match the action occurrence timestamp with the legal time interval, and determine an action occurrence timestamp that is outside the legal time interval as first difference data;
the matching subunit 1541 is further configured to match the target asset transfer amount with the legal asset transfer amount, and determine a target asset transfer amount different from the legal asset transfer amount as second difference data;
the matching subunit 1541 is further configured to match the target contract object identifier with the legal contract object identifier, and determine a target contract object identifier different from the legal contract object identifier as third difference data;
a searching subunit 1542, configured to search, in the second electronic contract, term information corresponding to the first difference data, the second difference data, and the third difference data, respectively;
a determining subunit 1543 configured to determine the found term information as the default data of the second electronic contract.
The specific implementation manner of the matching sub-unit 1541, the searching sub-unit 1542 and the determining sub-unit 1543 may refer to step S105 in the embodiment corresponding to fig. 3, and will not be described herein.
Referring to fig. 6, the data processing apparatus 1 may include a winding module 11, an acquisition module 12, a verification module 13, an identification module 14, and a search module 15, and may further include a determination module 16 and a return module 17.
A determining module 16, configured to determine, based on the breach data, a breach count of the second electronic contract;
a return module 17, configured to return the default data and the default amount to the second user terminal if the default amount is greater than or equal to a threshold;
the return module 17 is further configured to generate an error message if the number of the default credit is smaller than a threshold value, and return the error message to the second user terminal; the error message is used for prompting that the evidence information is invalid evidence.
The specific implementation manner of the determining module and the returning module may refer to step S201-step S203 in the embodiment corresponding to fig. 5, and will not be described herein.
The method comprises the steps of obtaining a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain; acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification; and searching default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identification. As can be seen from the above, by acquiring the first electronic contract and linking the first electronic contract, the non-volatility and the non-tamper-resistance of the first electronic contract can be ensured, by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, whether the second electronic contract is valid or not can be verified, the efficiency of verifying the contract can be improved, and in the case that the second electronic contract is valid, the key evidence information of the evidence information is identified, the key evidence information is matched with the second electronic contract, the default data can be found in the second electronic contract, and the efficiency of finding the default data can be improved.
Further, please refer to fig. 7, which is a schematic structural diagram of a computer device according to an embodiment of the present application. As shown in fig. 7, the apparatus 1 in the embodiment corresponding to fig. 6 may be applied to the computer device 1000, and the computer device 1000 may include: processor 1001, network interface 1004, and memory 1005, and in addition, the above-described computer device 1000 further includes: a user interface 1003, and at least one communication bus 1002. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display (Display), a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface, among others. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one disk memory. The memory 1005 may also optionally be at least one storage device located remotely from the processor 1001. As shown in fig. 7, an operating system, a network communication module, a user interface module, and a device control application may be included in a memory 1005, which is a type of computer-readable storage medium.
In the computer device 1000 shown in FIG. 7, the network interface 1004 may provide network communication functions; while user interface 1003 is primarily used as an interface for providing input to a user; and the processor 1001 may be used to invoke a device control application stored in the memory 1005 to implement:
acquiring a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain;
acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
verifying the validity of the second electronic contract according to the target block;
if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification;
and searching default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identification.
In one embodiment, the digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
The processor 1001, when executing the acquiring the first electronic contract and uploading the first electronic contract into the blockchain, specifically executes the following steps:
acquiring the public key of the first user terminal, the first electronic contract and the digital signature;
signing the digital signature of the first electronic contract based on the public key;
if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
In one embodiment, the processor 1001, when executing the verification of the validity of the second electronic contract according to the target block, specifically executes the following steps:
determining a first hash value of the first electronic contract based on the target block;
determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract is valid.
In one embodiment, the processor, when executing the identifying key evidence information in the evidence information, specifically executes the following steps:
acquiring general default keywords;
matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified, which are matched with the general default keywords, from the evidence information;
Identifying the behavior occurrence time stamp, the target asset transfer amount and the target contract object identification based on the time source text to be verified, the asset transfer text to be verified and the contract object identification text to be verified;
and determining the action occurrence time stamp, the target asset transfer quantity and the target contract object identification as the key evidence information.
In one embodiment, the processor 1001, when executing the action occurrence time stamp, the target asset transfer amount, and the target contract object identifier, searches the second electronic contract for default data, specifically executes the following steps:
acquiring the general default keywords;
matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source text, legal asset transfer text and legal contract object identification text matched with the general default keywords from the second electronic contract;
based on the legal time source text, the legal asset transfer text and the legal contract object identification text, identifying a legal time interval, a legal asset transfer amount and a legal contract object identification of the second electronic contract;
And matching the key evidence information with the legal time interval, the legal asset transfer quantity and the legal contract object identifier to determine the default data.
In one embodiment, the processor 1001 performs the following steps when performing the matching of the key evidence information with the legal time interval, the legal asset transfer amount, and the legal contract object identifier to determine the default data:
matching the behavior occurrence time stamp with the legal time interval, and determining the behavior occurrence time stamp outside the legal time interval as first difference data;
matching the target asset transfer amount with the legal asset transfer amount, and determining a target asset transfer amount different from the legal asset transfer amount as second difference data;
matching the target contract object identifier with the legal contract object identifier, and determining a target contract object identifier different from the legal contract object identifier as third difference data;
searching for term information corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract;
And determining the searched clause information as the default data of the second electronic contract.
In one embodiment, the processor 1001 further performs the following steps:
determining the default amount of the second electronic contract based on the default data;
if the default amount is greater than or equal to a threshold value, the default data and the default amount are returned to the second user terminal;
if the number of the default deposit is smaller than a threshold value, generating error information, and returning the error information to the second user terminal; the error message is used for prompting that the evidence information is invalid evidence.
The method comprises the steps of obtaining a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a block chain; acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block; verifying the validity of the second electronic contract according to the target block; if the second electronic contract is effective, identifying key evidence information in the evidence information; the key evidence information comprises a behavior occurrence time stamp, a target asset transfer quantity and a target contract object identification; and searching default data in the second electronic contract according to the action occurrence time stamp, the target asset transfer quantity and the target contract object identification. As can be seen from the above, by acquiring the first electronic contract and linking the first electronic contract, the non-volatility and the non-tamper-resistance of the first electronic contract can be ensured, by acquiring the second electronic contract and the evidence information, comparing the hash value of the second electronic contract with the hash value of the first electronic contract, whether the second electronic contract is valid or not can be verified, the efficiency of verifying the contract can be improved, and in the case that the second electronic contract is valid, the key evidence information of the evidence information is identified, the key evidence information is matched with the second electronic contract, the default data can be found in the second electronic contract, and the efficiency of finding the default data can be improved.
Furthermore, it should be noted here that: the embodiments of the present application further provide a computer readable storage medium, where a computer program executed by the computer device 1000 for data processing mentioned above is stored, and the computer program includes program instructions, when executed by the processor, can perform the description of the data processing method in the embodiments corresponding to fig. 3 to 5, and therefore, the description will not be repeated here. In addition, the description of the beneficial effects of the same method is omitted. For technical details not disclosed in the embodiments of the computer-readable storage medium according to the present application, please refer to the description of the method embodiments of the present application.
Those skilled in the art will appreciate that implementing all or part of the above-described methods may be accomplished by way of computer programs, which may be stored on a computer-readable storage medium, and which, when executed, may comprise the steps of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), or the like.
The foregoing disclosure is only illustrative of the preferred embodiments of the present application and is not intended to limit the scope of the claims herein, as the equivalent of the claims herein shall be construed to fall within the scope of the claims herein.

Claims (7)

1. A blockchain-based data processing method, comprising:
acquiring a first electronic contract sent by a first user terminal, and uploading the first electronic contract to a blockchain;
acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the blockchain as a target block;
verifying the validity of the second electronic contract according to the target block;
if the second electronic contract is effective, acquiring a general default keyword; matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified, which are matched with the general default keywords, from the evidence information; identifying a behavior occurrence time stamp, a target asset transfer amount and a target contract object identifier based on the time source text to be verified, the asset transfer text to be verified and the contract object identifier text to be verified; determining the behavior occurrence time stamp, the target asset transfer amount and the target contract object identification as key evidence information;
Matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source text, legal asset transfer text and legal contract object identification text matched with the general default keywords from the second electronic contract;
based on the legal time source text, the legal asset transfer text and the legal contract object identification text, identifying a legal time interval, a legal asset transfer amount and a legal contract object identification of the second electronic contract;
matching the behavior occurrence time stamp with the legal time interval, and determining the behavior occurrence time stamp outside the legal time interval as first difference data; matching the target asset transfer amount with the legal asset transfer amount, and determining a target asset transfer amount different from the legal asset transfer amount as second difference data; matching the target contract object identifier with the legal contract object identifier, and determining a target contract object identifier different from the legal contract object identifier as third difference data; searching clause information corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract; and determining the searched clause information as default data of the second electronic contract.
2. The method of claim 1, wherein the digital signature corresponding to the first electronic contract is obtained by signing the first electronic contract based on a private key of the first user terminal;
the obtaining a first electronic contract sent by a first user terminal, and the first electronic contract is uplink to a blockchain, including:
acquiring a public key of the first user terminal, the first electronic contract and the digital signature;
signing the digital signature of the first electronic contract based on the public key;
and if the digital signature is a legal signature, generating a block according to the first electronic contract, and adding the block into the block chain.
3. The method of claim 1, wherein verifying the validity of the second electronic contract according to the target block comprises:
determining a first hash value of the first electronic contract based on the target block;
determining a second hash value of the second electronic contract;
and if the first hash value is the same as the second hash value, determining that the second electronic contract is valid.
4. The method as recited in claim 1, further comprising:
Determining the number of default entries of the second electronic contract based on the default data;
if the default amount is greater than or equal to a threshold value, returning the default data and the default amount to the second user terminal;
if the number of the default deposit is smaller than a threshold value, generating error information, and returning the error information to the second user terminal; the error information is used for prompting that the evidence information is invalid evidence.
5. A blockchain-based data processing device, comprising:
the system comprises a first user terminal, a second user terminal, a block chain module and a linking module, wherein the first user terminal is used for sending a first electronic contract to the block chain;
the acquisition module is used for acquiring second electronic contract and evidence information sent by a second user terminal, and acquiring a block containing the first electronic contract from the block chain as a target block;
the verification module is used for verifying the validity of the second electronic contract according to the target block;
the identification module is used for acquiring general default keywords if the second electronic contract is effective; matching a plurality of text fields in the evidence information according to the general default keywords, and searching a time source text to be verified, an asset transfer text to be verified and a contract object identification text to be verified, which are matched with the general default keywords, from the evidence information; identifying a behavior occurrence time stamp, a target asset transfer amount and a target contract object identifier based on the time source text to be verified, the asset transfer text to be verified and the contract object identifier text to be verified; determining the behavior occurrence time stamp, the target asset transfer amount and the target contract object identification as key evidence information;
The searching module is used for matching a plurality of text fields in the second electronic contract according to the general default keywords, and searching legal time source texts, legal asset transfer texts and legal contract object identification texts matched with the general default keywords from the second electronic contract;
the searching module is further used for identifying a legal time interval, a legal asset transfer amount and a legal contract object identifier of the second electronic contract based on the legal time source text, the legal asset transfer text and the legal contract object identifier text;
the searching module is further used for matching the behavior occurrence time stamp with the legal time interval and determining the behavior occurrence time stamp outside the legal time interval as first difference data; matching the target asset transfer amount with the legal asset transfer amount, and determining a target asset transfer amount different from the legal asset transfer amount as second difference data; matching the target contract object identifier with the legal contract object identifier, and determining a target contract object identifier different from the legal contract object identifier as third difference data; searching clause information corresponding to the first difference data, the second difference data and the third difference data in the second electronic contract; and determining the searched clause information as default data of the second electronic contract.
6. A computer device, comprising: a processor and a memory;
the memory stores a computer program which, when executed by the processor, causes the processor to perform the steps of the method according to any one of claims 1 to 4.
7. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program comprising program instructions which, when executed by a processor, perform the method of any of claims 1 to 4.
CN201911200611.XA 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium Active CN110879835B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911200611.XA CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911200611.XA CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110879835A CN110879835A (en) 2020-03-13
CN110879835B true CN110879835B (en) 2024-02-09

Family

ID=69729656

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911200611.XA Active CN110879835B (en) 2019-11-29 2019-11-29 Block chain-based data processing method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110879835B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112231771B (en) * 2020-12-11 2021-03-23 浙江数秦科技有限公司 Block chain-based electronic contract online signing and security method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737403A (en) * 2018-05-10 2018-11-02 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109064120A (en) * 2018-07-10 2018-12-21 马上游科技股份有限公司 Tourism electric contract number deposit system based on region chain and deposit card method
CN109087056A (en) * 2018-06-15 2018-12-25 平安科技(深圳)有限公司 Electronic contract signs method, apparatus and server
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN109992993A (en) * 2019-02-27 2019-07-09 平安科技(深圳)有限公司 Assets information processing method, device, equipment and storage medium based on block chain
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018006072A1 (en) * 2016-06-30 2018-01-04 Clause, Inc. Systems and method for forming, storing, managing,and executing contracts
US20190132350A1 (en) * 2017-10-30 2019-05-02 Pricewaterhousecoopers Llp System and method for validation of distributed data storage systems

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108737403A (en) * 2018-05-10 2018-11-02 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN109087056A (en) * 2018-06-15 2018-12-25 平安科技(深圳)有限公司 Electronic contract signs method, apparatus and server
CN109064120A (en) * 2018-07-10 2018-12-21 马上游科技股份有限公司 Tourism electric contract number deposit system based on region chain and deposit card method
CN109472164A (en) * 2018-09-13 2019-03-15 远光软件股份有限公司 The verification method and its network and electronic equipment of contract dataset
CN109992993A (en) * 2019-02-27 2019-07-09 平安科技(深圳)有限公司 Assets information processing method, device, equipment and storage medium based on block chain
CN110189122A (en) * 2019-04-30 2019-08-30 阿里巴巴集团控股有限公司 The method and device fixed time for the data anchor on block chain, electronic equipment

Also Published As

Publication number Publication date
CN110879835A (en) 2020-03-13

Similar Documents

Publication Publication Date Title
CN109428886B (en) Method and system for review verification and trustworthiness scoring via blockchain
CN110121727B (en) Method and system for providing authenticated, auditable and immutable input for intelligent contracts
CN111274782B (en) Text auditing method and device, computer equipment and readable storage medium
US11003646B2 (en) Data isolation in a blockchain network
US20190244227A1 (en) Bulletin board information management system
US11379462B2 (en) Systems and methods for a reputation-based consensus protocol
US10880619B2 (en) Verifying provenance of digital content
CN116432247A (en) Infringement evidence method and device based on blockchain
KR20220027418A (en) Author verifying apparatus / method using decentralized network and self-sovereign id
CN112632139A (en) Information pushing method and device based on PMIS system, computer equipment and medium
CN115114372A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN110879835B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN117036115A (en) Contract data verification method, device and server
US20220092104A1 (en) System for automatic management and depositing of documents (images) hash in block-chain technology
CN108886631B (en) Electronic data inspection system, electronic data inspection method, and storage medium
US11868911B1 (en) Distributed ledger based machine-learning model management
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN115017149A (en) Data processing method and device, electronic equipment and storage medium
CN112434677B (en) Contract auditing method, device, equipment and storage medium
CN109064216B (en) Method and device for simulating exposure of advertisement order
CN116862679B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN109471790A (en) Send nuclear parameter comparison method and device, computer installation and readable storage medium storing program for executing
CN110781523B (en) Method and apparatus for processing information
US20240095850A1 (en) Information management program, information processing system, and information management method
US20220245124A1 (en) Verified entity attributes

Legal Events

Date Code Title Description
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant