CN111008404A - Service call auditing method, equipment and medium based on block chain - Google Patents

Service call auditing method, equipment and medium based on block chain Download PDF

Info

Publication number
CN111008404A
CN111008404A CN201911185061.9A CN201911185061A CN111008404A CN 111008404 A CN111008404 A CN 111008404A CN 201911185061 A CN201911185061 A CN 201911185061A CN 111008404 A CN111008404 A CN 111008404A
Authority
CN
China
Prior art keywords
hash
service
records
calling
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911185061.9A
Other languages
Chinese (zh)
Inventor
宋明明
庞松涛
商广勇
王伟兵
马岩堂
李佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Inspur Cloud Information Technology Co Ltd
Original Assignee
Shandong ICity Information Technology Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong ICity Information Technology Co., Ltd. filed Critical Shandong ICity Information Technology Co., Ltd.
Priority to CN201911185061.9A priority Critical patent/CN111008404A/en
Publication of CN111008404A publication Critical patent/CN111008404A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0283Price estimation or determination
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Strategic Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Technology Law (AREA)
  • Mathematical Physics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a service call auditing method, equipment and medium based on a block chain, wherein the method comprises the following steps: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the plurality of first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform. The data in the blockchain platform is publicly transparent. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. And the service calling record is hashed, and the hash is carried out again after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced.

Description

Service call auditing method, equipment and medium based on block chain
Technical Field
The application relates to the field of service calling, in particular to a service calling auditing method, device and medium based on a block chain.
Background
When service calling is performed, the data resource called by the called end provides service for the external calling end in an Application Programming Interface (API) mode, and then charges the owner of the calling end according to the number of times the Interface is called.
However, in the prior art, if two parties settle the fees according to the call records, the times of the call records are diverged, and because there is no basis for the two parties to be convinced, disputes are easy to be generated corresponding to the paid fees.
Disclosure of Invention
In order to solve the above problem, the present application provides a service call auditing method based on a block chain, including: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
In one example, hashing the obtained service call records respectively includes: and respectively carrying out hash on a plurality of service call records acquired every other preset time.
In one example, hashing the obtained service call records respectively includes: and when the number of the obtained service calling records reaches a preset number, respectively carrying out hash on the preset number of the service calling records.
In one example, the method further comprises: and if the number of the acquired service calling records does not reach the preset number when the preset time limit is reached, respectively carrying out hash on the acquired service calling records.
In one example, concatenating the plurality of first hash values into a string includes: and splicing the first hash values respectively corresponding to the service calling records into character strings according to the calling time of the service calling records.
In one example, the method further comprises: acquiring the cost corresponding to the service calling records; writing the cost to the blockchain platform.
In one example, the method further comprises: generating intelligent contracts and deploying the intelligent contracts in the blockchain platform, wherein the intelligent contracts comprise: service call records, hash algorithms, and concatenation algorithms.
In one example, the intelligent contract is for: and respectively enabling the received service call records to pass through the hash algorithm to obtain the first hash values, splicing the first hash values through the splicing algorithm to generate the character string, enabling the character string to pass through the hash algorithm to obtain the second hash value, and writing the second hash value into the block chain platform.
The application also provides service invocation auditing equipment based on the block chain, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
The present application further provides a non-volatile computer storage medium for service invocation auditing based on blockchains, having stored thereon computer-executable instructions configured to: deploying a blockchain platform based on the blockchain framework; deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform; collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment; and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
The service call auditing method based on the block chain can bring the following beneficial effects:
because the data in the blockchain platform is public and transparent, the calling end and the called end can inquire the served calling records through corresponding ways at any time. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. Once two parties generate inconsistent opinions about the times of service call records, because one service call record is tampered, the hash values of layers are damaged, and the final second hash value is inconsistent with the real second hash value. The two parties can perform the steps in the service call auditing method through the service call records provided by the two parties for layer-by-layer hash, and the two parties compare with each other according to the second hash value stored in the block chain platform, and the consistent party is the correct party, so that the occurrence probability of divergence is reduced, and the benefits of the two parties are maintained. And the service calling record is hashed, and the hash is carried out again after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a service call auditing method based on a blockchain in an embodiment of the present application;
fig. 2 is a schematic diagram of service call auditing equipment based on a blockchain in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides a service call auditing method based on a blockchain, including:
s101, deploying a blockchain platform based on the blockchain framework.
The Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, and is essentially a decentralized database.
A blockchain platform is first deployed based on the blockchain framework. The blockchain frame may be any blockchain frame capable of implementing the corresponding function of the embodiment of the present application, for example, bitcoin, etherhouse, Fabric, Corda, and the like. A blockchain platform may refer to a platform that stores a blockchain, e.g., may be a distributed system, etc. Of course, the blockchain platform may also directly represent the blockchain itself, and is not limited herein.
In the process of deploying the blockchain platform, a service calling end (hereinafter referred to as a calling end) and a service called end (hereinafter referred to as a called end) may be deployed in the blockchain platform as nodes, which is not described herein again.
S102, obtaining a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information.
When a developer carries out software-related research and development on a program, a system or a platform, if all functions are executed by the developer, the workload of the developer is too large, and the program is too complex, and at the moment, the workload of the developer can be reduced through service calling. When service calling is performed, the called data resource of the called end provides service for the external calling end in an Application Programming Interface (API) mode, and then charges the owner of the calling end according to the number of times the Interface is called. The calling end may be in the form of a program, a system, a client, a server, and the like, which is not limited herein.
When the service is called, corresponding service calling records are generated, and the service calling records become the basis for the payment of both parties. The service calling record comprises at least one of calling end information, called end information and calling time. The information of the calling end and the information of the called end may include, for example, an Internet Protocol (IP) address, a service port, a service protocol, a protocol format, a protocol type, etc., which are not described herein again.
S103, hashing the obtained service calling records respectively to obtain a plurality of first hash values.
And S104, splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
When only one service call record is available, the service call record can be directly written into the blockchain platform, so that the two parties can pay the fee through the record on the blockchain platform. However, in general, the number of service call records is large and large. At this time, if all records are directly written into the blockchain platform, the data volume in the blockchain platform is too large, and an excessive space is occupied. It also causes inconvenience when both parties refer to the record.
Therefore, the obtained service call records can be respectively hashed to obtain a plurality of first hash values. The first hash value is obtained by hashing the service call record, so that the storage space occupied by the record can be greatly reduced. However, since the number of service invocation records is large, the number of the first hash values is also large, so that the space occupied by the whole system is still large.
At this time, the obtained multiple first hash values may be concatenated to generate a character string, and then the character string is hashed to obtain a second hash value, and then the second hash value is written into the block chain platform. When the first letter of the next second hash value is spliced, the first letter of the next second hash value can be spliced behind the last letter of the previous first hash value, and the splicing is finished by analogy. When the first hash values are spliced, the first hash values can be spliced according to calling time, so that corresponding hash calculation is performed when problems occur in later periods of the two parties. The service calling record is hashed, and the hash is performed once after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced. And because the data in the blockchain platform is public and transparent, the calling end and the called end can inquire the served calling record through corresponding ways at any time. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. Once two parties generate inconsistent opinions about the times of service call records, because one service call record is tampered, the hash values of layers are damaged, and the final second hash value is inconsistent with the real second hash value. The two parties can perform the steps in the service call auditing method through the service call records provided by the two parties for layer-by-layer hash, and the two parties compare with each other according to the second hash value stored in the block chain platform, and the consistent party is the correct party, so that the occurrence probability of divergence is reduced, and the benefits of the two parties are maintained.
In an embodiment, when the obtained service call records are hashed, the service call records obtained every preset time period may be hashed respectively. For example, every ten minutes, service records acquired within the ten minutes are hashed. In general, the data volume of the service call record acquired within ten minutes is already large, and the data volume can be stored.
Of course, when the number of the obtained service invocation records reaches the preset number, the hash may be performed on the preset number of the service invocation records. For example, every hundred service call records are obtained, the one hundred service call records may be hashed separately. Of course, if the number of service call records obtained in the preset time period, for example, ten minutes, has not yet reached one hundred, the service call records obtained in the time period may be respectively hashed to prevent the problem that the records cannot be written into the blockchain platform in time.
In one embodiment, the charges corresponding to the service call records may also be obtained and written into the blockchain platform. The cost of the service call records can be obtained at one time, and can also be obtained by obtaining the cost of each service call record and calculating. By writing the fee into the blockchain platform, the two parties can pay more conveniently.
In one embodiment, the corresponding intelligent contracts may also be generated in advance and deployed in the blockchain platform. The intelligent contract comprises a service calling record, a Hash algorithm and a splicing algorithm. The intelligent contract is used for enabling the received service calling records to respectively pass through a Hash algorithm to obtain a plurality of first Hash values, splicing the first Hash values through a splicing algorithm to generate a character string, enabling the character string to pass through the Hash algorithm to obtain a second Hash value, and writing the second Hash value into the block chain platform. Since the intelligent contracts on the blockchain platform are public, each node can check whether the intelligent contracts are in accordance with the preset agreement or not and deploy the intelligent contracts on the own node. And both parties can also inquire the intelligent contract through corresponding ways, so that the degree of automation of the transaction is improved, and meanwhile, the trust degree of both parties is further increased. The intelligent contract can only be changed in an upgrading mode, each node needs to be synchronously deployed, once the intelligent contract is deployed, the intelligent contract can only be executed through a program, interference of human factors is avoided, and the reliability of data is enhanced.
As shown in fig. 2, an embodiment of the present application further provides a service invocation auditing apparatus based on a blockchain, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
The present application further provides a non-volatile computer storage medium for service invocation auditing based on blockchains, having stored thereon computer-executable instructions configured to:
deploying a blockchain platform based on the blockchain framework;
deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform;
collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment;
and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A service call auditing method based on a block chain is characterized by comprising the following steps:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
2. The method according to claim 1, wherein hashing the obtained service invocation records respectively comprises:
and respectively carrying out hash on a plurality of service call records acquired every other preset time.
3. The method according to claim 1, wherein hashing the obtained service invocation records respectively comprises:
and when the number of the obtained service calling records reaches a preset number, respectively carrying out hash on the preset number of the service calling records.
4. The method of claim 3, further comprising:
and if the number of the acquired service calling records does not reach the preset number when the preset time limit is reached, respectively carrying out hash on the acquired service calling records.
5. The method of claim 1, wherein splicing the plurality of first hash values into a string comprises:
and splicing the first hash values respectively corresponding to the service calling records into character strings according to the calling time of the service calling records.
6. The method of claim 1, further comprising:
acquiring the cost corresponding to the service calling records;
writing the cost to the blockchain platform.
7. The method of claim 1, further comprising:
generating intelligent contracts and deploying the intelligent contracts in the blockchain platform, wherein the intelligent contracts comprise: service call records, hash algorithms, and concatenation algorithms.
8. The method of claim 7, wherein the smart contract is configured to: and respectively enabling the received service call records to pass through the hash algorithm to obtain the first hash values, splicing the first hash values through the splicing algorithm to generate the character string, enabling the character string to pass through the hash algorithm to obtain the second hash value, and writing the second hash value into the block chain platform.
9. A service invocation auditing device based on a block chain is characterized by comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
10. A non-transitory computer storage medium having block chain based service call auditing stored thereon computer-executable instructions configured to:
deploying a blockchain platform based on the blockchain framework;
deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform;
collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment;
and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
CN201911185061.9A 2019-11-27 2019-11-27 Service call auditing method, equipment and medium based on block chain Pending CN111008404A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911185061.9A CN111008404A (en) 2019-11-27 2019-11-27 Service call auditing method, equipment and medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911185061.9A CN111008404A (en) 2019-11-27 2019-11-27 Service call auditing method, equipment and medium based on block chain

Publications (1)

Publication Number Publication Date
CN111008404A true CN111008404A (en) 2020-04-14

Family

ID=70112392

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911185061.9A Pending CN111008404A (en) 2019-11-27 2019-11-27 Service call auditing method, equipment and medium based on block chain

Country Status (1)

Country Link
CN (1) CN111008404A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112884488A (en) * 2021-02-22 2021-06-01 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN112929154A (en) * 2020-12-29 2021-06-08 合肥达朴汇联科技有限公司 Block chain audit source tracing method and system applied to third terminal and electronic equipment
CN112966288A (en) * 2021-03-30 2021-06-15 建信金融科技有限责任公司 Data processing method and device, electronic equipment and storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112929154A (en) * 2020-12-29 2021-06-08 合肥达朴汇联科技有限公司 Block chain audit source tracing method and system applied to third terminal and electronic equipment
CN112929154B (en) * 2020-12-29 2024-05-31 合肥达朴汇联科技有限公司 Block chain audit tracing method and system applied to third terminal and electronic equipment
CN112884488A (en) * 2021-02-22 2021-06-01 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN112884488B (en) * 2021-02-22 2024-03-22 湖南大学 Block chain-based fraud prevention crowd funding method and system
CN112966288A (en) * 2021-03-30 2021-06-15 建信金融科技有限责任公司 Data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN111008404A (en) Service call auditing method, equipment and medium based on block chain
JP2019511059A (en) Method and device for outputting risk information and constructing risk information
CN111415170A (en) Block chain-based food tracing method and equipment and related storage medium
CN111737311A (en) Donation material distribution method, device and medium based on block chain
CN111343241B (en) Graph data updating method, device and system
US10169838B2 (en) Multiple source watermarking for surveillance
CN111930497A (en) Resource allocation method, device and medium based on block chain and static code
JP2019504426A (en) Method and apparatus for generating random character string
CN110930578A (en) Voting method, equipment and medium based on block chain
CN112967119A (en) Bidding method, device and medium based on block chain
CN111443894A (en) Random number generation method, device and medium based on block chain
CN111125115A (en) Data storage method, device and medium based on block chain
CN112291321B (en) Service processing method, device and system
CN111435495A (en) Service processing method, device and equipment
CN111639998A (en) Method, device and medium for guaranteeing user deposit rights and interests based on block chain
CN111131474A (en) Method, device and medium for managing user protocol based on block chain
CN111464290A (en) Block chain-based dynamic password generation method, equipment and medium
CN112035156A (en) E-commerce platform docking device, method, equipment and medium
CN111611598A (en) Block chain-based secure distributed cloud storage service implementation method, equipment and medium
CN111046267A (en) Method, device and medium for processing network rumors based on block chains
CN116468436A (en) Charging rule generation method and device
CN111125802A (en) Method, device and medium for managing non-material cultural heritage information based on block chain
CN110990889A (en) Method, equipment and medium based on block chain notarization prenuptial property
CN116993519A (en) Bill generation method and device
US20230097507A1 (en) Data backup optimization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20200806

Address after: Floor S01, Inspur Science Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province

Applicant after: Inspur cloud Information Technology Co.,Ltd.

Address before: Room 3110, S01 building, Langchao building, No. 1036, Langchao Road, high tech Zone, Jinan City, Shandong Province 250101

Applicant before: Shandong Aicheng Network Information Technology Co.,Ltd.

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination