CN111008404A - Service call auditing method, equipment and medium based on block chain - Google Patents
Service call auditing method, equipment and medium based on block chain Download PDFInfo
- Publication number
- CN111008404A CN111008404A CN201911185061.9A CN201911185061A CN111008404A CN 111008404 A CN111008404 A CN 111008404A CN 201911185061 A CN201911185061 A CN 201911185061A CN 111008404 A CN111008404 A CN 111008404A
- Authority
- CN
- China
- Prior art keywords
- hash
- service
- records
- calling
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000004519 manufacturing process Methods 0.000 claims description 19
- 238000001514 detection method Methods 0.000 claims description 18
- 238000004422 calculation algorithm Methods 0.000 claims description 16
- 230000007246 mechanism Effects 0.000 claims description 13
- 230000008569 process Effects 0.000 claims description 11
- 239000002537 cosmetic Substances 0.000 claims description 6
- 238000004806 packaging method and process Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 9
- 238000004590 computer program Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 230000009286 beneficial effect Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 230000008901 benefit Effects 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 238000005516 engineering process Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000004744 fabric Substances 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3003—Monitoring arrangements specially adapted to the computing system or computing system component being monitored
- G06F11/302—Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/30—Monitoring
- G06F11/3051—Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0283—Price estimation or determination
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Development Economics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Computing Systems (AREA)
- Strategic Management (AREA)
- General Engineering & Computer Science (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Game Theory and Decision Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Technology Law (AREA)
- Mathematical Physics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application discloses a service call auditing method, equipment and medium based on a block chain, wherein the method comprises the following steps: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the plurality of first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform. The data in the blockchain platform is publicly transparent. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. And the service calling record is hashed, and the hash is carried out again after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced.
Description
Technical Field
The application relates to the field of service calling, in particular to a service calling auditing method, device and medium based on a block chain.
Background
When service calling is performed, the data resource called by the called end provides service for the external calling end in an Application Programming Interface (API) mode, and then charges the owner of the calling end according to the number of times the Interface is called.
However, in the prior art, if two parties settle the fees according to the call records, the times of the call records are diverged, and because there is no basis for the two parties to be convinced, disputes are easy to be generated corresponding to the paid fees.
Disclosure of Invention
In order to solve the above problem, the present application provides a service call auditing method based on a block chain, including: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
In one example, hashing the obtained service call records respectively includes: and respectively carrying out hash on a plurality of service call records acquired every other preset time.
In one example, hashing the obtained service call records respectively includes: and when the number of the obtained service calling records reaches a preset number, respectively carrying out hash on the preset number of the service calling records.
In one example, the method further comprises: and if the number of the acquired service calling records does not reach the preset number when the preset time limit is reached, respectively carrying out hash on the acquired service calling records.
In one example, concatenating the plurality of first hash values into a string includes: and splicing the first hash values respectively corresponding to the service calling records into character strings according to the calling time of the service calling records.
In one example, the method further comprises: acquiring the cost corresponding to the service calling records; writing the cost to the blockchain platform.
In one example, the method further comprises: generating intelligent contracts and deploying the intelligent contracts in the blockchain platform, wherein the intelligent contracts comprise: service call records, hash algorithms, and concatenation algorithms.
In one example, the intelligent contract is for: and respectively enabling the received service call records to pass through the hash algorithm to obtain the first hash values, splicing the first hash values through the splicing algorithm to generate the character string, enabling the character string to pass through the hash algorithm to obtain the second hash value, and writing the second hash value into the block chain platform.
The application also provides service invocation auditing equipment based on the block chain, which comprises: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to: deploying a blockchain platform based on the blockchain framework; acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information; respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values; and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
The present application further provides a non-volatile computer storage medium for service invocation auditing based on blockchains, having stored thereon computer-executable instructions configured to: deploying a blockchain platform based on the blockchain framework; deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform; collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment; and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
The service call auditing method based on the block chain can bring the following beneficial effects:
because the data in the blockchain platform is public and transparent, the calling end and the called end can inquire the served calling records through corresponding ways at any time. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. Once two parties generate inconsistent opinions about the times of service call records, because one service call record is tampered, the hash values of layers are damaged, and the final second hash value is inconsistent with the real second hash value. The two parties can perform the steps in the service call auditing method through the service call records provided by the two parties for layer-by-layer hash, and the two parties compare with each other according to the second hash value stored in the block chain platform, and the consistent party is the correct party, so that the occurrence probability of divergence is reduced, and the benefits of the two parties are maintained. And the service calling record is hashed, and the hash is carried out again after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 is a schematic flowchart of a service call auditing method based on a blockchain in an embodiment of the present application;
fig. 2 is a schematic diagram of service call auditing equipment based on a blockchain in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the technical solutions of the present application will be described in detail and completely with reference to the following specific embodiments of the present application and the accompanying drawings. It should be apparent that the described embodiments are only some of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The technical solutions provided by the embodiments of the present application are described in detail below with reference to the accompanying drawings.
As shown in fig. 1, an embodiment of the present application provides a service call auditing method based on a blockchain, including:
s101, deploying a blockchain platform based on the blockchain framework.
The Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, and is essentially a decentralized database.
A blockchain platform is first deployed based on the blockchain framework. The blockchain frame may be any blockchain frame capable of implementing the corresponding function of the embodiment of the present application, for example, bitcoin, etherhouse, Fabric, Corda, and the like. A blockchain platform may refer to a platform that stores a blockchain, e.g., may be a distributed system, etc. Of course, the blockchain platform may also directly represent the blockchain itself, and is not limited herein.
In the process of deploying the blockchain platform, a service calling end (hereinafter referred to as a calling end) and a service called end (hereinafter referred to as a called end) may be deployed in the blockchain platform as nodes, which is not described herein again.
S102, obtaining a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information.
When a developer carries out software-related research and development on a program, a system or a platform, if all functions are executed by the developer, the workload of the developer is too large, and the program is too complex, and at the moment, the workload of the developer can be reduced through service calling. When service calling is performed, the called data resource of the called end provides service for the external calling end in an Application Programming Interface (API) mode, and then charges the owner of the calling end according to the number of times the Interface is called. The calling end may be in the form of a program, a system, a client, a server, and the like, which is not limited herein.
When the service is called, corresponding service calling records are generated, and the service calling records become the basis for the payment of both parties. The service calling record comprises at least one of calling end information, called end information and calling time. The information of the calling end and the information of the called end may include, for example, an Internet Protocol (IP) address, a service port, a service protocol, a protocol format, a protocol type, etc., which are not described herein again.
S103, hashing the obtained service calling records respectively to obtain a plurality of first hash values.
And S104, splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
When only one service call record is available, the service call record can be directly written into the blockchain platform, so that the two parties can pay the fee through the record on the blockchain platform. However, in general, the number of service call records is large and large. At this time, if all records are directly written into the blockchain platform, the data volume in the blockchain platform is too large, and an excessive space is occupied. It also causes inconvenience when both parties refer to the record.
Therefore, the obtained service call records can be respectively hashed to obtain a plurality of first hash values. The first hash value is obtained by hashing the service call record, so that the storage space occupied by the record can be greatly reduced. However, since the number of service invocation records is large, the number of the first hash values is also large, so that the space occupied by the whole system is still large.
At this time, the obtained multiple first hash values may be concatenated to generate a character string, and then the character string is hashed to obtain a second hash value, and then the second hash value is written into the block chain platform. When the first letter of the next second hash value is spliced, the first letter of the next second hash value can be spliced behind the last letter of the previous first hash value, and the splicing is finished by analogy. When the first hash values are spliced, the first hash values can be spliced according to calling time, so that corresponding hash calculation is performed when problems occur in later periods of the two parties. The service calling record is hashed, and the hash is performed once after splicing, so that the space occupied by the data in the block chain platform can be greatly reduced. And because the data in the blockchain platform is public and transparent, the calling end and the called end can inquire the served calling record through corresponding ways at any time. And because the blockchain platform is in distributed storage, data tampering of a single node cannot be effective, and the truthfulness and the credibility of the data on the blockchain platform are ensured. Once two parties generate inconsistent opinions about the times of service call records, because one service call record is tampered, the hash values of layers are damaged, and the final second hash value is inconsistent with the real second hash value. The two parties can perform the steps in the service call auditing method through the service call records provided by the two parties for layer-by-layer hash, and the two parties compare with each other according to the second hash value stored in the block chain platform, and the consistent party is the correct party, so that the occurrence probability of divergence is reduced, and the benefits of the two parties are maintained.
In an embodiment, when the obtained service call records are hashed, the service call records obtained every preset time period may be hashed respectively. For example, every ten minutes, service records acquired within the ten minutes are hashed. In general, the data volume of the service call record acquired within ten minutes is already large, and the data volume can be stored.
Of course, when the number of the obtained service invocation records reaches the preset number, the hash may be performed on the preset number of the service invocation records. For example, every hundred service call records are obtained, the one hundred service call records may be hashed separately. Of course, if the number of service call records obtained in the preset time period, for example, ten minutes, has not yet reached one hundred, the service call records obtained in the time period may be respectively hashed to prevent the problem that the records cannot be written into the blockchain platform in time.
In one embodiment, the charges corresponding to the service call records may also be obtained and written into the blockchain platform. The cost of the service call records can be obtained at one time, and can also be obtained by obtaining the cost of each service call record and calculating. By writing the fee into the blockchain platform, the two parties can pay more conveniently.
In one embodiment, the corresponding intelligent contracts may also be generated in advance and deployed in the blockchain platform. The intelligent contract comprises a service calling record, a Hash algorithm and a splicing algorithm. The intelligent contract is used for enabling the received service calling records to respectively pass through a Hash algorithm to obtain a plurality of first Hash values, splicing the first Hash values through a splicing algorithm to generate a character string, enabling the character string to pass through the Hash algorithm to obtain a second Hash value, and writing the second Hash value into the block chain platform. Since the intelligent contracts on the blockchain platform are public, each node can check whether the intelligent contracts are in accordance with the preset agreement or not and deploy the intelligent contracts on the own node. And both parties can also inquire the intelligent contract through corresponding ways, so that the degree of automation of the transaction is improved, and meanwhile, the trust degree of both parties is further increased. The intelligent contract can only be changed in an upgrading mode, each node needs to be synchronously deployed, once the intelligent contract is deployed, the intelligent contract can only be executed through a program, interference of human factors is avoided, and the reliability of data is enhanced.
As shown in fig. 2, an embodiment of the present application further provides a service invocation auditing apparatus based on a blockchain, including:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
The present application further provides a non-volatile computer storage medium for service invocation auditing based on blockchains, having stored thereon computer-executable instructions configured to:
deploying a blockchain platform based on the blockchain framework;
deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform;
collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment;
and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
The embodiments in the present application are described in a progressive manner, and the same and similar parts among the embodiments can be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and media embodiments, the description is relatively simple as it is substantially similar to the method embodiments, and reference may be made to some descriptions of the method embodiments for relevant points.
The device and the medium provided by the embodiment of the application correspond to the method one to one, so the device and the medium also have the similar beneficial technical effects as the corresponding method, and the beneficial technical effects of the method are explained in detail above, so the beneficial technical effects of the device and the medium are not repeated herein.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The above description is only an example of the present application and is not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.
Claims (10)
1. A service call auditing method based on a block chain is characterized by comprising the following steps:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
2. The method according to claim 1, wherein hashing the obtained service invocation records respectively comprises:
and respectively carrying out hash on a plurality of service call records acquired every other preset time.
3. The method according to claim 1, wherein hashing the obtained service invocation records respectively comprises:
and when the number of the obtained service calling records reaches a preset number, respectively carrying out hash on the preset number of the service calling records.
4. The method of claim 3, further comprising:
and if the number of the acquired service calling records does not reach the preset number when the preset time limit is reached, respectively carrying out hash on the acquired service calling records.
5. The method of claim 1, wherein splicing the plurality of first hash values into a string comprises:
and splicing the first hash values respectively corresponding to the service calling records into character strings according to the calling time of the service calling records.
6. The method of claim 1, further comprising:
acquiring the cost corresponding to the service calling records;
writing the cost to the blockchain platform.
7. The method of claim 1, further comprising:
generating intelligent contracts and deploying the intelligent contracts in the blockchain platform, wherein the intelligent contracts comprise: service call records, hash algorithms, and concatenation algorithms.
8. The method of claim 7, wherein the smart contract is configured to: and respectively enabling the received service call records to pass through the hash algorithm to obtain the first hash values, splicing the first hash values through the splicing algorithm to generate the character string, enabling the character string to pass through the hash algorithm to obtain the second hash value, and writing the second hash value into the block chain platform.
9. A service invocation auditing device based on a block chain is characterized by comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein,
the memory stores instructions executable by the at least one processor to enable the at least one processor to:
deploying a blockchain platform based on the blockchain framework;
acquiring a service calling record of a called end, wherein the service calling record comprises at least one of calling time, calling end information and called end information;
respectively carrying out hash on the obtained service calling records to obtain a plurality of first hash values;
and splicing the first hash values to generate a character string, hashing the character string to obtain a second hash value, and writing the second hash value into the block chain platform.
10. A non-transitory computer storage medium having block chain based service call auditing stored thereon computer-executable instructions configured to:
deploying a blockchain platform based on the blockchain framework;
deploying various production mechanisms and detection mechanisms corresponding to cosmetics in the production process and the detection process in the blockchain platform as nodes in the blockchain platform;
collecting the cosmetics, production data of the production mechanism in the production process and detection data of the detection mechanism in the detection process through corresponding collecting equipment;
and packaging the production data or the detection data corresponding to the node to generate a block, and writing the block into the block chain platform.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911185061.9A CN111008404A (en) | 2019-11-27 | 2019-11-27 | Service call auditing method, equipment and medium based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911185061.9A CN111008404A (en) | 2019-11-27 | 2019-11-27 | Service call auditing method, equipment and medium based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111008404A true CN111008404A (en) | 2020-04-14 |
Family
ID=70112392
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911185061.9A Pending CN111008404A (en) | 2019-11-27 | 2019-11-27 | Service call auditing method, equipment and medium based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111008404A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112884488A (en) * | 2021-02-22 | 2021-06-01 | 湖南大学 | Block chain-based fraud prevention crowd funding method and system |
CN112929154A (en) * | 2020-12-29 | 2021-06-08 | 合肥达朴汇联科技有限公司 | Block chain audit source tracing method and system applied to third terminal and electronic equipment |
CN112966288A (en) * | 2021-03-30 | 2021-06-15 | 建信金融科技有限责任公司 | Data processing method and device, electronic equipment and storage medium |
-
2019
- 2019-11-27 CN CN201911185061.9A patent/CN111008404A/en active Pending
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112929154A (en) * | 2020-12-29 | 2021-06-08 | 合肥达朴汇联科技有限公司 | Block chain audit source tracing method and system applied to third terminal and electronic equipment |
CN112929154B (en) * | 2020-12-29 | 2024-05-31 | 合肥达朴汇联科技有限公司 | Block chain audit tracing method and system applied to third terminal and electronic equipment |
CN112884488A (en) * | 2021-02-22 | 2021-06-01 | 湖南大学 | Block chain-based fraud prevention crowd funding method and system |
CN112884488B (en) * | 2021-02-22 | 2024-03-22 | 湖南大学 | Block chain-based fraud prevention crowd funding method and system |
CN112966288A (en) * | 2021-03-30 | 2021-06-15 | 建信金融科技有限责任公司 | Data processing method and device, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111008404A (en) | Service call auditing method, equipment and medium based on block chain | |
JP2019511059A (en) | Method and device for outputting risk information and constructing risk information | |
CN111415170A (en) | Block chain-based food tracing method and equipment and related storage medium | |
CN111737311A (en) | Donation material distribution method, device and medium based on block chain | |
CN111343241B (en) | Graph data updating method, device and system | |
US10169838B2 (en) | Multiple source watermarking for surveillance | |
CN111930497A (en) | Resource allocation method, device and medium based on block chain and static code | |
JP2019504426A (en) | Method and apparatus for generating random character string | |
CN110930578A (en) | Voting method, equipment and medium based on block chain | |
CN112967119A (en) | Bidding method, device and medium based on block chain | |
CN111443894A (en) | Random number generation method, device and medium based on block chain | |
CN111125115A (en) | Data storage method, device and medium based on block chain | |
CN112291321B (en) | Service processing method, device and system | |
CN111435495A (en) | Service processing method, device and equipment | |
CN111639998A (en) | Method, device and medium for guaranteeing user deposit rights and interests based on block chain | |
CN111131474A (en) | Method, device and medium for managing user protocol based on block chain | |
CN111464290A (en) | Block chain-based dynamic password generation method, equipment and medium | |
CN112035156A (en) | E-commerce platform docking device, method, equipment and medium | |
CN111611598A (en) | Block chain-based secure distributed cloud storage service implementation method, equipment and medium | |
CN111046267A (en) | Method, device and medium for processing network rumors based on block chains | |
CN116468436A (en) | Charging rule generation method and device | |
CN111125802A (en) | Method, device and medium for managing non-material cultural heritage information based on block chain | |
CN110990889A (en) | Method, equipment and medium based on block chain notarization prenuptial property | |
CN116993519A (en) | Bill generation method and device | |
US20230097507A1 (en) | Data backup optimization |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200806 Address after: Floor S01, Inspur Science Park, 1036 Inspur Road, hi tech Zone, Jinan City, Shandong Province Applicant after: Inspur cloud Information Technology Co.,Ltd. Address before: Room 3110, S01 building, Langchao building, No. 1036, Langchao Road, high tech Zone, Jinan City, Shandong Province 250101 Applicant before: Shandong Aicheng Network Information Technology Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |