CN111126987B - Resource transfer information processing method and device, storage medium and electronic device - Google Patents

Resource transfer information processing method and device, storage medium and electronic device Download PDF

Info

Publication number
CN111126987B
CN111126987B CN201911215741.0A CN201911215741A CN111126987B CN 111126987 B CN111126987 B CN 111126987B CN 201911215741 A CN201911215741 A CN 201911215741A CN 111126987 B CN111126987 B CN 111126987B
Authority
CN
China
Prior art keywords
block
resource transfer
transfer information
current
private key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911215741.0A
Other languages
Chinese (zh)
Other versions
CN111126987A (en
Inventor
赖俊凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911215741.0A priority Critical patent/CN111126987B/en
Publication of CN111126987A publication Critical patent/CN111126987A/en
Application granted granted Critical
Publication of CN111126987B publication Critical patent/CN111126987B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a resource transfer information processing method and device, a storage medium and an electronic device. Wherein, the method comprises the following steps: the method comprises the steps of obtaining a first information obtaining request, responding to the first information obtaining request, accessing a current block according to the address of the current block to obtain a current ciphertext in the current block, obtaining current resource transfer information through decryption, updating the address of the current block to the address of a next block under the condition that the address of the next block and a next private key used by the next block are recorded in the current block, and updating the current private key to the next private key. The invention solves the technical problems that in the prior art, when a financial institution acquires resource transfer information aiming at an account, a third-party data source is required to be relied on, so that the resource transfer information is inaccurate and the cost is overhigh.

Description

Resource transfer information processing method and device, storage medium and electronic device
Technical Field
The present invention relates to the field of computers, and in particular, to a method and an apparatus for processing resource transfer information, a storage medium, and an electronic apparatus.
Background
In the existing financial scene, each financial institution performs resource transfer monitoring aiming at financial accounts, and the data are acquired from a third-party data institution to evaluate the wind control capacity aiming at the financial accounts, so that the risk characterization aiming at the financial accounts is performed. For example, a multi-headed loan in the financial field is an act of a single borrower placing loan demands on two or more financial institutions. In today's multi-headed loan business, loans to multiple parties necessarily involve higher risks due to the limited repayment capabilities of individual users. Generally, when a borrower has a multi-head borrowing situation, it is described that the fund demand of the borrower has great difficulty, and the repayment capability of the borrower is reasonably suspected, but in the prior art, each credit agency faces the above problems, that is, the wind control capability of the multi-head borrower and lended crowd mostly depends on a third-party data source, and generally, the data of a plurality of third-party data sources are used to describe the risk of the specific borrower.
The technical problems that the data quality and accuracy are difficult to guarantee and data of a plurality of third-party data sources need to be combined due to the fact that the data sources depend on the third-party data sources, the wind control cost is too high, and the income effect is not matched exist in the prior art.
In view of the above problems, no effective solution has been proposed.
Disclosure of Invention
The embodiment of the invention provides a processing method and device for processing resource transfer information, a storage medium and an electronic device for the resource transfer information, and aims to at least solve the technical problems that in the prior art, when a financial institution acquires the resource transfer information aiming at an account, a third-party data source is required to be relied on, so that the resource transfer information is inaccurate and the cost is too high.
According to an aspect of the embodiments of the present invention, there is provided a method for processing resource transfer information, including: acquiring a first information acquisition request, wherein the first information acquisition request is used for requesting to acquire historical resource transfer information of a first account; in response to the first information acquisition request, repeatedly executing the following operations until an address of a next block and a next private key used by the next block are not recorded in a current block, wherein an initial value of the address of the current block is an address of a first block of the first account number acquired from a target hash table, and an initial value of the current private key is the first private key acquired from the target hash table: accessing the current block according to the address of the current block to obtain a current ciphertext in the current block, wherein the current ciphertext is obtained by encrypting current resource transfer information by using a current public key, and the current public key and the current private key are a pair of keys; decrypting the current ciphertext by using the current private key to obtain the current resource transfer information, wherein the historical resource transfer information comprises the current resource transfer information; and under the condition that the address of the next block and the next private key used by the next block are recorded in the current block, updating the address of the current block to the address of the next block, and updating the current private key to the next private key.
Optionally, before the obtaining the first information obtaining request, the method further includes: acquiring first resource transfer information generated by a first account in a first time period; generating a first key pair for the first resource transfer information, wherein the first key pair comprises a first private key and a first public key; encrypting the first resource transfer information by using the first public key to obtain a first ciphertext; sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext; acquiring a first verification result sent by the target block chain node; and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating a first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
Optionally, after the sending a block creation request to a target blockchain node on a target blockchain, the method further includes: decrypting the first ciphertext by using the first private key on the target block chain node to obtain the first resource transfer information; and determining that the first verification result is that the first resource transfer information is verified to be passed under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment.
Optionally, in a case where a first block is created on the target block chain, the method further includes: and updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
Optionally, the creating a block request further includes block information of a last block of the first account, where, in a case that the first verification result indicates that the first resource transfer information is verified, creating a first block on the target block chain includes: and in the case that the first verification result indicates that the first resource transfer information is verified and the block information of the last block comprises the address of the second block and/or the second private key, creating the first block on the target block chain.
Optionally, in a case that the first verification result indicates that the first resource transfer information is verified, creating a first block on the target block chain includes: and if the first verification result indicates that the first resource transfer information is verified to pass and the target block link point verifies other resource transfer information, creating the first block on the target block chain, wherein the first resource transfer information and the other resource transfer information are both the resource transfer information generated in the first time period.
Optionally, the other resource transfer information includes resource transfer information generated by a group of accounts in the first time period, the block creation request further includes block information of a last block of the first account and block information of a last block of each account in the group of accounts, where, in a case that the first verification result indicates that the first resource transfer information is verified to be passed and the target block link node verifies other resource transfer information to be passed, creating the first block on the target block chain, including: and in the case that the first verification result indicates that the first resource transfer information verification is passed and the block information of the last block of the first account and the block information of the last block of each account in the group of accounts are verified, creating the first block on the target block chain.
Optionally, when the first resource transfer information generated by the first account within the first time period is acquired, the method further includes: acquiring a set of resource transfer information generated by a set of accounts in the first time period, wherein the set of accounts is different from the first account; the first block further records a ciphertext obtained by encrypting the resource transfer information generated in the first time period for each account in the group of accounts, an address of a last block created for each account in the group of accounts, and a private key used in the last block.
According to another aspect of the embodiments of the present invention, there is also provided a device for processing resource transfer information, including:
an obtaining module, configured to obtain a first information obtaining request after a first block is created on the target block chain, where the first information obtaining request is used to request to obtain historical resource transfer information of the first account;
a response module, configured to respond to the first information obtaining request, and repeatedly perform the following operations until an address of a next block and a next private key used by the next block are not recorded in the current block, where an initial value of the address of the current block is the address of the first block where the first account is obtained from a target hash table, and an initial value of the current private key is the first private key obtained from the target hash table;
the processing module is used for accessing the current block according to the address of the current block to obtain a current ciphertext in the current block;
the decryption module is used for decrypting the current ciphertext by using the current private key to obtain current resource transfer information, wherein the historical resource transfer information comprises the current resource transfer information;
and the updating module is used for updating the address of the current block to the address of the next block and updating the current private key to the next private key under the condition that the address of the next block and the next private key used by the next block are also recorded in the current block.
Optionally, the apparatus is further configured to: acquiring first resource transfer information generated by a first account in a first time period; generating a first key pair for the first resource transfer information, wherein the first key pair comprises a first private key and a first public key; encrypting the first resource transfer information by using the first public key to obtain a first ciphertext; sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext; acquiring a first verification result sent by the target block chain node; and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating a first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
Optionally, the apparatus is further configured to: after the block creation request is sent to the target block chain node on the target block chain, the first cipher text is decrypted on the target block chain node by using the first private key, and the first resource transfer information is obtained; and determining that the first verification result is that the first resource transfer information is verified to be passed under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment.
Optionally, the apparatus is further configured to: and under the condition that a first block is created on the target block chain, updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
Optionally, the block creation request further includes block information of a last block of the first account, and the apparatus is further configured to create a first block on the target block chain if the first verification result indicates that the first resource transfer information is verified, as follows: and in the case that the first verification result indicates that the first resource transfer information is verified and the block information of the last block comprises the address of the second block and/or the second private key, creating the first block on the target block chain.
Optionally, the apparatus is further configured to create a first block on the target block chain if the first verification result indicates that the first resource transfer information is verified, by: and if the first verification result indicates that the first resource transfer information is verified to pass and the target block link point verifies other resource transfer information, creating the first block on the target block chain, wherein the first resource transfer information and the other resource transfer information are both the resource transfer information generated in the first time period.
Optionally, the other resource transfer information includes resource transfer information generated by a group of accounts during the first time period, the block creation request further includes block information of a last block of the first account, and block information of a last block of each account in the group of accounts, and the apparatus is further configured to create the first block on the target blockchain by: and in the case that the first verification result indicates that the first resource transfer information verification is passed and the block information of the last block of the first account and the block information of the last block of each account in the group of accounts are verified, creating the first block on the target block chain.
Optionally, the apparatus is further configured to: when the first resource transfer information generated by the first account in a first time period is acquired, acquiring a group of resource transfer information generated by a group of accounts in the first time period, wherein the group of accounts is different from the first account; the first block further records a ciphertext obtained by encrypting the resource transfer information generated in the first time period for each account in the group of accounts, an address of a last block created for each account in the group of accounts, and a private key used in the last block.
Optionally, the historical resource transfer information includes: the transaction information generated by the first account number on the target transaction platform comprises at least one of the following: fund transaction information, asset transaction information, the target transaction platform comprising one or more transaction platforms.
According to still another aspect of the embodiments of the present invention, there is also provided a computer-readable storage medium, in which a computer program is stored, wherein the computer program is configured to execute the above processing method of resource transfer information when running.
According to another aspect of the embodiments of the present invention, there is also provided an electronic apparatus, including a memory, a processor, and a computer program stored in the memory and executable on the processor, wherein the processor executes the method for processing the resource transfer information through the computer program.
In the embodiment of the invention, a first information acquisition request is acquired, the following operations are repeatedly executed in response to the first information acquisition request until the address of a next block and a next private key used by the next block are not recorded in the current block, the current block is accessed according to the address of the current block to obtain a current ciphertext in the current block, the current ciphertext is decrypted by using the current private key to obtain current resource transfer information, the address of the current block is updated to the address of the next block and the current private key is updated to the next private key under the condition that the address of the next block and the next private key used by the next block are also recorded in the current block, the resource transfer information is recorded in a block chain mode so as to be convenient for a financial institution to inquire, a third-party data source in the prior art is replaced, and the resource transfer history information of a related account can be directly obtained, the technical effects of reducing dependence on a third-party data source, improving information accuracy and reducing cost are achieved, and the technical problems that in the prior art, when a financial institution acquires resource transfer information aiming at an account, the third-party data source is required to be relied on, so that the resource transfer information is inaccurate and the cost is too high are solved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the invention and together with the description serve to explain the invention without limiting the invention. In the drawings:
FIG. 1 is an alternative structural diagram of a distributed system applied to a blockchain system according to an embodiment of the present invention;
FIG. 2 is an alternative block structure according to an embodiment of the present invention;
FIG. 3 is a flow chart of a method for processing resource transfer information according to an embodiment of the invention;
FIG. 4 is a diagram illustrating a method for processing resource transfer information according to an embodiment of the present invention;
FIG. 5 is a diagram illustrating another method for processing resource transfer information according to an embodiment of the invention;
FIG. 6 is a diagram illustrating another method for processing resource transfer information according to an embodiment of the present invention;
FIG. 7 is a diagram illustrating another method for processing resource transfer information according to an embodiment of the present invention;
FIG. 8 is a diagram illustrating another method for processing resource transfer information according to an embodiment of the present invention;
FIG. 9 is a diagram illustrating another method for processing resource transfer information according to an embodiment of the present invention;
fig. 10 is a schematic diagram of a resource transfer information processing apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the technical solutions of the present invention better understood, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
According to an aspect of the embodiments of the present invention, a method for processing resource transfer information is provided, and optionally, as an optional implementation manner, a system related to the embodiments of the present invention may be a distributed system formed by connecting a client, a plurality of nodes (any form of computing devices in an access network, such as a server and a user terminal) through a network communication form.
Taking a distributed system as an example of a blockchain system, referring To fig. 1, fig. 1 is an optional structural schematic diagram of a blockchain system To which a distributed system 100 provided by an embodiment of the present invention is applied, where the system is formed by a plurality of nodes 200 (computing devices in any form in an access network, such as servers and user terminals) and a client 300, a Peer-To-Peer (P2P, Peer To Peer) network is formed between the nodes, and a P2P Protocol is an application layer Protocol operating on a Transmission Control Protocol (TCP). In a distributed system, any machine, such as a server or a terminal, can join to become a node, and the node comprises a hardware layer, a middle layer, an operating system layer and an application layer.
Referring to the functions of each node in the blockchain system shown in fig. 1, the functions involved include:
1) routing, a basic function that a node has, is used to support communication between nodes.
Besides the routing function, the node may also have the following functions:
2) the application is used for being deployed in a block chain, realizing specific services according to actual service requirements, recording data related to the realization functions to form recording data, carrying a digital signature in the recording data to represent a source of task data, and sending the recording data to other nodes in the block chain system, so that the other nodes add the recording data to a temporary block when the source and integrity of the recording data are verified successfully.
For example, the services implemented by the application include:
2.1) wallet, for providing the function of transaction of electronic money, including initiating transaction (i.e. sending the transaction record of current transaction to other nodes in the blockchain system, after the other nodes are successfully verified, storing the record data of transaction in the temporary blocks of the blockchain as the response of confirming the transaction is valid; of course, the wallet also supports the querying of the remaining electronic money in the electronic money address;
and 2.2) sharing the account book, wherein the shared account book is used for providing functions of operations such as storage, query and modification of account data, record data of the operations on the account data are sent to other nodes in the block chain system, and after the other nodes verify the validity, the record data are stored in a temporary block as a response for acknowledging that the account data are valid, and confirmation can be sent to the node initiating the operations.
2.3) Intelligent contracts, computerized agreements, which can enforce the terms of a contract, implemented by codes deployed on a shared ledger for execution when certain conditions are met, for completing automated transactions according to actual business requirement codes, such as querying the logistics status of goods purchased by a buyer, transferring the buyer's electronic money to the merchant's address after the buyer signs for the goods; of course, smart contracts are not limited to executing contracts for trading, but may also execute contracts that process received information.
3) And the Block chain comprises a series of blocks (blocks) which are mutually connected according to the generated chronological order, new blocks cannot be removed once being added into the Block chain, and recorded data submitted by nodes in the Block chain system are recorded in the blocks.
Fig. 2 is an alternative schematic diagram of a Block Structure (Block Structure) according to an embodiment of the present invention, as shown in fig. 2, each Block includes a hash value of a transaction record (hash value of the Block) stored in the Block and a hash value of a previous Block, and the blocks are connected by the hash values to form a Block chain. The block may include information such as a time stamp at the time of block generation.
The Block Chain (Block Chain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. The blockchain is essentially a decentralized database, which is a string of data blocks associated by using cryptography, each data block contains information of a batch of network transactions, and the information is used for verifying the validity (anti-counterfeiting) of the information and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
Alliance chain (Alliance chain): only for a specific group member and a limited third party, a plurality of preselected nodes are internally designated as billers, the generation of each block is determined by all the preselected nodes, and the alliance chain is a block chain commonly used among organizations.
Multiple loan (Long-term lending): the individual borrower makes an action of lending demand to two or more financial institutions. Lending to multiple parties necessarily entails a higher risk due to the limited repayment capabilities of the individual users.
The invention is mainly applied to the existing financial service scene, when each financial institution carries out multi-head loan business, the whole multi-head loan population is depicted in the block chain by utilizing the characteristics of traceability, decentralization, asymmetric encryption and permanent storage of records and incapability of random tampering of the block chain technology, and for different financial institutions, the invention can be combined with resource transfer information on the block chain to carry out risk depiction and behavior tracking after resource transfer on accounts.
Optionally, as an optional implementation manner, fig. 3 is a flowchart of a processing method of resource transfer information according to an embodiment of the present invention, and as shown in fig. 3, the processing method of resource transfer information includes:
s302, a first information acquisition request is acquired, wherein the first information acquisition request is used for requesting to acquire historical resource transfer information of a first account;
s304, in response to the first information obtaining request, repeatedly performing the following operations until an address of a next block and a next private key used by the next block are not recorded in a current block, where an initial value of the address of the current block is an address of a first block of the first account obtained from the target hash table, and an initial value of the current private key is the first private key obtained from the target hash table:
s306, accessing the current block according to the address of the current block to obtain a current ciphertext in the current block, wherein the current ciphertext is obtained by encrypting current resource transfer information by using a current public key, and the current public key and the current private key are a pair of keys;
s308, decrypting the current ciphertext by using the current private key to obtain the current resource transfer information, wherein the historical resource transfer information comprises the current resource transfer information;
s310, updating the address of the current block to the address of the next block and updating the current private key to the next private key when the address of the next block and the next private key used by the next block are also recorded in the current block.
Optionally, in this embodiment, the first account number includes, but is not limited to, an account of each financial institution, and specifically, may include, but is not limited to, a loan account of each loan institution, where the account is used to represent resource information of the owner. The first resource transfer information is used for recording the resources transferred from the first account and/or the resources transferred to the first account in the first time period, and the resource transfer information may include but is not limited to transaction information of funds, information that all resources can be traded or replaced, such as mortgage or auction of tangible or intangible assets, and the like. The above embodiments are only one optional implementation manner, and may specifically include one or more combinations of the above embodiments
Optionally, in this embodiment, the key pair may be obtained through an existing algorithm, the private key is a non-public part and is stored in a hash table, the public key is a public part of the key pair, and is derived from a private key of a user, the private key generates the public key through an elliptic curve algorithm, the algorithm is a non-heap one-way encryption algorithm, the private key may generate the public key through the algorithm, but the public key cannot reversely exit from the private key.
Optionally, in this embodiment, the public key can be used to include an encrypted session key, verify a data signature, or encrypt data that can be decrypted with the private key of the response.
Optionally, in this embodiment, fig. 4 is a schematic diagram of a processing method of resource transfer information according to an embodiment of the present invention, and as shown in fig. 4, the technical architecture of this embodiment may include but is not limited to: an access layer, a logic layer, a network layer, a storage layer, a central control layer, etc. The following layers are illustrated:
an access layer: the system comprises an interface of the whole system for external service, and the main functions of the system comprise inputting account information to obtain the account, and searching the latest block address and the private key corresponding to the account from a hash table related to the account. If the account is not in the block chain, the account is marked to be added into the chain for the first time, a new private key is generated for the account, and the new private key enters a logic layer after the new private key is stored in an account hash table.
A logic layer: the core layer, including the entire system, is responsible for the logical processing of the entire system. The main work comprises the following steps: and acquiring all historical loan records from the chain according to the existing account information, and returning or generating a new block according to new loan behaviors, and the like.
Network layer: the underlying technology, including blockchain technology, and the underlying architecture, which stores the layers together, form the entire blockchain. Many characteristics in the block chain technology are realized in a network layer, such as a distributed algorithm, encryption and the like, and the network layer also has a main function of selecting nodes according to a used consensus algorithm for accounting so as to ensure data security.
A storage layer: in the block chain, all the processing nodes are provided with an accounting function, and distributed storage of data is guaranteed. In another alternative embodiment, the storage and network of the blockchain may be processed separately, which has the advantage of separating the network I/O from the storage I/O, and the two I/os may be custom optimized at their respective nodes to improve the performance of the overall system.
A central control layer: the system comprises a resource management and monitoring module which is responsible for resource monitoring and service log recording.
The above embodiments are merely one optional implementation manner, and may specifically include one or more combinations of the above.
Optionally, in this embodiment, fig. 5 is a schematic diagram of another resource transfer information processing method according to an embodiment of the present invention, and as shown in fig. 5, the data processing logic includes the following steps:
s502, according to the account information, the block address and the private key, the latest block for recording the account information is found. The operation is completed by the main accounting node selected by each financial institution according to the distributed consistency algorithm.
S504, the block content is read from the latest block. At this time, in the block, the content about the account information is in an encrypted state. Decryption using the private key of the account number is required. The decrypted content is mainly divided into two parts: one is the last resource transfer information of the account. The second is information corresponding to a last block of the account, including a last block address and a private key corresponding to the last block.
S506, according to the last block address of the account obtained in the second step and the corresponding private key, repeating the operations in the first step and the second step until all historical resource transfer information of the account is obtained.
And S508, integrating all the historical resource transfer information of the account, and then returning the information to the access layer. After receiving the information, the access layer returns all the information to the calling mechanism, and then the related mechanism analyzes the historical behavior of the calling mechanism to carry out risk assessment.
By the invention, a first information acquisition request is acquired, the following operations are repeatedly executed in response to the first information acquisition request until the address of the next block and the next private key used by the next block are not recorded in the current block, the current block is accessed according to the address of the current block to obtain the current ciphertext in the current block, the current private key is used for decrypting the current ciphertext to obtain the current resource transfer information, the address of the current block is updated to the address of the next block and the current private key is updated to the next private key under the condition that the address of the next block and the next private key used by the next block are also recorded in the current block, the resource transfer information is recorded in a block chain mode so as to be convenient for a financial institution to inquire, a third-party data source in the prior art is replaced, and the resource transfer history information of the related account can be directly obtained, the technical effects of reducing dependence on a third-party data source, improving information accuracy and reducing cost are achieved, and the technical problems that in the prior art, when a financial institution acquires resource transfer information aiming at an account, the third-party data source is required to be relied on, so that the resource transfer information is inaccurate and the cost is too high are solved.
In an optional embodiment, before the obtaining the first information obtaining request, the method further includes: acquiring first resource transfer information generated by the first account in a first time period; generating a first key pair for the first resource transfer information, wherein the first key pair comprises the first private key and a first public key; encrypting the first resource transfer information by using the first public key to obtain a first ciphertext; sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext; acquiring a first verification result sent by the target block chain node; and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating the first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
Optionally, in this embodiment, the target block chain node may include, but is not limited to, a terminal or a server in a block chain, where the ciphertext is a ciphertext encrypted by a public key belonging to the target block chain, and the ciphertext is verified by a private key generated by the target block chain node for the account.
Optionally, in this embodiment, the verification result may include pass or fail, and when the ciphertext is decrypted by using the private key, the ciphertext can be decrypted, and the verification result is determined to be pass; otherwise, the judgment is that the data fails.
Alternatively, the main body of the operations may be implemented by selecting the main accounting node according to a distributed consistency algorithm by each financial institution.
Optionally, in this embodiment, the time period may include, but is not limited to, a preset period of time, or include, but is not limited to, different time periods set according to different actual needs, for example, 12 hours, a day, a month, a quarter, a year, and the like. The above embodiments are merely one optional implementation manner, and may specifically include one or more combinations of the above.
In an optional embodiment, after sending the block creation request to the target blockchain node on the target blockchain, the method further comprises: decrypting the first ciphertext by using the first private key on the target block chain node to obtain first resource transfer information; and under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment, determining that the first verification result is that the first resource transfer information is verified to be passed.
Optionally, in this embodiment, the ciphertext includes the resource transfer information encrypted by the public key, and the sending of the block creation request to the target block link point on the target block chain may be sent in a manner including, but not limited to, broadcasting.
Optionally, in this embodiment, the determining that the first verification result is that the first resource transfer information verification passes includes: and after the target block chain node acquires the confirmation information of the first resource transfer information, verifying the resource transfer information, wherein the verification is passed if the resource transfer information of the verification account is really stored, and the verification is failed if the resource transfer information of the verification account is not really stored.
Optionally, in this embodiment, the blockchain may include, but is not limited to, a federation chain, and when the blockchain is a federation chain, all target blockchain nodes in the blockchain are required to be verified, and when all target blockchain nodes are required to be verified, it is only possible to determine that the current blockchain is legal.
In an alternative embodiment, in the case where the first block is created on the target block chain, the method further comprises: and updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
Optionally, in this embodiment, the target hash table may have different locations and be accessed through an access layer, fig. 6 is a schematic diagram of another resource transfer information processing method according to an embodiment of the present invention, and as shown in fig. 6, an account, an address of a latest block of the account, and a private key corresponding to the latest block are recorded in the hash table.
In an optional embodiment, the block creation request further includes block information of a block last to the first account, where creating the first block on the target blockchain in a case that the first verification result indicates that the first resource transfer information is verified includes: and creating the first block on the target block chain if the first verification result indicates that the first resource transfer information is verified and the block information of the last block comprises the address of the second block and/or the second private key.
Optionally, in this embodiment, fig. 7 is a schematic diagram of another resource transfer information processing method according to an embodiment of the present invention, and as shown in fig. 7, the first block includes first resource transfer information of a first account and corresponding previous block information, where the block information of the previous block includes an address of a second block and/or a second private key corresponding to the second block, and the second block is a block recorded before a first block recording time period.
Optionally, in this embodiment, the block creation request may further include resource transfer information of other accounts and corresponding last block information.
Through the embodiment, the resource transfer information of different accounts is recorded through the same block, so that the technical effects of saving resources and reducing consumption generated by a new block can be achieved.
In an alternative embodiment, in the case that the first verification result indicates that the first resource transfer information is verified, creating a first block on the target block chain includes: and under the condition that the first verification result shows that the first resource transfer information is verified to pass and the target block link point verifies other resource transfer information to pass, creating a first block on the target block chain, wherein the first resource transfer information and the other resource transfer information are the resource transfer information generated in the first time period.
Optionally, in this embodiment, the other resource transfer information may correspond to other resource transfer information of the same account or resource transfer information of other accounts different from the first account in a group of accounts, as shown in fig. 7, where the other resource transfer information and the first resource transfer information are both recorded in a newly created first block.
In an optional embodiment, the other resource transfer information includes resource transfer information generated by a group of accounts in a first time period, the block creation request further includes block information of a last block of the first account, and block information of a last block of each account in the group of accounts, wherein, in case that the first verification result indicates that the first resource transfer information is verified to be passed and the target block link node verifies the other resource transfer information to be passed, creating the first block on the target block chain, including: and creating the first block on the target block chain under the condition that the first verification result indicates that the first resource transfer information is verified to pass and the block information of the last block of the first account and the block information of the last block of each account in the group of accounts are verified to pass.
Optionally, in this embodiment, when the resource transfer information for each account passes the verification, and when the resource transfer information and the chunk information of each account recorded in the hash table pass the verification, it is determined that the verification is successful, and the first chunk is allowed to be created on the target chunk chain.
In an optional embodiment, when acquiring first resource transfer information generated by the first account within the first time period, the method further includes: acquiring a group of resource transfer information generated by a group of accounts in a first time period, wherein the group of accounts is different from the first account; the first block is also recorded with a cipher text obtained by encrypting the resource transfer information generated in the first time period for each account in the group of accounts, the address of the last block created for each account in the group of accounts and a private key used in the last block.
Optionally, in this embodiment, different private keys are generated corresponding to different account numbers, and by simultaneously encrypting a plurality of account numbers and decrypting the encrypted account numbers by corresponding private keys, the operation resources of the block nodes can be saved, and the overhead of generating a new block is reduced.
In an optional embodiment, the historical resource transfer information includes: the transaction information generated by the first account number on the target transaction platform comprises at least one of the following: fund transaction information, asset transaction information, the target transaction platform comprising one or more transaction platforms.
Optionally, in this embodiment, the asset transaction information may include, but is not limited to, non-fund transaction information, such as stock, futures, real estate, heavy metals, and other asset replacement information that may be used for conducting transactions. The target transaction platform may include, but is not limited to, various banks, lending institutions, insurance companies, and other platforms that process the resource transfer information.
The above is merely an example, and the present invention is not limited in any way to specific asset information or trading platform information.
The invention is further illustrated by the following specific examples:
fig. 8 is a schematic diagram of another resource transfer information processing method according to an embodiment of the present invention, and as shown in fig. 8, the new block is generated as follows:
at S802, all loan or payment operations (corresponding to the aforementioned resource transfer information) are first integrated by the master billing node for a period of time, typically 12 hours (corresponding to the aforementioned first time period). The specific contents are as follows:
a) different private keys are generated for different borrowers (corresponding to the aforementioned first account numbers). And the lending behavior is encrypted after the public key is derived by the private key.
b) The encrypted content has two main parts: one is the loan or repayment activity of the borrower, and the other is the block information of the loan information recorded last time.
c) Integrating all the borrower information in the time period according to the operations shown in a) to b).
S804, the master accounting node initiates a new block generation operation and broadcasts the operation to the full-block-chain node (corresponding to the target block-chain node).
And S806, when the other nodes receive the broadcast operation of the main accounting node, verifying whether the accounting operation of the main accounting node is true and effective according to all the lender information in the new block chain. The verification mainly comprises the following steps:
a) this time if the lender's loan or repayment activity is authentic, the verification fails if the fact does not exist.
b) And if the last block information corresponding to the lender is true, the verification fails.
c) Verification is successful if all the lenders recorded in the new block have passed verification with respect to a) -b) above.
d) For any node verification failure, the new block generation operation will terminate. In a federation chain, all nodes are required to count as a valid block when they pass authentication.
S808, after the verification for the content is successful, a new block is generated. At this time, the primary accounting node also updates the new block information to the lender hash table, so as to ensure that all the lender information in the hash table is the latest (the address of the latest block of the account number), and no loan or repayment action is missed at any time.
The hash table is used for storing an account number, an address of a latest block of the account number, and a private key on the latest block (which can be accessed through an access layer at different positions); recorded in the latest block are the current transaction record, the address of the last block, and the private key.
To this end, it corresponds to the lender that all new lending activities have been updated into the blockchain. The next time a new loan activity is available, the historical loan activity of the borrower can be fully retrieved from the blockchain. This has a significant impact on correctly characterizing the risk behavior of different lenders.
The above-mentioned embodiment is only an optional embodiment, and the present invention is not limited to the specific embodiment.
The invention may be practiced with applications including, but not limited to, lenders lending to credit institutions, the product logic of which is as follows:
fig. 9 is a schematic diagram of another resource transfer information processing method according to an embodiment of the present invention, and as shown in fig. 9, the product logic of this embodiment includes:
s902, the borrower initiates a borrowing request to a credit agency A;
s904, the credit agency A acquires account information of the lender;
s906, entering a risk assessment process;
s908, multi-head loan people are depicted based on the block chain technology;
s910, acquiring historical loan behaviors of the borrower;
s912, risk judgment is carried out, and whether lending is carried out aiming at the lender or not is carried out;
and S914, the lender performs lending according to the risk judgment result.
According to the embodiment, a borrower initiates a borrowing request to a credit agency A, after the credit agency A receives the borrowing request, the borrower enters a multi-head crowd client system for inquiry according to the data of the borrower, after all historical borrowing information of the borrower is called, the borrower enters a pneumatic control model for evaluation according to the past borrowing behavior and repayment behavior, and finally, whether the borrower is lended or not is judged according to an evaluation result, so that the inquiry of a third-party database can be reduced or even avoided, the cost is saved, and the accuracy of data can be ensured.
Since all data updates in the chain are participated in by a particular credit agency, the blockchain involved in this embodiment may be a federation chain, with all accounting nodes in the blockchain being all of the respective credit agencies participating in the system.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present invention is not limited by the order of acts, as some steps may occur in other orders or concurrently in accordance with the invention. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required by the invention.
According to another aspect of the embodiment of the present invention, there is also provided an apparatus for implementing the above method for processing resource transfer information. As shown in fig. 10, the apparatus includes:
an obtaining module 1002, configured to obtain a first information obtaining request after a first block is created on the target block chain, where the first information obtaining request is used to request to obtain historical resource transfer information of the first account;
a response module 1004, configured to respond to the first information obtaining request, repeatedly perform the following operations until an address of a next chunk and a next private key used by the next chunk are not recorded in the current chunk, where an initial value of the address of the current chunk is the address of the first chunk obtained from the target hash table for the first account, and an initial value of the current private key is the first private key obtained from the target hash table;
a processing module 1006, configured to access the current block according to the address of the current block to obtain a current ciphertext in the current block;
a decryption module 1008, configured to decrypt the current ciphertext with the current private key to obtain current resource transfer information, where the historical resource transfer information includes the current resource transfer information;
an updating module 1010, configured to update the address of the current block to the address of the next block and update the current private key to the next private key when the address of the next block and the next private key used by the next block are also recorded in the current block.
In an optional embodiment, the apparatus is further configured to: acquiring first resource transfer information generated by a first account in a first time period; generating a first key pair for the first resource transfer information, wherein the first key pair comprises a first private key and a first public key; encrypting the first resource transfer information by using the first public key to obtain a first ciphertext; sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext; acquiring a first verification result sent by the target block chain node; and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating a first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
In an optional embodiment, the apparatus is further configured to: after the block creation request is sent to the target block chain node on the target block chain, the first cipher text is decrypted on the target block chain node by using the first private key, and the first resource transfer information is obtained; and determining that the first verification result is that the first resource transfer information is verified to be passed under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment.
In an optional embodiment, the apparatus is further configured to: and under the condition that a first block is created on the target block chain, updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
In an optional embodiment, the block creation request further includes block information of a block last in the first account, and the apparatus is further configured to create a first block on the target block chain if the first verification result indicates that the first resource transfer information is verified, as follows: and in the case that the first verification result indicates that the first resource transfer information is verified and the block information of the last block comprises the address of the second block and/or the second private key, creating the first block on the target block chain.
In an optional embodiment, the apparatus is further configured to create a first chunk on the target blockchain if the first verification result indicates that the first resource transfer information is verified, by: and if the first verification result indicates that the first resource transfer information is verified to pass and the target block link point verifies other resource transfer information, creating the first block on the target block chain, wherein the first resource transfer information and the other resource transfer information are both the resource transfer information generated in the first time period.
In an alternative embodiment, the other resource transfer information includes resource transfer information generated by a group of accounts during the first time period, the block creation request further includes block information of a block last to the first account, and block information of a block last to each account in the group of accounts, and the apparatus is further configured to create the first block on the target blockchain by: and in the case that the first verification result indicates that the first resource transfer information verification is passed and the block information of the last block of the first account and the block information of the last block of each account in the group of accounts are verified, creating the first block on the target block chain.
In an optional embodiment, the apparatus is further configured to: when the first resource transfer information generated by the first account in a first time period is acquired, acquiring a group of resource transfer information generated by a group of accounts in the first time period, wherein the group of accounts is different from the first account; the first block further records a ciphertext obtained by encrypting the resource transfer information generated in the first time period for each account in the group of accounts, an address of a last block created for each account in the group of accounts, and a private key used in the last block.
In an optional embodiment, the historical resource transfer information includes: the transaction information generated by the first account number on the target transaction platform comprises at least one of the following: fund transaction information, asset transaction information, the target transaction platform comprising one or more transaction platforms.
According to a further aspect of the embodiments of the present invention, there is also provided an electronic device for implementing the method for processing resource transfer information, the electronic device including a memory and a processor, the memory storing a computer program therein, the processor being configured to execute the steps in any one of the method embodiments by the computer program.
Optionally, in this embodiment, the electronic apparatus may be located in at least one network device of a plurality of network devices of a computer network.
Optionally, in this embodiment, the processor may be configured to execute the following steps by a computer program:
s1, acquiring first resource transfer information generated by the first account in a first time period;
s2, generating a first key pair for the first resource transfer information, wherein the first key pair comprises a first private key and a first public key;
s3, encrypting the first resource transfer information by using the first public key to obtain a first ciphertext;
s4, sending a block creation request to a target block chain node on the target block chain, wherein the block creation request comprises a first ciphertext and is used for requesting the target block chain node to verify first resource transfer information decrypted by the first ciphertext;
s5, acquiring a first verification result sent by the target block chain node;
s6, when the first verification result indicates that the first resource transfer information passes the verification, creating a first block on the target block chain, where the first block records a first ciphertext, an address of the created second block, and a second private key, the second block records a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting the second resource transfer information using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
Alternatively, as will be understood by those skilled in the art, the electronic device may also be a terminal device such as a smart phone (e.g., an Android phone, an iOS phone, etc.), a tablet computer, a palm computer, and a Mobile Internet Device (MID), a PAD, etc.
The memory may be used to store software programs and modules, such as program instructions/modules corresponding to the method and apparatus for processing resource transfer information in the embodiments of the present invention, and the processor executes various functional applications and data processing by running the software programs and modules stored in the memory, that is, implements the method for processing resource transfer information. The memory may include high speed random access memory, and may also include non-volatile memory, such as one or more magnetic storage devices, flash memory, or other non-volatile solid-state memory. In some examples, the memory may further include memory located remotely from the processor, and these remote memories may be connected to the terminal through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof. The memory may be specifically, but not limited to, used for storing resource transfer information, key pairs, hash tables, and other information. As an example, the memory may include, but is not limited to, the first obtaining module 1002, the generating module 1004, the encrypting module 1006, the sending module 1008, the second obtaining module 1010, and the creating module 1012 in the processing apparatus that includes the resource transfer information. In addition, the resource transfer information processing apparatus may further include, but is not limited to, other module units in the resource transfer information processing apparatus, which is not described in detail in this example.
Optionally, the transmission device is used for receiving or sending data via a network. Examples of the network may include a wired network and a wireless network. In one example, the transmission device includes a Network adapter (NIC) that can be connected to the router via a Network cable and other Network devices to communicate with the internet or a local area Network. In one example, the transmission device is a Radio Frequency (RF) module, which is used to communicate with the internet in a wireless manner.
In addition, the electronic device further includes: the display is used for displaying the resource transfer information; and a connection bus for connecting the respective module parts in the electronic apparatus.
According to a further aspect of an embodiment of the present invention, there is also provided a computer-readable storage medium having a computer program stored thereon, wherein the computer program is arranged to perform the steps of any of the above method embodiments when executed.
Alternatively, in the present embodiment, the above-mentioned computer-readable storage medium may be configured to store a computer program for executing the steps of:
alternatively, in this embodiment, a person skilled in the art may understand that all or part of the steps in the methods of the foregoing embodiments may be implemented by a program instructing hardware associated with the terminal device, where the program may be stored in a computer-readable storage medium, and the storage medium may include: flash disks, Read-Only memories (ROMs), Random Access Memories (RAMs), magnetic or optical disks, and the like.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
The integrated unit in the above embodiments, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in the above computer-readable storage medium. Based on such understanding, the technical solution of the present invention may be substantially or partially implemented in the prior art, or all or part of the technical solution may be embodied in the form of a software product stored in a storage medium, and including instructions for causing one or more computer devices (which may be personal computers, servers, or network devices) to execute all or part of the steps of the method according to the embodiments of the present invention.
In the above embodiments of the present invention, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the several embodiments provided in the present application, it should be understood that the disclosed client may be implemented in other manners. The above-described embodiments of the apparatus are merely illustrative, and for example, a division of a unit is merely a division of a logic function, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, units or modules, and may be in an electrical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The foregoing is only a preferred embodiment of the present invention, and it should be noted that it is obvious to those skilled in the art that various modifications and improvements can be made without departing from the principle of the present invention, and these modifications and improvements should also be considered as the protection scope of the present invention.

Claims (15)

1. A method for processing resource transfer information is characterized by comprising the following steps:
acquiring a first information acquisition request, wherein the first information acquisition request is used for requesting to acquire historical resource transfer information of a first account;
responding to the first information acquisition request, and repeatedly executing the following operations until an address of a next block and a next private key used by the next block are not recorded in a current block, wherein the initial value of the address of the current block is the address of the first block of the first account number acquired from the target hash table, and the initial value of the current private key is the first private key acquired from the target hash table;
accessing the current block according to the address of the current block to obtain a current ciphertext in the current block, wherein the current ciphertext is obtained by encrypting current resource transfer information by using a current public key, and the current public key and the current private key are a pair of keys;
decrypting the current ciphertext by using the current private key to obtain the current resource transfer information, wherein the historical resource transfer information comprises the current resource transfer information;
and under the condition that the address of the next block and the next private key used by the next block are recorded in the current block, updating the address of the current block to the address of the next block, and updating the current private key to the next private key.
2. The method of claim 1, wherein prior to said obtaining the first information obtaining request, the method further comprises:
acquiring first resource transfer information generated by the first account in a first time period;
generating a first key pair for the first resource transfer information, wherein the first key pair comprises the first private key and a first public key;
encrypting the first resource transfer information by using the first public key to obtain a first ciphertext;
sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext;
acquiring a first verification result sent by the target block chain node;
and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating the first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
3. The method of claim 2, wherein after sending the block creation request to the target blockchain node on the target blockchain, the method further comprises:
decrypting the first ciphertext by using the first private key on the target block chain node to obtain the first resource transfer information;
and determining that the first verification result is that the first resource transfer information is verified to be passed under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment.
4. The method of claim 2, wherein in the case of creating a first block on the target blockchain, the method further comprises:
and updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
5. The method according to claim 2, wherein the block creation request further includes block information of a last block of the first account, wherein, in the case that the first verification result indicates that the first resource transfer information is verified, creating a first block on the target block chain comprises:
and in the case that the first verification result indicates that the first resource transfer information is verified and the block information of the last block comprises the address of the second block and/or the second private key, creating the first block on the target block chain.
6. The method of claim 2, wherein in the case that the first verification result indicates that the first resource transfer information is verified, creating a first block on the target block chain comprises:
and if the first verification result indicates that the first resource transfer information is verified to pass and the target block link point verifies other resource transfer information, creating the first block on the target block chain, wherein the first resource transfer information and the other resource transfer information are both the resource transfer information generated in the first time period.
7. The method of claim 6, wherein the other resource transfer information comprises resource transfer information generated by a set of accounts during the first time period, wherein the block creation request further comprises block information of a last block of the first account, and block information of a last block of each account in the set of accounts, wherein creating the first block on the target block chain if the first verification result indicates that the first resource transfer information is verified and the target block link node verifies other resource transfer information comprises:
and in the case that the first verification result indicates that the first resource transfer information verification is passed and the block information of the last block of the first account and the block information of the last block of each account in the group of accounts are verified, creating the first block on the target block chain.
8. The method according to claim 6, wherein when acquiring the first resource transfer information generated by the first account within the first time period, the method further comprises: acquiring a set of resource transfer information generated by a set of accounts in the first time period, wherein the set of accounts is different from the first account;
the first block further records a ciphertext obtained by encrypting the resource transfer information generated in the first time period for each account in the group of accounts, an address of a last block created for each account in the group of accounts, and a private key used in the last block.
9. The method of any of claims 1 to 8, wherein the historical resource transfer information comprises: the transaction information generated by the first account number on the target transaction platform comprises at least one of the following: fund transaction information, asset transaction information, the target transaction platform comprising one or more transaction platforms.
10. An apparatus for processing resource transfer information, the apparatus comprising:
the system comprises a first acquisition module, a first processing module and a first processing module, wherein the first acquisition module is used for acquiring a first information acquisition request, and the first information acquisition request is used for requesting to acquire historical resource transfer information of a first account;
a response module, configured to respond to the first information obtaining request, repeatedly perform the following operations until an address of a next chunk and a next private key used by the next chunk are not recorded in a current chunk, where an initial value of the address of the current chunk is an address of a first chunk obtained from a target hash table for the first account, and an initial value of the current private key is the first private key obtained from the target hash table:
the access module is used for accessing the current block according to the address of the current block to obtain a current ciphertext in the current block;
the decryption module is used for decrypting the current ciphertext by using a current private key to obtain current resource transfer information, wherein the historical resource transfer information comprises the current resource transfer information;
and the updating module is used for updating the address of the current block to the address of the next block and updating the current private key to the next private key under the condition that the address of the next block and the next private key used by the next block are also recorded in the current block.
11. The apparatus of claim 10, wherein the apparatus is further configured to:
acquiring first resource transfer information generated by a first account in a first time period;
generating a first key pair for the first resource transfer information, wherein the first key pair comprises a first private key and a first public key;
encrypting the first resource transfer information by using the first public key to obtain a first ciphertext;
sending a block creation request to a target blockchain node on a target blockchain, wherein the block creation request includes the first ciphertext, and the block creation request is used for requesting the target blockchain node to verify the first resource transfer information decrypted by the first ciphertext;
acquiring a first verification result sent by the target block chain node;
and under the condition that the first verification result indicates that the first resource transfer information passes verification, creating a first block on the target block chain, wherein the first block is recorded with the first ciphertext, the address of the created second block and a second private key, the second block is recorded with a second ciphertext, the second ciphertext is a ciphertext obtained by encrypting second resource transfer information by using a second public key corresponding to the second private key, the second resource transfer information is resource transfer information generated by the first account in a second time period, and the second time period is a previous time period of the first time period.
12. The apparatus of claim 11, wherein the apparatus is further configured to:
after the block creation request is sent to the target block chain node on the target block chain, the first cipher text is decrypted on the target block chain node by using the first private key, and the first resource transfer information is obtained;
and determining that the first verification result is that the first resource transfer information is verified to be passed under the condition that the target block chain node acquires the confirmation information of the first resource transfer information from the target equipment.
13. The apparatus of claim 11, wherein the apparatus is further configured to:
and under the condition that a first block is created on the target block chain, updating the latest block information corresponding to the first account in the target hash table from the address of the second block and the second private key to the address of the first block and the first private key.
14. A computer-readable storage medium comprising a stored program, wherein the program when executed performs the method of any of claims 1 to 9.
15. An electronic device comprising a memory and a processor, characterized in that the memory has stored therein a computer program, the processor being arranged to execute the method of any of claims 1 to 9 by means of the computer program.
CN201911215741.0A 2019-12-02 2019-12-02 Resource transfer information processing method and device, storage medium and electronic device Active CN111126987B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911215741.0A CN111126987B (en) 2019-12-02 2019-12-02 Resource transfer information processing method and device, storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911215741.0A CN111126987B (en) 2019-12-02 2019-12-02 Resource transfer information processing method and device, storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN111126987A CN111126987A (en) 2020-05-08
CN111126987B true CN111126987B (en) 2021-02-19

Family

ID=70496888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911215741.0A Active CN111126987B (en) 2019-12-02 2019-12-02 Resource transfer information processing method and device, storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN111126987B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112100637A (en) * 2020-09-29 2020-12-18 深圳壹账通智能科技有限公司 Encryption method, device, equipment and medium based on correction quantity
CN112381634A (en) * 2020-11-20 2021-02-19 湖南智慧政务区块链科技有限公司 Tax statistics and settlement method, device, equipment and storage medium
CN113408894B (en) * 2021-06-18 2022-04-08 南京昊华科技有限公司 Auction asset risk monitoring and evaluating system and method based on cloud computing

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105608146A (en) * 2015-12-17 2016-05-25 布比(北京)网络技术有限公司 Block chain tracing method
CN106503574B (en) * 2016-09-13 2019-11-05 中国电子科技集团公司第三十二研究所 Block chain safe storage method
CN106341421B (en) * 2016-10-31 2019-04-02 杭州云象网络技术有限公司 A kind of method for interchanging data based on block chain technology
CN108171601B (en) * 2016-12-07 2021-07-27 中国电信股份有限公司 Block chain source tracing method, device and system
KR20190120680A (en) * 2018-04-16 2019-10-24 안희태 Block Chain Based Cryptocurrency Transaction Method
CN109242699A (en) * 2018-06-28 2019-01-18 平安科技(深圳)有限公司 Medical insurance Claims Resolution method, system and computer equipment based on block chain
CN109241357A (en) * 2018-08-08 2019-01-18 深圳市金泽智联信息技术有限公司 Chain structure model and its construction method, system and terminal device
CN109741162A (en) * 2018-09-03 2019-05-10 上海奥若拉信息科技集团有限公司 The storage of personal collage-credit data, processing, sharing method and system based on block chain
CN109784931B (en) * 2019-02-27 2024-04-05 成都埃克森尔科技有限公司 Query method of data query platform based on blockchain
CN110009353A (en) * 2019-04-01 2019-07-12 北京柏链基石科技有限公司 A kind of account register method, device and electronic equipment based on block chain

Also Published As

Publication number Publication date
CN111126987A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
US12021992B2 (en) System and method for authenticating user identity
US11250507B2 (en) Trusted tokenized transactions in a blockchain system
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
CN112003858B (en) Block chain-based platform docking method, electronic device and storage medium
US10742398B2 (en) Bespoke programmable crypto token
CN107846278B (en) Intelligent contract processing method and device
US20180285971A1 (en) Management of consumer debt collection using a blockchain and machine learning
CN111444209B (en) Data processing method, device, equipment and medium based on block chain
CN111126987B (en) Resource transfer information processing method and device, storage medium and electronic device
JP2019522275A (en) Electronic mortgage brokerage and monitoring
CN110458709B (en) Resource transfer information transmission method and device, storage medium and electronic device
CN111861477A (en) Block chain-based post-transaction data processing method and device and computer equipment
CN110751485A (en) Data processing method and equipment
CN111507839A (en) Data processing method and device based on block chain, storage medium and equipment
US20200005307A1 (en) Collaborative analytics for fraud detection through a shared public ledger
US20210273780A1 (en) Encrypted blockchain voting system
CN112862303B (en) Crowdsourcing quality evaluation system and method based on block chain
CN112801778A (en) Federated bad asset blockchain
CN110490640A (en) Method, apparatus and system for object distribution processor
Pouwelse et al. Laws for creating trust in the blockchain age
US20210256512A1 (en) Provisioning Of Assets Based On Content Usage
CN113269649A (en) System and method for tracking digital currency
CN111209337A (en) Financial report generation system, method, device, equipment and medium based on block chain
CN111882436B (en) Data processing method, device and equipment based on block chain
CN112734455B (en) Method, device and equipment for generating prize exchanging result and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant