CN111310240A - Financial data tracing method and device based on block chain and identification technology - Google Patents

Financial data tracing method and device based on block chain and identification technology Download PDF

Info

Publication number
CN111310240A
CN111310240A CN202010370723.6A CN202010370723A CN111310240A CN 111310240 A CN111310240 A CN 111310240A CN 202010370723 A CN202010370723 A CN 202010370723A CN 111310240 A CN111310240 A CN 111310240A
Authority
CN
China
Prior art keywords
data
identifier
message
encrypted data
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010370723.6A
Other languages
Chinese (zh)
Inventor
杨东伟
王栋
蒋炜
李旭
龚政
玄佳兴
石欣
吕佳宇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guowang Xiongan Finance Technology Group Co ltd
State Grid Blockchain Technology Beijing Co ltd
State Grid E Commerce Co Ltd
Original Assignee
Guowang Xiongan Finance Technology Group Co ltd
State Grid Blockchain Technology Beijing Co ltd
State Grid E Commerce Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guowang Xiongan Finance Technology Group Co ltd, State Grid Blockchain Technology Beijing Co ltd, State Grid E Commerce Co Ltd filed Critical Guowang Xiongan Finance Technology Group Co ltd
Priority to CN202010370723.6A priority Critical patent/CN111310240A/en
Publication of CN111310240A publication Critical patent/CN111310240A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses financial data traceability method based on a block chain and an identification technology, financial data can be stored in the block chain and used for data traceability, and data in the block chain can not be tampered, so that safety and reliability of traceability data and processes are effectively improved. Specifically, the second device may send the first encrypted data to the first device, and the first device stores the first encrypted data in the blockchain. When the first device stores the first encrypted data in the blockchain, the first device may obtain the first identifier, and correspondingly store the first identifier and the first encrypted data in the blockchain. After the first device correspondingly stores the first encrypted data and the first identifier in the block chain, a first message carrying the first identifier may be sent to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain. The first identifier may be used as an index to the first encrypted data to facilitate tracing the first encrypted data.

Description

Financial data tracing method and device based on block chain and identification technology
Technical Field
The application relates to the field of data storage, in particular to a financial data source tracing method and device based on a block chain and an identification technology.
Background
The security of financial data is particularly important. Financial data, once tampered with, can affect the property security of individual users as well as enterprise users. The traditional technology for storing the financial data can tamper with the financial data without cost and risk as long as related rights are obtained.
Therefore, a solution to solve the above problems is urgently needed.
Disclosure of Invention
The technical problem to be solved by the application is how to ensure the security of financial data, and a financial data tracing method and device based on a block chain and an identification technology are provided.
In a first aspect, an embodiment of the present application provides a financial data tracing method based on a blockchain and an identification technology, where the method includes:
the first device acquires first encrypted data from the second device;
the first equipment acquires a first identifier and correspondingly stores the first encrypted data and the first identifier into a block chain;
and the first device sends a first message carrying the first identifier to the second device, wherein the first message is used for indicating that the first encrypted data is successfully stored in the block chain, and the first identifier is used for tracing the first encrypted data.
Optionally, the method further includes:
the first device receives a second message from the second device, where the second message carries the first identifier, and the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device;
the first device obtains the first encrypted data according to the first identifier, the first encrypted data correspondingly stored in the block chain and the first identifier;
and the first equipment sends the obtained data to the second equipment.
Optionally, before the first device receives the first encrypted data from the second device, the method further includes:
the first device receives a third message from the second device, wherein the third message is used for requesting the first device to allow the second device to access;
the first device sends a fourth message to the second device, wherein the fourth message is used for indicating that the first device allows the second device to access.
Alternatively to this, the first and second parts may,
the fourth message includes a first public key, and the first encrypted data is data obtained by encrypting the first data with the first public key.
Optionally, the first data includes: first service data and a corresponding serial number.
In a second aspect, an embodiment of the present application provides a financial data tracing apparatus based on a blockchain and an identification technology, where the apparatus includes:
a first acquisition unit configured to acquire first encrypted data from a second device;
a second obtaining unit, configured to obtain the first identifier;
the storage unit is used for correspondingly storing the first encrypted data and the first identifier into a block chain;
a first sending unit, configured to send a first message carrying the first identifier to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain, and the first identifier is used to trace to the source of the first encrypted data.
Optionally, the apparatus further comprises:
a first receiving unit, configured to receive a second message from the second device, where the second message carries the first identifier, and the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device;
a third obtaining unit, configured to obtain the first encrypted data according to the first identifier, the first encrypted data that is correspondingly stored in the block chain, and the first identifier;
and the second sending unit is used for sending the obtained data to the second equipment.
Optionally, the apparatus further comprises:
a second receiving unit, configured to receive a third message from a second device before receiving first encrypted data from the second device, where the third message is used to request the first device to allow the second device to access;
a third sending unit, configured to send a fourth message to the second device, where the fourth message is used to indicate that the first device allows the second device to access.
Alternatively to this, the first and second parts may,
the fourth message includes a first public key, and the first encrypted data is data obtained by encrypting the first data with the first public key.
Optionally, the first data includes: first service data and a corresponding serial number.
Compared with the prior art, the embodiment of the application has the following advantages:
the embodiment of the application provides a financial data traceability method based on a block chain and an identification technology, which can store financial data in the block chain for data traceability, and because data in the block chain can not be tampered, compared with the traditional traceability technology, the safety and reliability of the traceability data and the process are effectively improved. Specifically, the second device may send the first encrypted data to the first device, and the first device stores the first encrypted data in the blockchain. When the first device stores the first encrypted data in the blockchain, the first device may obtain the first identifier, and correspondingly store the first identifier and the first encrypted data in the blockchain. After the first device correspondingly stores the first encrypted data and the first identifier in the block chain, a first message carrying the first identifier may be sent to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain. The first identifier may trace the source of the first encrypted data, and specifically, the first identifier may be used as an index of the first encrypted data, so that a subsequent second device can read the first encrypted data from the blockchain.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments described in the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a financial data tracing method based on a blockchain and an identification technology according to an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a financial data tracing apparatus based on a block chain and an identification technology according to an embodiment of the present disclosure.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The inventor of the application discovers that the traditional financial data tracing technology can tamper the financial data without cost and risk as long as related rights are obtained.
In order to solve the above problems, in the embodiment of the present application, the financial data may be stored in the blockchain, and since the data in the blockchain cannot be tampered with, compared with the conventional traceability technology, the security and reliability of the traceability data and the process are effectively improved.
For ease of understanding, a brief description of the relevant contents of the blockchain will be provided first.
A Blockchain (Blockchain) can be viewed as a distributed public database (otherwise known as a public ledger). The block chain technology mainly comprises five key elements, namely modern cryptography, a distributed point-to-point network communication technology, a decentralized consistency consensus algorithm, an excitation mechanism and programmable script codes.
From the aspect of block link point composition, the block chain can be divided into a public chain, a federation chain and a private chain. Public links are disclosed to the whole network, any organization and individuals can be added as nodes, data on the links are disclosed to the whole network, users can randomly access the data on the links without authorization, and decentralization is achieved in the true sense. Typical representatives of the current public link include Ether Fang, Bixie, etc., but because nodes of the public link are numerous and most of the nodes use workload evidencing (PoW), the block generation speed is very slow, taking the Bixie as an example, the generation of a new block needs 10 minutes, and the completion of one transaction needs nearly one hour, which obviously cannot meet the requirements of the current Internet. The alliance chain is different from a public chain, the enterprises participating in the alliance jointly build nodes to form a block chain, the consensus rule of the block chain is formulated by alliance members, data of the alliance chain is limited and open, only the enterprises and individuals authorized by the alliance have authority to access the data on the chain, the alliance chain has high requirements for transaction delay and concurrency, therefore, the number of the nodes is relatively small and generally does not exceed one hundred, Practical Byzantine Fault Tolerance (PBFT), Raft and the like are mostly adopted in the consensus algorithm, and the private chain does not have generalizability and is not introduced any more.
The blockchain mentioned in the following embodiments of the present application may be a federation chain.
Various non-limiting embodiments of the present application are described in detail below with reference to the accompanying drawings.
Exemplary method
Referring to fig. 1, the figure is a schematic flowchart of a financial data tracing method based on a blockchain and an identification technology according to an embodiment of the present disclosure.
The data storage method provided by the embodiment of the application can be implemented, for example, through the following steps S101 to S103.
S101: the first device receives first encrypted data from the second device.
In an embodiment of the present application, the first device is a device for storing data. The second device may be a device that generates data, such as financial data. The second device may be, for example, a server of a financial system, for example, a server of a bank.
The first encrypted data is data obtained by encrypting the first data by the second device, and the second device sends the encrypted data to the first device, so that the first device stores the encrypted data in the block chain to ensure the security of the first encrypted data.
The embodiment of the present application does not specifically limit the first data, and the first data may include, for example, the first service data and a corresponding serial number. Wherein the first business data includes, but is not limited to, one or more of consumption data, transfer data, financial product purchase data, financial product redemption data, and the like.
S102: the first equipment acquires a first identifier and correspondingly stores the first encrypted data and the first identifier into a block chain.
In this embodiment, after receiving the first encrypted data, the first device may store the first encrypted data in the blockchain. It is understood that the second device stores the first encrypted data in the blockchain, so as to obtain the reliable and untampered first encrypted data when the first encrypted data is used subsequently. In view of this, after receiving the first encrypted data, the first device may obtain the first identifier, and store the first identifier and the first encrypted data in the blockchain correspondingly. In this embodiment, the first identifier may be used to uniquely identify the first encrypted data, and may be an index of the first encrypted data.
The embodiment of the present application does not specifically limit a specific implementation manner of the first device acquiring the first identifier, and as an example, the first device may generate the first identifier. As yet another example, the first device may obtain the first identification from the other device.
S103: and the first equipment sends a first message carrying the first identifier to the second equipment, wherein the first message is used for indicating that the first encrypted data is successfully stored in the block chain, and the first identifier is used for tracing the source of the first encrypted data.
After the first device stores the first identifier and the first encrypted data in the blockchain, the second device may be notified that the first encrypted data has been successfully stored in the blockchain. Specifically, the first device may send a first message carrying a first identifier to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain. The first identifier carried in the first message is used as an index for the first encrypted data.
As can be seen from the above description, in the embodiment of the present application, data, for example, financial data, may be stored in a blockchain, and since the data in the blockchain is not tampered with, the security of the data is effectively improved compared to the conventional data storage technology. Moreover, after successful storage, the first device sends the index of the first encrypted data, i.e. the first identifier, to the second device, so that the second device can read the first encrypted data from the blockchain by using the index of the first encrypted data. I.e. to facilitate the second device to trace the source of the first encrypted data using the first identity.
In an implementation manner, when the subsequent second device needs to obtain the first encrypted data from the block chain, a second message carrying the first identifier may be sent to the first device, where the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device. As described above, the first device stores the first identifier and the first encrypted data in the block chain correspondingly, that is, the block chain stores the corresponding relationship between the first encrypted data and the first identifier. Therefore, after receiving the second message carrying the first identifier, the first device may search for the first encrypted data from the block chain according to the correspondence between the first encrypted data and the first identifier, and further, the first device may read the first encrypted data stored in the block chain and send the first encrypted data to the second device.
It is to be understood that since the first encrypted data is stored in the blockchain, the security of the first encrypted data can be secured. After the second device receives the first encrypted data, the second device can analyze and process the first encrypted data, and because the security of the first encrypted data is guaranteed, the reliability of a result obtained by analyzing and processing the first encrypted data is also guaranteed.
In an implementation manner of the embodiment of the present application, the first device may reserve an interactive interface for the second device, and before the second device stores the first encrypted data in the block chain through the first device, the second device may send a third message to the first device, where the third message is used to request the first device to allow the second device to access. The second device may perform storing the first encrypted data into the blockchain by the first device only after the first device allows access by the second device. In this embodiment, the third message may include, for example, information about a business to which the financial system corresponding to the second device belongs, and user information of the operation user that triggered the third request. For example, the third message includes information of bank a and information of the service manager that triggered the third request. After receiving the third message, the first device may perform auditing on information carried in the third message, and once the auditing is passed, the first device may send a fourth message to the second device, where the fourth message is used to indicate that the first device allows the second device to access.
As described above, the first encrypted data is data obtained after the second device encrypts the first data, and in this embodiment, the first encrypted data is data obtained by encrypting the first data by using the first public key by the second device. In an implementation manner, the first public key may be allocated by the first device for the first data, and specifically, after receiving the third request, if the information included in the third request is approved, the first device may generate the first public key and a first private key corresponding to the first public key. After the first device generates the first public key and the first private key, the first public key and the first private key are carried in a fourth message and sent to the second device, and the second device can encrypt the first data by using the first public key. It is understood that after the second device reads the first encrypted data from the blockchain through the first device, the first encrypted data can be decrypted by using the first private key, so as to obtain the original first data.
In some implementations, to ensure data security, the second device may encrypt the first data with the first public key, and may further encrypt the data obtained by encrypting the first data with the first public key with a corresponding key algorithm to obtain a second encryption. That is, the data received from the second device by the first device is data obtained by encrypting the first encrypted data by using a symmetric key algorithm. For this case, after the first device receives the data from the second device, the received data may be decrypted using a symmetric key algorithm, thereby obtaining first encrypted data.
In the embodiment of the application, the first device may interact with other devices besides the second device. As an example, the first device may also interact with a third device, which may be servers of different financial systems. For example, the second device is a bank a and a server, and the third device is a server of a bank B. Regarding the interaction between the third device and the first device, the interaction is similar to the interaction between the second device and the first device, and is not described in detail here.
In this embodiment, the first device may perform the method provided in the above embodiment, and may also analyze the first encrypted data, for example, analyze the first encrypted data in terms of a time dimension, a region dimension, and the like.
Exemplary device
Based on the methods provided by the above embodiments, the embodiments of the present application also provide corresponding apparatuses, which are described below with reference to the accompanying drawings.
Referring to fig. 2, a schematic structural diagram of a financial data tracing apparatus based on a block chain and an identification technology in an embodiment of the present application is shown. The apparatus 200 may specifically include, for example: a first acquisition unit 201, a second acquisition unit 202, a storage unit 203, and a first transmission unit 204.
A first acquisition unit 201 for acquiring first encrypted data from a second device;
a second obtaining unit 202, configured to obtain the first identifier;
the storage unit 203 is configured to correspondingly store the first encrypted data and the first identifier into a block chain;
a first sending unit 204, configured to send a first message carrying the first identifier to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain, and the first identifier is used to trace to the source of the first encrypted data.
Optionally, the apparatus further comprises:
a first receiving unit, configured to receive a second message from the second device, where the second message carries the first identifier, and the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device;
a third obtaining unit, configured to obtain the first encrypted data according to the first identifier, the first encrypted data that is correspondingly stored in the block chain, and the first identifier;
and the second sending unit is used for sending the obtained data to the second equipment.
Optionally, the apparatus further comprises:
a second receiving unit, configured to receive a third message from a second device before receiving first encrypted data from the second device, where the third message is used to request the first device to allow the second device to access;
a third sending unit, configured to send a fourth message to the second device, where the fourth message is used to indicate that the first device allows the second device to access.
Alternatively to this, the first and second parts may,
the fourth message includes a first public key, and the first encrypted data is data obtained by encrypting the first data with the first public key.
Optionally, the first data includes: first service data and a corresponding serial number.
Since the apparatus 200 is an apparatus corresponding to the method provided in the above method embodiment, and the specific implementation of each unit of the apparatus 200 is the same as that of the above method embodiment, for the specific implementation of each unit of the apparatus 200, reference may be made to the description part of the above method embodiment, and details are not repeated here.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the invention following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice in the art to which the invention pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the application being indicated by the following claims.
It will be understood that the present application is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the application is limited only by the attached claims
The above description is only exemplary of the present application and should not be taken as limiting the present application, as any modification, equivalent replacement, or improvement made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. A financial data source tracing method based on a block chain and identification technology is characterized by comprising the following steps:
the first device acquires first encrypted data from the second device;
the first equipment acquires a first identifier and correspondingly stores the first encrypted data and the first identifier into a block chain;
and the first device sends a first message carrying the first identifier to the second device, wherein the first message is used for indicating that the first encrypted data is successfully stored in the block chain, and the first identifier is used for tracing the first encrypted data.
2. The method of claim 1, further comprising:
the first device receives a second message from the second device, where the second message carries the first identifier, and the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device;
the first device obtains the first encrypted data according to the first identifier, the first encrypted data correspondingly stored in the block chain and the first identifier;
and the first equipment sends the obtained data to the second equipment.
3. The method of claim 2, wherein prior to the first device obtaining the first encrypted data from the second device, the method further comprises:
the first device receives a third message from the second device, wherein the third message is used for requesting the first device to allow the second device to access;
the first device sends a fourth message to the second device, wherein the fourth message is used for indicating that the first device allows the second device to access.
4. The method of claim 3,
the fourth message includes a first public key, and the first encrypted data is data obtained by encrypting the first data with the first public key.
5. The method of claim 4, wherein the first data comprises: first service data and a corresponding serial number.
6. A financial data tracing apparatus based on block chain and identification technology, the apparatus comprising:
a first acquisition unit configured to acquire first encrypted data from a second device;
a second obtaining unit, configured to obtain the first identifier;
the storage unit is used for correspondingly storing the first encrypted data and the first identifier into a block chain;
a first sending unit, configured to send a first message carrying the first identifier to the second device, where the first message is used to indicate that the first encrypted data has been successfully stored in the block chain, and the first identifier is used to trace to the source of the first encrypted data.
7. The apparatus of claim 6, further comprising:
a first receiving unit, configured to receive a second message from the second device, where the second message carries the first identifier, and the second message is used to instruct the first device to feed back data corresponding to the first identifier to the second device;
a third obtaining unit, configured to obtain the first encrypted data according to the first identifier, the first encrypted data that is correspondingly stored in the block chain, and the first identifier;
and the second sending unit is used for sending the obtained data to the second equipment.
8. The apparatus of claim 7, further comprising:
a second receiving unit, configured to receive a third message from a second device before receiving first encrypted data from the second device, where the third message is used to request the first device to allow the second device to access;
a third sending unit, configured to send a fourth message to the second device, where the fourth message is used to indicate that the first device allows the second device to access.
9. The apparatus of claim 8,
the fourth message includes a first public key, and the first encrypted data is data obtained by encrypting the first data with the first public key.
10. The apparatus of claim 9, wherein the first data comprises: first service data and a corresponding serial number.
CN202010370723.6A 2020-05-06 2020-05-06 Financial data tracing method and device based on block chain and identification technology Pending CN111310240A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010370723.6A CN111310240A (en) 2020-05-06 2020-05-06 Financial data tracing method and device based on block chain and identification technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010370723.6A CN111310240A (en) 2020-05-06 2020-05-06 Financial data tracing method and device based on block chain and identification technology

Publications (1)

Publication Number Publication Date
CN111310240A true CN111310240A (en) 2020-06-19

Family

ID=71161094

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010370723.6A Pending CN111310240A (en) 2020-05-06 2020-05-06 Financial data tracing method and device based on block chain and identification technology

Country Status (1)

Country Link
CN (1) CN111310240A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109741192A (en) * 2018-11-15 2019-05-10 深圳壹账通智能科技有限公司 Date storage method, device, equipment and readable storage medium storing program for executing based on block chain
CN109785132A (en) * 2018-12-21 2019-05-21 众安信息技术服务有限公司 A kind of anti-fake source tracing method, device and storage medium based on block chain
CN110633198A (en) * 2018-06-22 2019-12-31 中链科技有限公司 Block chain-based software test data storage method and system
CN110837491A (en) * 2019-11-25 2020-02-25 广州知弘科技有限公司 Block chain financial big data processing system and method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391735A (en) * 2017-08-04 2017-11-24 北京明朝万达科技股份有限公司 Business datum source tracing method, device, system and storage device based on block chain
CN110633198A (en) * 2018-06-22 2019-12-31 中链科技有限公司 Block chain-based software test data storage method and system
CN109271801A (en) * 2018-09-25 2019-01-25 宁波弘讯科技股份有限公司 Injecting products approaches to IM, server, injection molding machine based on block chain
CN109741192A (en) * 2018-11-15 2019-05-10 深圳壹账通智能科技有限公司 Date storage method, device, equipment and readable storage medium storing program for executing based on block chain
CN109785132A (en) * 2018-12-21 2019-05-21 众安信息技术服务有限公司 A kind of anti-fake source tracing method, device and storage medium based on block chain
CN110837491A (en) * 2019-11-25 2020-02-25 广州知弘科技有限公司 Block chain financial big data processing system and method

Similar Documents

Publication Publication Date Title
Gao et al. GridMonitoring: Secured sovereign blockchain based monitoring on smart grid
Yu et al. A blockchain-based shamir’s threshold cryptography scheme for data protection in industrial internet of things settings
CN106357396B (en) Digital signature method and system and quantum key card
TWI666902B (en) Robust ATM network system and information processing method based on blockchain technology
CN100468386C (en) Time marking system and progam medium for electronic files
EP3813292A1 (en) Blockchain-based service data encryption method and apparatus
CN109687959B (en) Key security management system, key security management method, key security management medium, and computer program
CN111931238B (en) Block chain-based data asset transfer method, device and equipment
CN107481140B (en) Voucher identification code processing method and system, server and storage medium
CN107528688A (en) A kind of keeping of block chain key and restoration methods, device based on encryption commission technology
CN109495592A (en) Data collaborative method and electronic equipment
CN111080295A (en) Block chain-based electronic contract processing method and equipment
WO2019072823A1 (en) Method and system for asynchronous traceable data sharing in a communication network
US11405216B2 (en) System for authenticating verified personal credentials
US7209563B1 (en) Process for creating and managing at least one cryptographic key, and system for its implementation
CN111259439B (en) Intangible asset management service platform based on block chain and implementation method thereof
CN111488372A (en) Data processing method, device and storage medium
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN113254947A (en) Vehicle data protection method, system, equipment and storage medium
CN112286872A (en) Medical image data sharing method and system based on block chain technology and interplanetary file system and readable storage medium
CN110909381A (en) Block chain-based user comment tamper-proof system and method
CN113961956A (en) Method, device, equipment and medium for generating and applying tagged network information service
CN114666168A (en) Decentralized identity certificate verification method and device, and electronic equipment
CN111988260A (en) Symmetric key management system, transmission method and device
CN112783847A (en) Data sharing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200619