CN111444550A - Block chain-based service data verification method and device and readable storage medium - Google Patents

Block chain-based service data verification method and device and readable storage medium Download PDF

Info

Publication number
CN111444550A
CN111444550A CN202010212290.1A CN202010212290A CN111444550A CN 111444550 A CN111444550 A CN 111444550A CN 202010212290 A CN202010212290 A CN 202010212290A CN 111444550 A CN111444550 A CN 111444550A
Authority
CN
China
Prior art keywords
data
hash value
target enterprise
service
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010212290.1A
Other languages
Chinese (zh)
Inventor
郑浩剑
江盈义
王宗友
韦德志
巫林蔚
刘宇航
王博
蓝虎
郑伟涛
王兆创
刘正也
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202010212290.1A priority Critical patent/CN111444550A/en
Publication of CN111444550A publication Critical patent/CN111444550A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/123Tax preparation or submission

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Development Economics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a verification method, a device and a computer readable storage medium of service data based on a block chain, wherein the method comprises the following steps: when a target enterprise needs a first service node to provide service, a second service data packet can be sent to the first service node, the first service node can send a second hash value and a data identifier corresponding to the second service data packet to the second service node, the data identifier corresponds to the target enterprise one by one, the second service node can obtain a first hash value corresponding to the first service data packet in a trusted chain based on the data identifier, if the first hash value is the same as the second hash value, verification passing information is sent to the first service node, the first service node can generate a credit evaluation value aiming at the target enterprise according to the verification passing information, and the credit evaluation value can be used for determining that the target enterprise can enjoy service of an application mechanism.

Description

Block chain-based service data verification method and device and readable storage medium
Technical Field
The present application relates to the field of internet technologies, and in particular, to a method and an apparatus for verifying service data based on a block chain, and a readable storage medium.
Background
The tax assets can refer to various data generated in the enterprise operation process stored in tax bureaus of provinces and cities, including but not limited to enterprise tax declaration information, enterprise receipt information, and the like.
Disclosure of Invention
The embodiment of the application provides a verification method and device of business data based on a block chain and a readable storage medium, which are beneficial to improving the processing efficiency of the business data.
In one aspect, an embodiment of the present application provides a method for verifying service data based on a block chain, where the method includes:
receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request;
generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
acquiring the first hash value matched with the data identifier from the trusted chain, and generating verification passing information corresponding to the second service data packet when the first hash value is the same as the second hash value;
and returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
On the other hand, an embodiment of the present application provides a method for verifying service data based on a block chain, where the method includes:
receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
receiving verification passing information sent by the second service node;
generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
In another aspect, an embodiment of the present application provides a device for verifying service data based on a block chain, where the device includes:
the first receiving unit is used for receiving a data access request sent by a target enterprise and acquiring a first service data packet associated with the target enterprise according to the data access request;
the generating unit is used for generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
the second receiving unit is used for receiving a data verification request sent by the first service node and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
an obtaining unit, configured to obtain the first hash value matching the data identifier from the trusted chain, and when the first hash value is the same as the second hash value, generate verification passing information corresponding to the second service data packet;
and the returning unit is used for returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
In another aspect, an embodiment of the present application provides a device for verifying service data based on a block chain, where the device includes:
the third receiving unit is used for receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
a sending unit, configured to send a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
a fourth receiving unit, configured to receive verification passing information sent by the second service node;
a generating unit, configured to generate a credit evaluation value for the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
In yet another aspect, embodiments of the present application provide an electronic device including an output device, an input device, a processor, a memory, and a transceiver, where the output device, the input device, the processor, the memory, and the transceiver are connected to each other. The transceiver is used for receiving information from devices other than the device and outputting information to devices other than the device. The memory is for storing one or more instructions, the one or more instructions adapted to be loaded by the processor and to perform the steps of:
receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request;
generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
acquiring the first hash value matched with the data identifier from the trusted chain, and generating verification passing information corresponding to the second service data packet when the first hash value is the same as the second hash value;
and returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
In yet another aspect, embodiments of the present application provide an electronic device including an output device, an input device, a processor, a memory, and a transceiver, where the output device, the input device, the processor, the memory, and the transceiver are connected to each other. The transceiver is used for receiving information from devices other than the device and outputting information to devices other than the device. The memory is for storing one or more instructions, the one or more instructions adapted to be loaded by the processor and to perform the steps of:
receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
receiving verification passing information sent by the second service node;
generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
In yet another aspect, an embodiment of the present application provides a computer-readable storage medium storing a computer program, the computer program comprising program instructions that, when executed by a processor, cause the processor to perform the following steps:
receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request;
generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
acquiring the first hash value matched with the data identifier from the trusted chain, and generating verification passing information corresponding to the second service data packet when the first hash value is the same as the second hash value;
and returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
In yet another aspect, an embodiment of the present application provides a computer-readable storage medium storing a computer program, the computer program comprising program instructions that, when executed by a processor, cause the processor to perform the following steps:
receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
receiving verification passing information sent by the second service node;
generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
In this embodiment of the application, when a target enterprise needs a first service node (application entity) to provide a service, a second service data packet may be sent to the first service node, the first service node may send a second hash value and a data identifier corresponding to the second service data packet to the second service node (tax bureau), the data identifier corresponds to the target enterprise one to one, the second service node may obtain a first hash value corresponding to the first service data packet in a trusted chain based on the data identifier, if the first hash value is the same as the second hash value, verification passing information is sent to the first service node, the first service node may generate a credit evaluation value for the target enterprise according to the verification passing information, the credit evaluation value may be used to determine that the target enterprise can enjoy the service evaluation value of the application entity, and with this application, the target enterprise, the tax bureau, the service evaluation value of the application entity, and the target enterprise may be connected to the application entity, The credible link and the application mechanism are integrated in the same block link network as nodes, wherein each data transmission can be realized in the block link network, the safety of data storage and transmission is ensured, in addition, the hash value is stored in the credible link, the non-tamper property of the credible link in the block link network is utilized, the authenticity of the data is ensured, the physical storage space of the data is saved due to the smaller storage space required by the hash value, the storage pressure of the business data in the credible link is favorably saved, meanwhile, the business data verification is realized in an online mode, the data is not required to be checked manually offline, and the efficiency of the business verification is favorably improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1A is a network architecture diagram of a verification method for service data based on a block chain according to an embodiment of the present application;
fig. 1B is a network architecture diagram of a verification method for service data based on a block chain according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a verification method for service data based on a blockchain according to an embodiment of the present application;
fig. 2A is a schematic view of a scenario of a verification method for service data based on a block chain according to an embodiment of the present application;
fig. 2B is a schematic view of a scenario of a verification method for service data based on a block chain according to an embodiment of the present application;
fig. 2C is a schematic view of a scenario of a verification method for service data based on a block chain according to an embodiment of the present application;
fig. 3 is a flowchart of an authentication method for service data based on a block chain according to an embodiment of the present application;
fig. 4 is a schematic flowchart of a verification method for service data based on a blockchain according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an apparatus for verifying service data based on a block chain according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of another verification apparatus for service data based on a block chain according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device provided in an embodiment of the present application;
fig. 8 is a schematic structural diagram of another electronic device provided in the embodiment of the present application.
Detailed Description
The technical solutions in the present application will be described clearly and completely with reference to the accompanying drawings in the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In order to better understand the service data method based on the block chain, the electronic device, and the computer-readable storage medium provided in the embodiments of the present application, a network architecture used in the embodiments of the present application is described below.
Fig. 1A is a schematic diagram of a network architecture of a verification method for blockchain-based service data provided in the present application, where the network structure is formed by a plurality of nodes (any type of computing devices, such as servers and user terminals, in an access blockchain network), a Peer-To-Peer (P2P, Peer To Peer) network is formed between the nodes, and a P2P Protocol is an application layer Protocol operating on a Transmission Control Protocol (TCP). In the network structure, any machine such as a server and a terminal can be added to become a node, and the node comprises a hardware layer, a middle layer, an operating system layer and an application layer. As shown in fig. 1A, the network structure may include at least two blockchain networks, which may include a blockchain 101, a blockchain 102, and a blockchain 103, where the blockchain 101 and the blockchain 102 form one blockchain 100, the blockchain network 100 may include service nodes, routing nodes, common nodes, and gateways, where the blockchain network 100 may further include a trusted chain, which may perform information interaction with multiple blockchains in the blockchain network 100, the trusted chain may be used to store service data, and in the blockchain 101, which may be divided into an isolation area and an intra-area, multiple (2 or more than 2) service nodes existing in the intra-area may communicate with an external network through the gateways of the isolation area, so that security of data in the multiple service nodes in the intra-area may be ensured; in the blockchain 102, the blockchain may also be divided into an isolation area and an intranet area, where the isolation area may include a gateway and a service node, the intranet area may include a plurality of common nodes and routing nodes, and the routing nodes have basic functions for supporting communication between nodes, and in addition, the routing nodes may also support communication with other blockchains (such as the blockchain 101 in the figure), the above-mentioned trusted chain may implement information interaction through the service node in each blockchain, specifically, may implement a specific service according to actual service requirements, record data related to implementing the function to form service data, carry a data identifier in the service data to indicate a source of the service data, and may also send the service data to other nodes (such as other service nodes or common nodes) in the blockchain 102, so that when the other nodes verify the authenticity of the service data source succeeds, the traffic data may be sent to the blockchain 103 via the consensus node.
In an embodiment, the network structure may be used for business data verification, wherein the business data may include tax data or account data or other transaction data, etc., the block chain 102 may correspond to a tax office, the block chain 102 may be formed by the tax office in a self-established manner, a business node in the block chain 102 corresponds to a second business node, the block chain 103 may correspond to an application mechanism, the block chain 103 may be formed by the application mechanism in a self-established manner, a business node in the block chain 102 corresponds to a first business node, the block chain 102 may access other block chains (e.g., the block chain 101 as shown in the figure) by way of a business node, for example, a local tax office may access an intranet area of a block chain corresponding to a tax office or a tax bureau in other areas by way of a business node, and additionally, a trusted chain may be included in the block chain 100, the trusted chain may include a plurality of service nodes, such as a local tax bureau, an enterprise, an application mechanism, and the like, where the local tax bureau, the enterprise, or the application mechanism may be accessed as one service node into the trusted chain, and the trusted chain may be used to store service information of the enterprise, such as tax information, contract information, performance information, and the like, so that the tax bureau may receive a data access request sent by a target enterprise through a second service node in the block chain 102, obtain a first service data packet associated with the target enterprise according to the access request, generate a first hash value corresponding to the first service data packet, and upload the first hash value to the trusted chain; when the target enterprise needs to apply for business service, for example, if the application organization is a financial organization, the business service may include credit service, insurance service or loan service, and the like, the application organization may receive a second business data packet submitted by the target enterprise, generate a second hash value corresponding to the second business data packet, obtain a data identifier corresponding to the second business data packet, send the second hash value and the data identifier corresponding to the second business data packet to the block chain 102 corresponding to the tax bureau through the routing node of its internal network area by the first business node in the block chain 103, the first business node corresponding to the tax bureau may match through the first hash value and the second hash value to obtain a verification result for the second business data packet, and send the verification result to the common identification node of the block chain 102 corresponding to the application organization through the common identification node in the block chain 102, for the application to make credit assessments for the target enterprise.
Please refer to fig. 1B, which is a schematic diagram of a network architecture of a verification method for service data based on a block chain according to the present application. As shown in fig. 1B, the network architecture may include a blockchain network, which is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission (P2P transmission), consensus mechanism, encryption algorithm, and is essentially a decentralized database, wherein the blockchain network includes a plurality of electronic devices, each electronic device corresponds to a blockchain node in the blockchain network, and in fact, each blockchain node in the blockchain network may correspond to a plurality of electronic devices, and only one blockchain node corresponds to 1 electronic device is taken as an example for the description of the present application. The 4 blockchain nodes of the blockchain shown in fig. 1B are only representative, in a specific implementation, the first service node may be an application mechanism, and the second service node may be a tax bureau, in this embodiment of the present application, the tax asset data serially connected through the trusted chain in the blockchain network can be effectively recorded by multiple parties, and the tax asset data can be permanently checked (cannot be tampered), where the trusted chain may be an infrastructure in the blockchain network established by the application mechanism, and may be used to store and classify information of the tax asset, signature financial service contract, financial service performance condition, and the like of an enterprise; the trusted chain may include at least one trusted chain node, the trusted chain may be deployed in a blockchain network in the form of a hardware server, the trusted chain node in the trusted chain may include, but is not limited to, a first business node, a second business node, and a target enterprise node, the target enterprise may be any one tax paying enterprise, the application organizations may include banks, securities companies, insurance companies, and other government agencies that taxpayers or tax paying enterprises need to handle business, and the like, wherein the first business node may receive a data access request of a node corresponding to the target enterprise, may obtain a first business data packet associated with the target enterprise through the data access request, and generate a first hash value corresponding to the first business data packet, and the first business node may also receive a data verification request sent by the second business node, and a data identifier and a second hash value carried in the data verification request, and the verification of the second service data is realized by comparing the first hash value with the second hash value, verification passing information or verification failing information is returned to the first service node, and the first service node also generates a credit evaluation value aiming at the target enterprise according to the verification passing information or the verification failing information.
In this embodiment of the application, when a target enterprise needs an application to provide a business service, a second business data packet may be sent to a first business node (application), the application may send a second hash value and a data identifier corresponding to the second business data packet to a second business node (tax bureau), the data identifier corresponds to the target enterprise one by one, the second business node may obtain a first hash value corresponding to the first business data packet in a trusted chain based on the data identifier, match the two hash values, send verification passing information to the first business node if the first hash value is the same as the second hash value, the first business node may generate a credit evaluation value for the target enterprise according to the verification passing information, the credit evaluation value may be used to determine that the target enterprise can enjoy the business service of the application, and thus, the target enterprise may be connected to the application through a network, and the application may be connected to the application through the network The tax bureau, the credible chain and the application mechanism are integrated in the same block chain network as nodes, so that the safety of data storage and transmission is ensured, the hash value is stored in the credible chain, the physical storage space of the data is saved by using the non-tamper property of the credible chain in the block chain network, the storage pressure of the business data in the credible chain is favorably saved, meanwhile, the business data verification is realized in an online mode, and the efficiency of the business verification is favorably improved.
Please refer to fig. 2, which is a schematic flowchart illustrating a block chain-based service data verification method according to the present application, and as shown in fig. 2, the method may include:
s201, receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request.
Specifically, in this embodiment of the present application, the verification method for blockchain-based service data may be executed by the second service node in the above-mentioned blockchain network; the target enterprise may be any enterprise that needs to apply for business services, the second business node may correspond to a server or an electronic device, and may specifically correspond to a local tax bureau or a general tax bureau, and the like, the target enterprise and the first business node may exist in the same blockchain network, the first business node may receive a data access request sent by the target enterprise, the data access request may carry a first business data packet associated with the target enterprise, and the first business data packet may include tax asset data corresponding to the target enterprise, for example, tax declaration information, enterprise invoice information for invoicing, and the like.
Specifically, the first service node may obtain, after receiving the data access request sent by the target enterprise, an inquiry range and request header information carried in the data access request, where the inquiry range may include a time coverage range and a content coverage range, the request header information may include field information, the field information may include a protocol and a version number used by the data access request, a request mode, a requested target resource, cached information, a name of a client version number, a requested resource type, and the like, and may determine, according to the field information, an access mode of the data access request, where the access mode may refer to a mode corresponding to the target enterprise accessing the tax bureau platform, and the access mode may be through a web page side mode or through an application port mode or through a service node mode, and the like, in order to meet convenience and diversity of user operations, different access modes can be set, when a user accesses a system corresponding to the tax bureau in different access modes, the second service node (the tax bureau) can correspondingly adopt different data acquisition modes, and a first service data packet associated with a target enterprise can be acquired according to the access modes and the query range.
Further, if the access mode is a page mode, the first service node may respond to a data input operation of a target enterprise for the data access request, and acquire enterprise authentication information carried in the data access request; the input operation may be that a user inputs a user name, a password, and the like in a page corresponding to a target enterprise, the enterprise authentication information may include the user name, the password, and the like, when the enterprise authentication information satisfies a data access condition, it is determined that the target enterprise has a data access right, and according to the query range, a time range and a data type corresponding to the target enterprise are determined, for example, when the user name and the password are consistent with those stored in a tax bureau system corresponding to a first business node, it is determined that the target enterprise has the data access right, in addition, the data access condition may also be other authentication information such as an IP address or a fingerprint, and the time range may refer to a query time range corresponding to first business data required by the target enterprise, and may be, for example: 202003-; finally, the first service node may obtain the initial service data corresponding to the target enterprise from the local database as a first service data packet according to the time range and the data type, and transmit the first service data packet to the target enterprise in response to a transmission triggering operation of the target enterprise for the first service data packet.
For example, as shown in fig. 2A, which is a schematic view of a scenario of a verification method for business data based on a block chain, a user corresponding to an enterprise a may input a user name and a password in a tax platform system corresponding to a second business node, and send a data access request to the second business node, where the data access request is used to request to obtain a first business data packet, as shown in fig. 2B, after the user name and the password are verified, the user may perform a data input operation in a display interface as shown in fig. 2B through a "tax asset management" function module to input information such as a query range, for example, a time range and a data type, as shown in fig. 2B, a start period of the time range is "202003", an end period of the time range is "202004", and the data types may include 5 types, which are respectively "enterprise form", "tax payment report"), The second service node corresponding to the tax platform can be connected to a local tax bureau database according to a time range and the 5 data types, inquires services and data corresponding to the time range and the data types, and generates a first service data packet, namely a data packet file, as shown in fig. 2C, after the first service data packet is successfully generated, a user can receive information that the generation of the tax asset is successful from the tax asset cache function module, and can download the information through a download button.
Furthermore, if the access mode is an application program interface mode, the target enterprise may agree with an identity authentication mechanism with a tax administration corresponding to the second service node in an earlier stage, and set a key pair in advance based on the identity authentication mechanism, where the key pair may include an enterprise public key and an enterprise private key, then, after the second service node receives a data access request, the target enterprise may directly implement data invocation based on a data interface corresponding to the second service node, specifically, may determine a time range and a data type corresponding to the target enterprise according to the query range, obtain initial service data corresponding to the target enterprise from a local database according to the time range and the data type, and encrypt the service data according to the enterprise public key previously set with the target enterprise to generate a first service data packet associated with the target enterprise, then, after the target enterprise receives the first service data packet, the first service data packet can be decrypted through the enterprise private key, and service data included in the first service data packet is obtained.
S202, generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise.
Specifically, the above-mentioned trusted link may be a block link in a block link network as shown in fig. 1B, where the trusted link may be used to store information of a tax asset, a signed financial service contract, a financial service performance condition, and the like of an enterprise, in an embodiment of the present application, a first hash value corresponding to a first business data packet of a target enterprise generated in a tax administration system corresponding to a second block link point may be stored in the trusted link, and the data identifier may be in one-to-one correspondence with the target enterprise, and the data identifier may be an enterprise name or a taxpayer identification number or an asset number corresponding to the enterprise, and thus, the trusted link is only used to store the hash value and the data identifier, which may reduce physical storage pressure in the block link, and due to the non-tamper property of the trusted link and the sensitivity of the hash value to input content change, it is effectively ensured that a tax asset submitted by a bank or an application institution and a source tax asset of the tax office are completely consistent.
In a specific implementation, a hash function may be preset in the tax administration system corresponding to the second service node, and the hash function may be used to generate a hash value, where the hash function may be a hash function that takes a variable-length packet or character string as an input and generates a fixed-length hash code, sometimes referred to as a packet digest, as an output of the function, and the output is the hash value, so that, according to the hash function, a hash operation may be performed on a file corresponding to the first service data packet to generate a hash code, which is a first hash value, and the algorithm for generating the first hash value is not limited herein, and may also be an MD5 algorithm, an SHA-1 algorithm, and the like, and further, a data identifier corresponding to the first service data may be obtained, the data identifier and the first hash value are packed into a block, and the block is identified based on a consensus mechanism in a block chain, and finally, responding to the transmission triggering operation of the target enterprise aiming at the first service data packet, and transmitting the first service data packet to the target enterprise.
S203, receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; and the second hash value is generated by the first service node according to a second service data packet submitted by the target enterprise.
Specifically, the first service node may be an application entity, and the application entity may include a bank, a security company, an insurance company, a trust investment company, a fund management company, and other government organs requiring transaction of taxpayers or tax payers, and the like, in the blockchain network shown in fig. 1B, the second service node may communicate with the target enterprise and the first service node, and when the target enterprise needs to handle financial services or services, for example, to handle loan services, the first service node, that is, the application entity may receive the first service data packet sent by the target enterprise, and at this time, the application entity needs to verify the authenticity of the first service data packet, so that the second service node may receive the data verification request sent by the first service node, obtain the data identifier and the second hash value carried in the data verification request, and the second hash value is submitted by the first service node (application entity) according to the second service data packet submitted by the target enterprise And (4) generating.
S204, the first hash value matched with the data identifier is obtained from the trusted chain, and when the first hash value is the same as the second hash value, verification passing information corresponding to the second service data packet is generated.
Specifically, the data identifier may be a business name of a target business or a taxpayer identification number or an asset number corresponding to the business, and for convenience of searching, the trusted chain may store a data identifier and a hash value for each business data packet, where the data identifier may correspond to the hash value one to one, and therefore, a first hash value matching the data identifier may be obtained from the trusted chain, and in order to help the first business node (financial structure) verify the authenticity of the second business data, the first hash value may be compared with the second hash value, in a specific implementation, the first hash value and the second hash value are principally a character string, and a bit-by-bit comparison may be performed on the first hash value and the second hash value to determine whether the two hash values are consistent, for example: if the first hash value is 00740f40257a1 and the second hash value is bf03b40f54a95, and the two hash values are different, generating verification failure information for the second service data packet, and returning the verification failure information to the first service node, so that the first service node returns warning prompt information to the target enterprise according to the verification failure information, where the warning prompt information may be: the data files provided by the target enterprise do not pass or are inconsistent with the data files in the tax system, and the like; and when the first hash value is the same as the second hash value, generating verification passing information corresponding to the second service data packet.
S205, returning the verification passing information to the first service node, so that the first service node generates a credit evaluation value for the target enterprise according to the verification passing information.
Specifically, the verification passing information indicates that the second service data packet uploaded to the first service node by the target enterprise is consistent with the first service data packet in the second service node, and the second service node may return the verification passing information to the first service node, so that the first service node generates the credit evaluation value for the target enterprise according to the verification passing information.
In the embodiment of the application, a data access request sent by a target enterprise is received, a first business data packet associated with the target enterprise is obtained according to the data access request, a first hash value corresponding to the first business data packet is generated, the first hash value is uploaded to a trusted chain, the first business data packet is transmitted to the target enterprise, a data verification request sent by a first business node is received, a data identifier and a second hash value carried by the data verification request are obtained, the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise, the first hash value matched with the data identifier is obtained from the trusted chain, verification passing information corresponding to the second business data packet is generated when the first hash value is the same as the second hash value, the verification passing information is returned to the first business node, so that the first business node generates a credit evaluation value aiming at the target enterprise according to the verification passing information, therefore, a target enterprise, a tax bureau, a credible link and an application mechanism are integrated in the same block link network as nodes, the safety of data storage and transmission is ensured, in addition, a hash value is stored in the credible link, the non-tamper property of the credible link in the block link network is utilized, the authenticity of data is ensured, the physical storage space of the data is saved due to the fact that the storage space required by the hash value is small, the storage pressure of the business data in the credible link is favorably saved, meanwhile, the business data verification is realized in an online mode, the data is not needed to be checked manually after being offline, and the efficiency of the business verification is favorably improved.
Referring to fig. 3, it is a schematic flow chart of a verification method for service data based on a block chain according to the present application, and as shown in fig. 3, the method may include:
s301, receiving a second service data packet submitted by a target enterprise, generating a second hash value corresponding to the second service data packet, and acquiring a data identifier corresponding to the second service data packet.
Specifically, the embodiment of the present application may be applied to the second service node shown in fig. 1B, that is, a system corresponding to a financial structure, where the second service data packet may include a plurality of files, such as a tax payment statement form, an enterprise change information table, a violation information table, a basic information table, a stakeholder information table, and the like; when the target enterprise needs business service, a second business data packet can be submitted to the application mechanism, the second business data packet can be the same as or different from the first business data packet, the application mechanism can evaluate the credit degree of the target enterprise, some enterprises can possibly tamper file information in the business data for handling financial business, at the moment, the second business data uploaded to the financial enterprise by the target enterprise is different from the first business data downloaded from the tax bureau, and therefore the credit value of the target enterprise can be determined based on the first business data and the second business data so as to enable the supply mechanism to determine whether the target enterprise is allowed to handle financial business.
Further, the second business data packet may include tax asset information of the target enterprise at the tax bureau, when the application receives the second business data packet submitted by the target enterprise, the second business data packet may be sent to the target enterprise based on a hash function, the hash function may be used to generate the hash value, and the hash function may be a hash function, for example, the file name of the second service data packet may be used as an input of the hash function, a hash code with a fixed length is generated as the output of the function, the output hash code is the second hash value corresponding to the second service data packet, the application mechanism can also obtain the data identifier corresponding to the second service data packet, the data identification may be a business name of the target business or a corresponding taxpayer identification number or asset number of the business or the like, the data identifier is used for identifying a first hash value corresponding to a first service data packet corresponding to the data identifier in a trusted chain of the blockchain network.
S302, sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains the first hash value from the trusted chain according to the data identifier.
Specifically, the second service node may correspond to fig. 1B, and may correspond to a system of a tax bureau, after the application mechanism receives the second service data packet sent by the target enterprise, in order to verify the authenticity of the second service data packet, a second hash value and a data identifier corresponding to the second service data packet may be sent to the tax bureau system, where the data identifier may enable the second service node to obtain the first hash value from the trusted chain according to the data identifier, and the second service node may compare the first hash value and the second hash value, and may be used to verify the authenticity of the second service data packet.
S303, receiving the verification passing information sent by the second service node.
Specifically, the financial center may receive verification passing information sent by the second service node, where the verification passing information is obtained by comparing the first hash value and the second hash value, which are the same, by the first service node.
In a possible implementation manner, if the mode of the target enterprise accessing the blockchain network is the through-service-node-end mode, a target service node corresponding to the target enterprise is determined, and the target service node, the target enterprise, the first service node and the second service node are both in a trusted chain, then, after the first service node (application mechanism) receives a second service data packet sent by the target enterprise, a hash value corresponding to the second service data packet can be calculated, a first hash value corresponding to the first service data packet can be directly obtained in the trusted chain, the application mechanism can directly compare the first hash value and the second hash value to realize data verification of the second service data packet, so that data can be directly obtained through the trusted chain, data transfer transmission is no longer performed through the second service node (tax bureau), and the verification time of the service data can be saved, the verification efficiency is improved.
S304, generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
Specifically, the second service data packet may include a tax payment statement, an enterprise change information table, a violation information table, a basic information table, a shareholder information table, and the like; if the verification passing information is received, the second service data packet sent by the target enterprise is indicated to be the same as the second service data packet stored in the tax bureau system, so that a credit evaluation value for the target enterprise can be generated, and the credit evaluation value can be used for evaluating whether the target enterprise can handle financial services of the application institution, such as loan handling or insurance handling; the application may parse the second business data packet to obtain a credit assessment data set, where the credit assessment data set may include financial statement information, tax payment information, liability information, profit information, income information, and the like of the target enterprise, and the credit assessment data set includes a plurality of credit assessment data, a credit assessment criterion may be set for each credit assessment data, and an assessment score corresponding to each credit assessment data in the credit assessment data set may be determined according to the credit assessment criterion to obtain a plurality of credit assessment scores, and a sum corresponding to the plurality of credit assessment scores may be determined as the credit assessment value, for example.
As shown in table 1 below, the credit evaluation data may include liability information and profit information, different value intervals may be set for the liability information and the profit information, and a score may be set for each value interval, scores corresponding to the liability information and the profit information may be determined according to the credit evaluation criteria shown in the table, and summed to obtain a credit evaluation value, and if enterprise a totals liability for 20 ten thousand yuan and profit for 60 ten thousand yuan, scores corresponding to the liability information and the profit information are-1 and +3 points, respectively, and a credit evaluation value corresponding thereto is +2 points.
TABLE 1 Credit evaluation criteria Table
Liability information (Wanyuan) Score of Profit information (Wanyuan) Score of
[10,30) -1 [10,40) +2
[30,70) -3 [40,60) +3
[70,100] -6 [60,100] +5
In the embodiment of the application, a second service data packet submitted by a target enterprise is received, a second hash value corresponding to the second service data packet is generated, a data identifier corresponding to the second service data packet is acquired, a data verification request carrying the second hash value and the data identifier is sent to a second service node, so that the second service node acquires a first hash value from a trusted chain according to the data identifier, verification passing information sent by the second service node is received, a credit evaluation value for the target enterprise is generated according to the verification passing information, the verification passing information is generated by the second service node at the same time of the first hash value and the second hash value, thus, an application mechanism can receive the verification passing information sent by a tax bureau on line based on a block chain network, determine the credit evaluation value of the target enterprise based on the verification passing information, and realize data transmission and verification by using the block chain network, the authenticity and the privacy of data transmission are guaranteed, the service data verification is realized in an online mode, and the efficiency of service verification is improved.
Referring to fig. 4, a schematic flow chart of a verification method for service data based on a block chain according to the present application is shown in fig. 4, where the method may include:
s401, sending a data access request to a first service node, wherein the data access request is used for acquiring a first service data packet from the first service node.
Specifically, the target enterprise may send a data access request to a system corresponding to a second service node, that is, the tax bureau, where the data access request is used to request the first service node to obtain first service data, where the first service data is obtained by statistics of the tax bureau, and the first service data may include multiple files, such as a tax payment statement, an enterprise change information table, a violation information table, a basic information table, a stakeholder information table, and the like; when the target enterprise needs the business service, a data access request can be sent to a tax bureau to obtain first business data, and the first business data can be used for an application organization to verify the authenticity of the data so as to determine whether the target enterprise has the qualification of handling the business service.
S402, receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request.
S403, generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
the specific implementation manner of steps S402 to S403 may refer to steps S101 to S102 in the embodiment corresponding to fig. 2, which is not described herein again.
S404, receiving a second business data packet submitted by the target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet.
S405, sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains the first hash value from a trusted chain according to the data identifier.
The specific implementation manners of step S404 to step S405 may refer to step S201 to step S202 in the embodiment corresponding to fig. 3, which is not described herein again.
S406, receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
s407, the first hash value matched with the data identifier is obtained from the trusted chain, and when the first hash value is the same as the second hash value, verification passing information corresponding to the second service data packet is generated.
The specific implementation manner of steps S406 to S407 may refer to steps S103 to S104 in the embodiment corresponding to fig. 2, which is not described herein again.
S408, the first hash value matched with the data identification is sent to the second service node.
Specifically, the block link network may include a trusted link, which may also be a block link, which may be one built for a tax authority corresponding to the first business node, and may be used to store information of tax assets, signature financial service contracts, financial service performance conditions, and the like of an enterprise.
S409, returning the verification passing information to the first service node, so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
The specific implementation manner of step S409 may refer to step S105 in the embodiment corresponding to fig. 2, which is not described herein again.
S410, receiving verification passing information sent by the second service node.
S411, generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
The specific implementation manners of steps S410 to S411 may refer to steps S203 to S204 in the embodiment corresponding to fig. 3, which is not described herein again.
In a possible implementation manner, the application embodiment as shown in fig. 2-fig. 4 may be applied such that after the first service data packet is hashed to obtain the first hash value, the first hash value is transmitted to the trusted chain, and the target enterprise transmits the second service data packet to the first service node (application organization), which is suitable for checking the service scenario of the service data packet at one time, so that, for the service scenario that if the application organization needs to provide the service for the target enterprise for a long time, for example, a credit scenario, if the target enterprise borrows money, a long-time repayment process will be followed, at this time, the current application embodiment needs to rely on the target enterprise to continuously download the service data packet from the second service node (tax bureau) and transmit the service data packet to the first service node (application organization), and the operation is relatively cumbersome, so for such scenario, the first hash value corresponding to the first service data packet may be uploaded to the trusted chain, the trusted chain can simultaneously collect the service data and the service contract data contained in the service data packet, and send the hash value corresponding to the service data to the first service node based on the appointed time and frequency of the service contract, so that the first service node can verify the service data.
In this embodiment of the application, when a target enterprise needs an application mechanism to provide a business service, a second business data packet may be sent to a first business node (application mechanism), the application mechanism may send a second hash value and a data identifier corresponding to the second business data packet to a second business node (tax bureau), the data identifier corresponds to the target enterprise one by one, the second business node may obtain a first hash value corresponding to the first business data packet in a trusted chain based on the data identifier, match the two hash values, send verification passing information to the first business node if the first hash value is the same as the second hash value, the first business node may generate a credit evaluation value for the target enterprise according to the verification passing information, the credit evaluation value may be used to determine that the target enterprise can enjoy the business service of the application mechanism, and thus, the target enterprise may be connected to the application mechanism, The tax bureau, the credible link and the application mechanism are integrated in the same block link network as nodes, the safety of data storage and transmission is ensured, the hash value is stored in the credible link, in addition, the hash value is stored in the credible link, the non-tamper property of the credible link in the block link network is utilized, the authenticity of the data is ensured, the physical storage space of the data is saved due to the fact that the storage space required by the hash value is small, the storage pressure of the business data in the credible link is favorably saved, meanwhile, the business data verification is realized in an online mode, and the efficiency of the business verification is favorably improved.
Referring to fig. 5, fig. 5 is a schematic structural diagram of a verification apparatus 5000 for service data based on a block chain according to an embodiment of the present invention. As shown in fig. 5, the verification apparatus 5000 for blockchain-based service data includes:
a first receiving unit 501, configured to receive a data access request sent by a target enterprise, and obtain a first service data packet associated with the target enterprise according to the data access request;
a generating unit 502, configured to generate a first hash value corresponding to the first service data packet, upload the first hash value to a trusted chain, and transmit the first service data packet to the target enterprise;
a second receiving unit 503, configured to receive a data verification request sent by a first service node, and obtain a data identifier and a second hash value carried in the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
an obtaining unit 504, configured to obtain the first hash value matching the data identifier from the trusted chain, and when the first hash value is the same as the second hash value, generate verification passing information corresponding to the second service data packet;
a returning unit 505, configured to return the verification passing information to the first service node, so that the first service node generates a credit evaluation value for the target enterprise according to the verification passing information.
The detailed descriptions of the first receiving unit 501, the generating unit 502, the second receiving unit 503, the obtaining unit 504, and the returning unit 505 may be directly obtained by directly referring to the related descriptions in the method embodiment shown in fig. 2, which is not repeated herein.
In a possible implementation manner, in the aspect of receiving a data access request sent by a target enterprise and acquiring a first service data packet associated with the target enterprise according to the data access request, the first receiving unit 501 is specifically configured to:
receiving a data access request sent by the target enterprise, and acquiring a query range and request header information carried in the data access request;
determining an access mode of the data access request according to field information contained in the request header information;
and acquiring the first business data packet associated with the target enterprise according to the access mode and the query range.
In a possible implementation manner, the access manner is a page mode, and in the aspect of acquiring the first service data packet associated with the target enterprise according to the access manner and the query range, the first receiving unit 501 is specifically configured to:
responding to the data input operation of the target enterprise aiming at the data access request, and acquiring enterprise verification information carried in the data access request;
when the enterprise verification information meets the data access condition, determining that the target enterprise has the data access authority, and determining a time range and a data type corresponding to the target enterprise according to the query range;
and acquiring initial service data corresponding to the target enterprise from a local database as the first service data packet according to the time range and the data type. The access mode is an application interface mode, and in the aspect of obtaining the first service data packet associated with the target enterprise according to the access mode and the query range, the first receiving unit 501 is specifically configured to:
determining a time range and a data type corresponding to the target enterprise according to the query range;
acquiring business data corresponding to the target enterprise from a local database according to the time range and the data type;
and encrypting the business data according to the enterprise public key of the target enterprise to generate the first business data packet associated with the target enterprise.
In a possible implementation manner, in the generating a first hash value corresponding to the first service data packet, uploading the first hash value to a trusted chain, and transmitting the first service data packet to the target enterprise, the generating unit 502 is specifically configured to:
performing hash operation on the first service data packet according to a hash function to generate a first hash value;
acquiring the data identifier corresponding to the first service data, and packaging the data identifier and the first hash value into a block;
and performing consensus on the blocks according to a consensus mechanism, adding the blocks passing the consensus to the trusted chain, and transmitting the first service data packet to the target enterprise.
In a possible implementation manner, the return unit 505 is further specifically configured to:
and when the first hash value is different from the second hash value, generating verification failure information for the second service data packet, and returning the verification failure information to the first service node, so that the first service node returns warning prompt information to the target enterprise according to the verification failure information.
In the embodiment of the application, a verification device for block chain-based business data receives a data access request sent by a target enterprise, acquires a first business data packet associated with the target enterprise according to the data access request, generates a first hash value corresponding to the first business data packet, uploads the first hash value to a trusted chain, transmits the first business data packet to the target enterprise, receives a data verification request sent by a first business node, acquires a data identifier and a second hash value carried by the data verification request, the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise, acquires the first hash value matched with the data identifier from the trusted chain, generates verification passing information corresponding to the second business data packet when the first hash value is the same as the second hash value, and returns the verification passing information to the first business node, therefore, the target enterprise, the tax bureau, the credible link and the application mechanism are integrated in the same block link network as nodes, the safety of data storage and transmission is ensured, the hash value is stored in the credible link, in addition, the hash value is stored in the credible link, the non-tamper property of the credible link in the block link network is utilized, the authenticity of the data is ensured, meanwhile, the physical storage space of the data is saved due to the fact that the storage space required by the hash value is small, the storage pressure of the business data in the credible link is favorably saved, meanwhile, the business data verification is realized in an online mode, and the efficiency of the business verification is favorably improved.
Referring to fig. 6, fig. 6 is a schematic structural diagram of another verification apparatus 6000 for block chain based service data according to an embodiment of the present invention, and as shown in fig. 6, the verification apparatus 6000 for block chain based service data includes:
a third receiving unit 601, configured to receive a second service data packet submitted by a target enterprise, generate a second hash value corresponding to the second service data packet, and obtain a data identifier corresponding to the second service data packet;
a sending unit 602, configured to send a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
a fourth receiving unit 603, configured to receive verification passing information sent by the second service node;
a generating unit 604, configured to generate a credit evaluation value for the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
The detailed descriptions of the third receiving unit 601, the sending unit 602, the fourth receiving unit 603, and the generating unit 604 can be directly obtained by referring to the related descriptions in the method embodiment shown in fig. 3, which is not repeated herein.
In a possible implementation manner, in the generating a credit evaluation value for the target enterprise according to the verification passing information, the generating unit 604 is specifically configured to:
analyzing the second service data packet to obtain a credit evaluation data set, wherein the credit evaluation data set comprises a plurality of credit evaluation data;
determining an evaluation score corresponding to each credit evaluation data in the credit evaluation data set according to a credit evaluation standard to obtain a plurality of credit evaluation scores;
and determining the corresponding sum of the plurality of credit evaluation scores as the credit evaluation value.
In the embodiment of the application, a verification device for block link-based service data receives a second service data packet submitted by a target enterprise, generates a second hash value corresponding to the second service data packet, acquires a data identifier corresponding to the second service data packet, sends a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node acquires a first hash value from a trusted link according to the data identifier, receives verification passing information sent by the second service node, generates a credit evaluation value for the target enterprise according to the verification passing information, and generates the credit evaluation value for the target enterprise by the second service node when the first hash value is the same as the second hash value, so that an application mechanism can receive the verification passing information sent by a tax bureau on line based on a link block network and determine the credit evaluation value of the target enterprise based on the verification passing information, the block chain network is used for realizing data transmission and verification, authenticity and privacy of data transmission are guaranteed, service data verification is realized in an online mode, and service verification efficiency is improved.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present invention. As shown in fig. 7, the electronic device 7000 may include:
one or more processors 701, an input device 702, an output device 703, a memory 704, a transceiver 705. The processor 701, the input device 702, the output device 703, the memory 704, and the transceiver 705 are connected via a bus. The input device 702 may include a touch screen, a keyboard, a microphone, and the like, the output device 703 may include a display screen, a speaker, and the like, and the transceiver 705 is configured to receive and transmit data. The memory 704 is used for storing a computer program comprising program instructions, and the processor 701 is used for executing the program instructions stored in the memory 704, wherein the processor 701 is configured for calling the program instructions to execute the following steps:
receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request;
generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
acquiring the first hash value matched with the data identifier from the trusted chain, and generating verification passing information corresponding to the second service data packet when the first hash value is the same as the second hash value;
and returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
In a possible implementation manner, in the receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request, the processor 701 is invoked to perform the following steps:
receiving a data access request sent by the target enterprise, and acquiring a query range and request header information carried in the data access request;
determining an access mode of the data access request according to field information contained in the request header information;
and acquiring the first business data packet associated with the target enterprise according to the access mode and the query range.
In a possible implementation manner, the access manner is a page mode, and in the aspect of obtaining the first service data packet associated with the target enterprise according to the access manner and the query range, the processor 701 is invoked to perform the following steps:
responding to the data input operation of the target enterprise aiming at the data access request, and acquiring enterprise verification information carried in the data access request;
when the enterprise verification information meets the data access condition, determining that the target enterprise has the data access authority, and determining a time range and a data type corresponding to the target enterprise according to the query range;
and acquiring initial service data corresponding to the target enterprise from a local database as the first service data packet according to the time range and the data type.
In a possible implementation manner, the access manner is an application interface mode, and in the aspect of obtaining the first service data packet associated with the target enterprise according to the access manner and the query range, the processor 701 is invoked to perform the following steps:
determining a time range and a data type corresponding to the target enterprise according to the query range;
acquiring business data corresponding to the target enterprise from a local database according to the time range and the data type;
and encrypting the business data according to the enterprise public key of the target enterprise to generate the first business data packet associated with the target enterprise.
In a possible implementation manner, in the generating a first hash value corresponding to the first service data packet, uploading the first hash value to a trusted chain, and transmitting the first service data packet to the target enterprise, the processor 701 is invoked to perform the following steps:
performing hash operation on the first service data packet according to a hash function to generate a first hash value;
acquiring the data identifier corresponding to the first service data, and packaging the data identifier and the first hash value into a block;
and performing consensus on the blocks according to a consensus mechanism, adding the blocks passing the consensus to the trusted chain, and transmitting the first service data packet to the target enterprise.
It should be understood that, in some possible embodiments, the processor 701 may be a Central Processing Unit (CPU), and the processor 701 may also be other general-purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), field-programmable gate arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and so on. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 704 may include both read-only memory and random-access memory, and provides instructions and data to the processor. A portion of the memory 704 may also include non-volatile random access memory.
In a specific implementation, the electronic device 7000 may execute, through each built-in functional module thereof, an implementation manner provided by all steps in fig. 2 or a part of steps in fig. 4, which may be specifically referred to the implementation manner provided by each step, and is not described herein again.
In the embodiment of the application, an electronic device for verifying business data based on a block chain receives a data access request sent by a target enterprise, acquires a first business data packet associated with the target enterprise according to the data access request, generates a first hash value corresponding to the first business data packet, uploads the first hash value to a trusted chain, transmits the first business data packet to the target enterprise, receives a data verification request sent by a first business node, acquires a data identifier and a second hash value carried by the data verification request, the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise, acquires the first hash value matched with the data identifier from the trusted chain, generates verification passing information corresponding to the second business data packet when the first hash value is the same as the second hash value, and returns the verification passing information to the first business node, therefore, the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information, the target enterprise, the tax bureau, the credible link and the application mechanism are integrated in the same block link network as nodes, the safety of data storage and transmission is ensured, in addition, the hash value is stored in the credible link, the non-tampering property of the credible link in the block link network is utilized, the authenticity of the data is ensured, meanwhile, the storage space required by the hash value is smaller, the physical storage space of the data is saved, the storage pressure of the service data in the credible link is favorably saved, meanwhile, the service data verification is realized in an online mode, and the efficiency of the service verification is favorably improved.
Referring to fig. 8, fig. 8 is a schematic structural diagram of another electronic device according to an embodiment of the present invention. As shown in fig. 8, the electronic device 8000 may include:
one or more processors 801, input devices 802, output devices 803, memory 804, transceiver 805. The processor 801, the input device 802, the output device 803, the memory 804, and the transceiver 805 are connected via a bus. Wherein the input device 802 may include a touch screen, a keyboard, a microphone, etc., the output device 803 may include a display screen, a speaker, etc., and the transceiver 805 is configured to receive and transmit data. The memory 804 is used for storing a computer program comprising program instructions, and the processor 801 is used for executing the program instructions stored in the memory 804, wherein the processor 801 is configured for calling the program instructions to execute the following steps:
receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
receiving verification passing information sent by the second service node;
generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
In one possible implementation manner, in the generating a credit evaluation value for the target enterprise according to the verification passing information, the processor 801 is invoked to perform the following steps:
analyzing the second service data packet to obtain a credit evaluation data set, wherein the credit evaluation data set comprises a plurality of credit evaluation data;
determining an evaluation score corresponding to each credit evaluation data in the credit evaluation data set according to a credit evaluation standard to obtain a plurality of credit evaluation scores;
and determining the corresponding sum of the plurality of credit evaluation scores as the credit evaluation value.
It should be appreciated that in some possible implementations, the processor 801 may be a Central Processing Unit (CPU), and the processor 801 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), field-programmable gate arrays (FPGAs) or other programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, and the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 804 may include both read-only memory and random access memory, and provides instructions and data to the processor. A portion of the memory 804 may also include non-volatile random access memory.
In a specific implementation, the electronic device 8000 may execute, through each built-in functional module, the implementation manners provided in all the steps in fig. 3 and the partial steps in fig. 4, which may be specifically referred to the implementation manners provided in each step, and are not described herein again.
In the embodiment of the application, an electronic device for verifying business data based on a blockchain receives a second business data packet submitted by a target enterprise, generates a second hash value corresponding to the second business data packet, acquires a data identifier corresponding to the second business data packet, sends a data verification request carrying the second hash value and the data identifier to a second business node, so that the second business node acquires a first hash value from a trusted chain according to the data identifier, receives verification passing information sent by the second business node, generates a credit evaluation value for the target enterprise according to the verification passing information, and generates the credit evaluation value for the target enterprise by the second business node when the first hash value is the same as the second hash value, so that an application mechanism can receive the verification passing information sent by a tax bureau on line based on the blockchain network and determine the credit evaluation value of the target enterprise based on the verification passing information, the block chain network is used for realizing data transmission and verification, authenticity and privacy of data transmission are guaranteed, service data verification is realized in an online mode, and service verification efficiency is improved.
Further, here, it is to be noted that: the present application further provides a computer-readable storage medium, and the computer-readable storage medium stores a computer program executed by the aforementioned electronic device, and the computer program includes program instructions, and when the processor executes the program instructions, the description of the data verification method in the embodiment corresponding to fig. 2 to fig. 4 can be performed, so that details are not repeated herein. In addition, the beneficial effects of the same method are not described in detail. For technical details not disclosed in the embodiments of the computer storage medium referred to in the present application, reference is made to the description of the embodiments of the method of the present application.
The terms "first", "second", and the like in the claims and in the description and drawings of the present application are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus. Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the invention. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments. The term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present invention, and it is therefore to be understood that the invention is not limited by the scope of the appended claims.

Claims (10)

1. A method for verifying service data based on a block chain is characterized by comprising the following steps:
receiving a data access request sent by a target enterprise, and acquiring a first service data packet associated with the target enterprise according to the data access request;
generating a first hash value corresponding to the first business data packet, uploading the first hash value to a trusted chain, and transmitting the first business data packet to the target enterprise;
receiving a data verification request sent by a first service node, and acquiring a data identifier and a second hash value carried by the data verification request; the second hash value is generated by the first business node according to a second business data packet submitted by the target enterprise;
acquiring the first hash value matched with the data identifier from the trusted chain, and generating verification passing information corresponding to the second service data packet when the first hash value is the same as the second hash value;
and returning the verification passing information to the first service node so that the first service node generates a credit evaluation value aiming at the target enterprise according to the verification passing information.
2. The method of claim 1, wherein receiving a data access request sent by a target enterprise, and obtaining a first business data package associated with the target enterprise based on the data access request comprises:
receiving a data access request sent by the target enterprise, and acquiring a query range and request header information carried in the data access request;
determining an access mode of the data access request according to field information contained in the request header information;
and acquiring the first business data packet associated with the target enterprise according to the access mode and the query range.
3. The method of claim 2, wherein the obtaining the first business data package associated with the target enterprise according to the access method and the query scope comprises:
responding to the data input operation of the target enterprise aiming at the data access request, and acquiring enterprise verification information carried in the data access request;
when the enterprise verification information meets the data access condition, determining that the target enterprise has the data access authority, and determining a time range and a data type corresponding to the target enterprise according to the query range;
and acquiring initial service data corresponding to the target enterprise from a local database as the first service data packet according to the time range and the data type.
4. The method of claim 2, wherein the access mode is an application interface mode, and the obtaining the first service data packet associated with the target enterprise according to the access mode and the query scope comprises:
determining a time range and a data type corresponding to the target enterprise according to the query range;
acquiring business data corresponding to the target enterprise from a local database according to the time range and the data type;
and encrypting the business data according to the enterprise public key of the target enterprise to generate the first business data packet associated with the target enterprise.
5. The method of claim 1, wherein the generating a first hash value corresponding to the first service data packet, uploading the first hash value to a trusted chain, and transmitting the first service data packet to the target enterprise comprises:
performing hash operation on the first service data packet according to a hash function to generate a first hash value;
acquiring the data identifier corresponding to the first service data, and packaging the data identifier and the first hash value into a block;
and performing consensus on the blocks according to a consensus mechanism, adding the blocks passing the consensus to the trusted chain, and transmitting the first service data packet to the target enterprise.
6. The method of claim 1, further comprising:
and when the first hash value is different from the second hash value, generating verification failure information for the second service data packet, and returning the verification failure information to the first service node, so that the first service node returns warning prompt information to the target enterprise according to the verification failure information.
7. A method for verifying service data based on a block chain is characterized by comprising the following steps:
receiving a second business data packet submitted by a target enterprise, generating a second hash value corresponding to the second business data packet, and acquiring a data identifier corresponding to the second business data packet;
sending a data verification request carrying the second hash value and the data identifier to a second service node, so that the second service node obtains a first hash value from a trusted chain according to the data identifier;
receiving verification passing information sent by the second service node;
generating a credit evaluation value aiming at the target enterprise according to the verification passing information; the verification passing information is generated by the second service node when the first hash value and the second hash value are the same.
8. The method of claim 7, wherein generating a credit assessment value for the target business based on the verification pass information comprises:
analyzing the second service data packet to obtain a credit evaluation data set, wherein the credit evaluation data set comprises a plurality of credit evaluation data;
determining an evaluation score corresponding to each credit evaluation data in the credit evaluation data set according to a credit evaluation standard to obtain a plurality of credit evaluation scores;
and determining the corresponding sum of the plurality of credit evaluation scores as the credit evaluation value.
9. An electronic device comprising a processor and a memory, the processor and memory coupled, wherein the memory is configured to store computer instructions, and the processor is configured to execute the computer instructions to cause the data processing apparatus to implement the method of any of claims 1-8.
10. A computer-readable storage medium, wherein the computer storage medium stores one or more first instructions adapted to be loaded by a processor and to perform the method for validation of blockchain based traffic data according to any one of claims 1 to 8.
CN202010212290.1A 2020-03-24 2020-03-24 Block chain-based service data verification method and device and readable storage medium Pending CN111444550A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010212290.1A CN111444550A (en) 2020-03-24 2020-03-24 Block chain-based service data verification method and device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010212290.1A CN111444550A (en) 2020-03-24 2020-03-24 Block chain-based service data verification method and device and readable storage medium

Publications (1)

Publication Number Publication Date
CN111444550A true CN111444550A (en) 2020-07-24

Family

ID=71652449

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010212290.1A Pending CN111444550A (en) 2020-03-24 2020-03-24 Block chain-based service data verification method and device and readable storage medium

Country Status (1)

Country Link
CN (1) CN111444550A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898926A (en) * 2020-08-12 2020-11-06 上海信联信息发展股份有限公司 Food safety assessment method and device
CN112330181A (en) * 2020-11-17 2021-02-05 支付宝(杭州)信息技术有限公司 Enterprise credit evaluation method and device based on block chain
CN112818405A (en) * 2021-03-01 2021-05-18 北京苏博云科可信空间数据技术有限公司 Data processing method and device of block chain and readable storage medium
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112988896A (en) * 2021-03-29 2021-06-18 湖北央中巨石信息技术有限公司 Synchronous consensus method, system, device and medium based on block chain
CN113032489A (en) * 2021-03-29 2021-06-25 湖北央中巨石信息技术有限公司 Asynchronous consensus method, system, device and medium based on block chain
CN113157698A (en) * 2021-04-23 2021-07-23 上海和数软件有限公司 Data query verification method and system based on block chain technology
CN113282664A (en) * 2021-06-09 2021-08-20 中国农业银行股份有限公司 Data synchronization method, system and storage medium based on block chain
CN113538156A (en) * 2021-06-10 2021-10-22 泰康保险集团股份有限公司 Method and device for processing valuation service of occupational annuity
CN113609407A (en) * 2021-07-30 2021-11-05 盐城金堤科技有限公司 Region consistency checking method and device
CN114422510A (en) * 2020-10-13 2022-04-29 腾讯科技(深圳)有限公司 Service processing method and device
CN114708990A (en) * 2022-06-07 2022-07-05 肺诊网(苏州)网络科技有限公司 Remote digital media sharing method and system based on 5G internet
CN115664678A (en) * 2022-10-27 2023-01-31 成都质数斯达克科技有限公司 Block chain based trusted data verification method, device, equipment and storage medium
CN117891820A (en) * 2024-03-15 2024-04-16 北京电科智芯科技有限公司 Multi-source heterogeneous data storage method, device, equipment, chip and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN110597908A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Credit investigation recording method, device and storage medium based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107135661A (en) * 2016-12-26 2017-09-05 深圳前海达闼云端智能科技有限公司 Data processing method, device, system and information collecting device
CN107360156A (en) * 2017-07-10 2017-11-17 广东工业大学 P2P network method for cloud storage based on block chain under a kind of big data environment
CN109409122A (en) * 2018-09-13 2019-03-01 远光软件股份有限公司 File memory method and its electronic equipment, storage medium
CN110597908A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Credit investigation recording method, device and storage medium based on block chain

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898926A (en) * 2020-08-12 2020-11-06 上海信联信息发展股份有限公司 Food safety assessment method and device
CN114422510A (en) * 2020-10-13 2022-04-29 腾讯科技(深圳)有限公司 Service processing method and device
CN114422510B (en) * 2020-10-13 2024-04-30 腾讯科技(深圳)有限公司 Service processing method and device
CN112330181A (en) * 2020-11-17 2021-02-05 支付宝(杭州)信息技术有限公司 Enterprise credit evaluation method and device based on block chain
CN112818405A (en) * 2021-03-01 2021-05-18 北京苏博云科可信空间数据技术有限公司 Data processing method and device of block chain and readable storage medium
CN112950416A (en) * 2021-03-11 2021-06-11 全链通有限公司 Block chain-based electronic evidence processing method and device and readable medium
CN112950416B (en) * 2021-03-11 2023-11-17 全链通有限公司 Electronic evidence processing method and device based on blockchain and readable medium
CN113032489A (en) * 2021-03-29 2021-06-25 湖北央中巨石信息技术有限公司 Asynchronous consensus method, system, device and medium based on block chain
CN112988896B (en) * 2021-03-29 2023-02-28 湖北央中巨石信息技术有限公司 Synchronous consensus method, system, device and medium based on block chain
CN112988896A (en) * 2021-03-29 2021-06-18 湖北央中巨石信息技术有限公司 Synchronous consensus method, system, device and medium based on block chain
CN113157698A (en) * 2021-04-23 2021-07-23 上海和数软件有限公司 Data query verification method and system based on block chain technology
CN113282664B (en) * 2021-06-09 2023-11-24 中国农业银行股份有限公司 Block chain-based data synchronization method, system and storage medium
CN113282664A (en) * 2021-06-09 2021-08-20 中国农业银行股份有限公司 Data synchronization method, system and storage medium based on block chain
CN113538156B (en) * 2021-06-10 2023-10-27 泰康保险集团股份有限公司 Method and device for processing estimated business of professional annuity
CN113538156A (en) * 2021-06-10 2021-10-22 泰康保险集团股份有限公司 Method and device for processing valuation service of occupational annuity
CN113609407B (en) * 2021-07-30 2024-04-05 盐城天眼察微科技有限公司 Regional consistency verification method and device
CN113609407A (en) * 2021-07-30 2021-11-05 盐城金堤科技有限公司 Region consistency checking method and device
CN114708990B (en) * 2022-06-07 2022-09-06 肺诊网(苏州)网络科技有限公司 Remote digital media sharing method and system based on 5G internet
CN114708990A (en) * 2022-06-07 2022-07-05 肺诊网(苏州)网络科技有限公司 Remote digital media sharing method and system based on 5G internet
CN115664678A (en) * 2022-10-27 2023-01-31 成都质数斯达克科技有限公司 Block chain based trusted data verification method, device, equipment and storage medium
CN117891820A (en) * 2024-03-15 2024-04-16 北京电科智芯科技有限公司 Multi-source heterogeneous data storage method, device, equipment, chip and storage medium
CN117891820B (en) * 2024-03-15 2024-05-14 北京电科智芯科技有限公司 Multi-source heterogeneous data storage method, device, equipment, chip and storage medium

Similar Documents

Publication Publication Date Title
CN111444550A (en) Block chain-based service data verification method and device and readable storage medium
CN112214780B (en) Data processing method and device, intelligent equipment and storage medium
CN109409122B (en) File storage method, electronic device and storage medium
US20220092586A1 (en) Off network identity tracking in anonymous cryptocurrency exchange networks
KR101781583B1 (en) File management and search system based on block chain and file management and search method
US20210091960A1 (en) Tracking and verification of physical assets
JP3629516B2 (en) Proxy server, electronic signature system, electronic signature verification system, network system, electronic signature method, electronic signature verification method, and storage medium
Mukta et al. Blockchain-based verifiable credential sharing with selective disclosure
CN110598446A (en) Block chain based test method and device, storage medium and computer equipment
WO2019032089A1 (en) Blockchain architecture with record security
CN111444273B (en) Data authorization method and device based on block chain
CN110633963A (en) Electronic bill processing method, electronic bill processing device, computer-readable storage medium and equipment
CN111461852A (en) Data processing method and device based on block chain and readable storage medium
CN111460457A (en) Real estate property registration supervision method, device, electronic equipment and storage medium
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
CN113506110A (en) Data processing method and equipment
CN111488372A (en) Data processing method, device and storage medium
KR20200074474A (en) Data storage method using block chain based IoT platform
US20220158840A1 (en) Methods and systems for exchanging confidential information via a blockchain
KR20230005353A (en) Sanctioned Events in a Decentralized Database
CN112448946A (en) Log auditing method and device based on block chain
WO2008065345A1 (en) Cyber cash
Fukuda et al. Efficient blockchain-based IoT firmware update considering distribution incentives
Le et al. TrustedChain: A blockchain-based data sharing scheme for supply chain
US20220278845A1 (en) Honest behavior enforcement via blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20200724