CN111541549A - Block chain based information transfer method, device, equipment and storage medium - Google Patents

Block chain based information transfer method, device, equipment and storage medium Download PDF

Info

Publication number
CN111541549A
CN111541549A CN202010375107.XA CN202010375107A CN111541549A CN 111541549 A CN111541549 A CN 111541549A CN 202010375107 A CN202010375107 A CN 202010375107A CN 111541549 A CN111541549 A CN 111541549A
Authority
CN
China
Prior art keywords
information
signature
target
process point
point information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010375107.XA
Other languages
Chinese (zh)
Other versions
CN111541549B (en
Inventor
刘兴国
程金林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Tianji Data Co.,Ltd.
Original Assignee
Jiangxi Yiyuexin Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangxi Yiyuexin Network Technology Co ltd filed Critical Jiangxi Yiyuexin Network Technology Co ltd
Priority to CN202010375107.XA priority Critical patent/CN111541549B/en
Publication of CN111541549A publication Critical patent/CN111541549A/en
Application granted granted Critical
Publication of CN111541549B publication Critical patent/CN111541549B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention discloses an information transmission method based on a block chain, which comprises the following steps: when an approval request is received, acquiring target process point information corresponding to the approval request; judging whether the target process point information is tampered or not according to a target signature in the target process point information; if the target process point information is not tampered, adding a new signature in the target process point information; the invention also discloses an information transmission device, equipment and a storage medium based on the block chain. The invention ensures that the information to be transmitted is not maliciously tampered when being transmitted on each flow point through the unique signatures of different flow points, and ensures that the information to be transmitted is accurate when being uploaded to the block chain.

Description

Block chain based information transfer method, device, equipment and storage medium
Technical Field
The present invention relates to the field of blockchain applications, and in particular, to a method, an apparatus, a device, and a storage medium for information transfer based on blockchains.
Background
With the progress of science and the rapid development of computer technology, the block chain technology has been applied to various fields, such as the financial field, the logistics field, the public service field, and the like, when an enterprise or an organization in each field uses the block chain technology, the information uploaded to the block chain needs to be checked before the information of production operation, business finance, and the like of the enterprise is uploaded to the block chain, and because the block chain has the characteristics of decentralization, independence, safety, and the like, the accuracy of the information uploaded to the block chain needs to be ensured through the checking.
The existing auditing before uploading the information to the block chain has many processes and complicated auditing process, and the auditing process may be tampered or stolen, so that the accuracy of the information (before uploading to the block chain) cannot be ensured.
Disclosure of Invention
The invention mainly aims to provide an information transmission method based on a block chain, and aims to solve the technical problems that the existing auditing method before uploading information to the block chain has many processes and complicated auditing process, and the auditing process is possibly tampered or stolen, so that the accuracy of the information cannot be ensured.
In addition, in order to achieve the above object, the present invention further provides an information transfer method based on a block chain, where the information transfer method based on the block chain includes the following steps:
when an approval request is received, acquiring target process point information corresponding to the approval request;
judging whether the target process point information is tampered or not according to a target signature in the target process point information;
if the target process point information is not tampered, adding a new signature in the target process point information;
and uploading the target process point information added with the new signature to a target block chain.
Optionally, when an approval request is received, the step of obtaining the target process point information corresponding to the approval request includes:
when an approval request is received, determining a first process point and a second process point corresponding to the approval request;
inquiring a public key corresponding to the first flow point in a preset public key library;
and decrypting the approval request according to the public key corresponding to the first process point and the private key of the second process point to obtain the target process point information.
Optionally, after the step of determining whether the target flow point information is tampered with according to the target signature in the target flow point information, the method includes:
acquiring the signature time of the target signature, and inquiring a standard signature corresponding to the signature time in a preset signature database;
judging whether the target signature is the same as the standard signature;
if the target signature is different from the standard signature, determining that the target process point information is tampered;
and if the target signature is the same as the standard signature, determining that the target process point information is not tampered.
Optionally, after the step of determining that the target process point information is tampered, if the target signature is different from the standard signature, the method includes:
if the target process point information is tampered, determining an object process point corresponding to the target signature;
and acquiring object process point information corresponding to the object process point, sending the object process point information to an initial process point, and starting process transmission.
Optionally, after the step of determining that the target process point information is tampered, if the target signature is different from the standard signature, the method further includes:
if the target process point information is tampered, determining the tampered information in the target process point information;
and if the tampered information belongs to preset sensitive information, outputting early warning prompt information.
Optionally, if the target flow point information is not tampered, the step of adding a new signature to the target flow point information includes:
if the target process point information is not tampered, acquiring current time, and inquiring a current signature corresponding to the current time in the preset signature database;
and adding the current signature to the target process point information.
Optionally, the step of uploading the target flow point information added with the new signature to the target block chain includes:
and if the target process point information added with the new signature is transmitted to the tail process point, uploading the target process point information added with the new signature to a target block chain.
In addition, to achieve the above object, the present invention provides a block chain based information transfer apparatus, including:
the acquisition module is used for acquiring target process point information corresponding to an approval request when the approval request is received;
the judging module is used for judging whether the target process point information is tampered or not according to the target signature in the target process point information;
the signature adding module is used for adding a new signature into the target process point information if the target process point information is not tampered;
and the uploading block chain module is used for uploading the target process point information added with the new signature to a target block chain.
In addition, to achieve the above object, the present invention also provides a block chain based information transfer apparatus, including: a memory, a processor and a blockchain based information transfer program stored on the memory and executable on the processor, the blockchain based information transfer program implementing the steps of the blockchain based information transfer method as described above when executed by the processor.
In addition, to achieve the above object, the present invention further provides a storage medium having a blockchain-based information delivery program stored thereon, wherein the blockchain-based information delivery program, when executed by a processor, implements the steps of the blockchain-based information delivery method as described above.
The embodiment of the invention provides a block chain-based information transmission method, a block chain-based information transmission device, block chain-based information transmission equipment and a storage medium. In the embodiment of the invention, when information to be transmitted is transmitted to a certain flow point, the flow point receives an approval request, an information transmission program based on a block chain acquires target flow point information corresponding to the approval request, the information transmission program based on the block chain further judges whether the target flow point information is tampered according to a target signature in the target flow point information, when the target flow point information is judged not to be tampered, the information transmission program based on the block chain signs the target flow point information based on the current flow point, and when the current flow point is an end flow point, the information transmission program based on the block chain uploads the signed end flow point information to the target block chain. Through the unique signatures of different process points, the information to be transmitted is ensured not to be maliciously tampered when being transmitted on each process point, and the information to be transmitted is ensured to be accurate when being uploaded to the block chain.
Drawings
Fig. 1 is a schematic hardware structure diagram of an embodiment of an information delivery apparatus based on a block chain according to an embodiment of the present invention;
FIG. 2 is a flowchart illustrating a block chain-based information delivery method according to a first embodiment of the present invention;
FIG. 3 is a flowchart illustrating a block chain-based information delivery method according to a second embodiment of the present invention;
FIG. 4 is a flowchart illustrating a block chain based information delivery method according to a third embodiment of the present invention;
fig. 5 is a functional block diagram of an embodiment of an information delivery apparatus based on a block chain according to the present invention.
The implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for facilitating the explanation of the present invention, and have no specific meaning in itself. Thus, "module", "component" or "unit" may be used mixedly.
The information transmission terminal (also called terminal, equipment or terminal equipment) based on the block chain in the embodiment of the invention can be equipment which can be used for installing programs and carrying out data calculation, such as a smart phone, a personal computer, an electronic book and the like, and can also be equipment which can be used for storing data, such as a server and the like.
As shown in fig. 1, the terminal may include: a processor 1001, such as a CPU, a network interface 1004, a user interface 1003, a memory 1005, a communication bus 1002. Wherein a communication bus 1002 is used to enable connective communication between these components. The user interface 1003 may include a Display screen (Display), an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI interface). The memory 1005 may be a high-speed RAM memory or a non-volatile memory (e.g., a magnetic disk memory). The memory 1005 may alternatively be a storage device separate from the processor 1001.
Optionally, the terminal may further include a camera, a Radio Frequency (RF) circuit, a sensor, an audio circuit, a WiFi module, and the like. Such as light sensors, motion sensors, and other sensors. Specifically, the light sensor may include an ambient light sensor that may adjust the brightness of the display screen according to the brightness of ambient light, and a proximity sensor that may turn off the display screen and/or the backlight when the mobile terminal is moved to the ear. As one of the motion sensors, the gravity acceleration sensor can detect the magnitude of acceleration in each direction (generally, three axes), detect the magnitude and direction of gravity when the mobile terminal is stationary, and can be used for applications (such as horizontal and vertical screen switching, related games, magnetometer attitude calibration), vibration recognition related functions (such as pedometer and tapping) and the like for recognizing the attitude of the mobile terminal; of course, the mobile terminal may also be configured with other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which are not described herein again.
Those skilled in the art will appreciate that the terminal structure shown in fig. 1 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
As shown in fig. 1, a memory 1005, which is a kind of computer storage medium, may include therein an operating system, a network communication module, a user interface module, and a blockchain-based information transfer program.
In the terminal shown in fig. 1, the network interface 1004 is mainly used for connecting to a backend server and performing data communication with the backend server; the user interface 1003 is mainly used for connecting a client (user side) and performing data communication with the client; and the processor 1001 may be configured to call a blockchain-based information delivery program stored in the memory 1005, which when executed by the processor, implements the operations in the blockchain-based information delivery method provided by the embodiments described below.
Based on the hardware structure of the device, the embodiment of the information transmission method based on the block chain is provided.
Referring to fig. 2, in a first embodiment of the information transfer method based on a block chain of the present invention, the information transfer method based on a block chain includes:
and step S10, when receiving the approval request, acquiring the target process point information corresponding to the approval request.
The information delivery method based on the block chain in this embodiment is applied to information delivery devices based on the block chain, where the information delivery devices based on the block chain include smart phones, personal computers, electronic books, and other terminals capable of installing programs and performing data calculation, and further include servers and other devices capable of storing data.
In this embodiment, the approval request means that the information that needs to be linked (uploaded to the block chain) needs to be checked at multiple process points before being linked to ensure that the information linked to the block chain is accurate, for example, a company wants to upload the information about a quarter transaction to the block chain, and before being uploaded, the information about the quarter transaction passes through the checks at the process points such as accounting, finance, and chief executive to ensure that the information about the quarter transaction is accurate. After the auditing of one process point is completed, the information to be transmitted can flow to the next process point, and when the information to be transmitted flows to the next process point, the next process point can receive the auditing request, and the auditing request has the function of reminding relevant personnel of the next process point to audit the information to be transmitted. In this embodiment, the target text means that the information to be transmitted includes, in addition to the information that needs to be uplinked, an audit flag (i.e., a signature) of a person associated with each flow point that has been completed after transmission, and after the signature and the information that needs to be uplinked are bound and fused, a text is generated for transmission. In this embodiment, the target flow point information is information to be transmitted, which includes information and a signature that need to be uplinked.
Step S20, determining whether the target flow point information is tampered with according to the target signature in the target flow point information.
In this embodiment, the target signature is all signatures in the target process point information, that is, a signature signed by a process point that has been approved, and it is known that the signature and the information that needs to be uplinked are bound and fused together to form the target process point information.
This embodiment provides a specific application scenario, where a company wants to upload one quarter transaction information to a block chain, 4 flow points before the chain are 4, which are accounting, finance, chief director and president in turn according to an approval sequence, the corresponding flow points are A, B, C and D respectively, the accounting uploads the one quarter transaction information to a flow point a after the integration of the one quarter transaction information is completed, checks that the one quarter transaction information is correct, and then prints its own signature, which may be a string of binary codes, for example, 011100001110, and then transmits the one quarter transaction information with a signature to a flow point B based on an information transmission program of the block chain, the finance first checks whether an a signature in the transmitted information is correct to determine whether the one quarter transaction information is stolen and modified by the outside during the transmission from the flow point a to the flow point B, if the a signature in the information received by the flow point B is correct (that the corresponding binary code is correct), the target flow point information is not tampered; if the signature a in the information received by the flow point B is incorrect (i.e. the corresponding binary code is incorrect), it indicates that the target flow point information is tampered, and the following flow point method is the same.
In step S30, if the target flow point information is not tampered with, a new signature is added to the target flow point information.
This embodiment provides a specific application scenario, where a company wants to upload one quarter transaction information to a block chain, 4 flow points before the chain are 4, which are accounting, finance, chief director and president in turn according to an approval sequence, the corresponding flow points are A, B, C and D respectively, the accounting uploads the one quarter transaction information to a flow point a after the integration of the one quarter transaction information is completed, checks that the one quarter transaction information is correct, and then prints its own signature, which may be a string of binary codes, for example, 011100001110, and then transmits the one quarter transaction information with a signature to a flow point B based on an information transmission program of the block chain, the finance first checks whether an a signature in the transmitted information is correct to determine whether the one quarter transaction information is stolen and modified by the outside during the transmission from the flow point a to the flow point B, if the a signature in the information received by the flow point B is correct (that the corresponding binary code is correct), it indicates that the target flow point information has not been tampered, in which case the finance can be signed on the quarter transaction information by clicking the "ok" button based on the blockchain messaging program, then the quarter transaction information including the accounting signature and the financial signature is passed to flow point C, and the determination of whether the target flow point information has been tampered with is continued until the information is linked.
And step S40, uploading the target flow point information added with the new signature to a target block chain.
In this embodiment, when no flow point can be transmitted in the target flow point information to which the new signature is added, it is stated that the target flow point information to which the new signature is added comes from an end flow point, where the end flow point refers to a last flow point at which information to be transmitted is checked, and in this case, the target flow point information to which the new signature is added includes the information to be transmitted and signatures of all flow points. Therefore, when the information to be transmitted reaches the last flow point (i.e., the last flow point), after the signature is made by the person associated with the last flow point, the information transmission program based on the block chain may further continue to determine whether the information of the last flow point is tampered, so as to ensure that the information is not tampered during the process from the last flow point to the block chain, but the last flow point may be directly connected to the block chain, and the signature of the last flow point may be encrypted, so as to ensure that the signature of the last flow point is not stolen and modified by the outside.
Specifically, the step of S10 refinement further includes:
step a1, when an approval request is received, determining a first process point and a second process point corresponding to the approval request.
Step a2, inquiring a public key corresponding to the first flow point in a preset public key library.
Step a3, decrypting the approval request according to the public key corresponding to the first process point and the private key of the second process point to obtain the target process point information.
This embodiment provides a specific application scenario, where existing information to be uplink is to be transmitted between four process points, where the four process points are a process point a, a process point b, a process point c, and a process point d in sequence, and after the information to be uplink is signed by a relevant person of the process point a, the relevant person of the process point a can encrypt the information to be uplink by using a private key corresponding to the process point a and a public key corresponding to the process point b, starting from the process point a; then after the information to be uplink is transmitted to the flow point b, the related personnel of the flow point b can decrypt the information to be uplink transmitted to the flow point b by using the private key corresponding to the flow point b and the public key corresponding to the flow point a to obtain the information to be uplink, the related personnel of the flow point b signs the information to be uplink after obtaining the information to be uplink (the signature corresponding to the flow point b), and then the related personnel of the flow point b can encrypt the information to be uplink transmitted to the flow point b by using the private key corresponding to the flow point b and the public key corresponding to the flow point c; subsequently, after the information to be uplink is transmitted to the flow point c, the relevant personnel of the flow point c can decrypt the information to be uplink transmitted to the flow point c by using the private key corresponding to the flow point c and the public key corresponding to the flow point b to obtain the information to be uplink, after the relevant personnel of the flow point c obtain the information to be uplink, the information to be uplink is signed (the signature corresponding to the flow point c), and then the relevant personnel of the flow point c can encrypt the information to be uplink transmitted to the flow point c by using the private key corresponding to the flow point c and the public key corresponding to the flow point d; finally, the information to be linked up is uploaded to the blockchain in the encryption and decryption processes.
The first flow point and the second flow point in this embodiment are two adjacent flow points, and when the first flow point is the flow point a in this embodiment, the second flow point is the flow point b in this embodiment, and so on. The preset public key library in this embodiment is a database storing public keys of all the process points, and for a specific application scenario given in this embodiment, the preset public key library includes public keys of the process point a, the process point b, the process point c, and the process point d. The target text in this embodiment means that, for the specific application scenario given in this embodiment, the target text is information to be uplinked, which is obtained after decryption each time.
In this embodiment, when information to be transmitted is transmitted to a certain flow point, the flow point receives an approval request, the block chain-based information transmission program acquires target flow point information corresponding to the approval request, the block chain-based information transmission program further determines whether the target flow point information is tampered according to a target signature in the target flow point information, when it is determined that the target flow point information is not tampered, the block chain-based information transmission program signs the target flow point information based on the current flow point, and when the current flow point is an end flow point, the block chain-based information transmission program uploads the signed end flow point information to the target block chain. Through the unique signatures of different process points, the information to be transmitted is ensured not to be maliciously tampered when being transmitted on each process point, and the information to be transmitted is ensured to be accurate when being uploaded to the block chain.
Further, referring to fig. 3, a second embodiment of the information delivery method based on the block chain according to the present invention is proposed on the basis of the above-mentioned embodiment of the present invention.
This embodiment is a step after step S20 in the first embodiment, and the present embodiment is different from the above-described embodiments of the present invention in that:
step S50, obtaining the signature time of the target signature, and inquiring a standard signature corresponding to the signature time in a preset signature database.
Therefore, in order to further ensure the accuracy and safety of the information of the target flow point, the unique signature of each flow point is continuously refreshed along with time, so that the information leakage of relevant personnel at the flow point can be prevented, when the relevant personnel at each flow point signs the information to be transmitted, the information transmission program based on the block chain acquires the current time of the system, and writes the current time of the system into the information to be transmitted along with the signature, so that the information of the target flow point comprises the information to be transmitted, the target signature and the signature time. The preset signature database in this embodiment is a database in which a plurality of sets of standard signatures are stored, where the number of signatures of each set of standard signatures is equal to the number of flow points, and specifically, as a period of time passes, a set of standard signatures corresponding to the current signature time is randomly selected from the plurality of sets of standard signatures in the preset signature database by the information delivery program based on the block chain. Therefore, each flow point can randomly select a signature from a preset signature database according to time as a standard signature corresponding to the current signature time.
Step S60, determining whether the target signature is the same as the standard signature.
Therefore, the signature is bound and fused with the information to be transmitted, and if the information to be transmitted is tampered in the process of transmitting the information to the next process point at one process point, a related person at the next process point finds that the signature at the process point is inaccurate when checking the signature.
Step S70, if the target signature is not the same as the standard signature, determining that the target flow point information is tampered.
Step S80, if the target signature is the same as the standard signature, it is determined that the target flow point information has not been tampered with.
This embodiment provides a specific application scenario, a company wants to upload one quarter transaction information to a block chain, there are 4 flow points before the chain, which are accounting, finance, chief executive and president in turn according to the approval sequence, the corresponding flow points are 1, 2, 3 and 4, the accounting integrates the one quarter transaction information and checks it correctly, then writes a signature specific to the flow point 1 on the one quarter transaction information at 14:00 pm, as shown in table 1, the signature may be a string of binary codes 011100001110, and then the one quarter transaction information with the signature specific to the flow point 1 is transmitted to the flow point 2, and a relevant person at the flow point 2 checks the signature and signature time of the flow point 1 and queries a preset signature database, so that the signature corresponding to the flow point 1 at the signature time of 14:00 should be 011100001110 (i.e. the standard signature in this embodiment), if the signature included in the quarter transaction message received by the flow point 2 is not the same as the signature 011100001110, the blockchain-based message passing program determines that the quarter transaction message (i.e. the target flow point message) is tampered; if the signature included in the one-quarter transaction information received by the flow point 2 is the same as 011100001110, the information transfer program based on the block chain determines that the one-quarter transaction information (i.e., the target flow point information) has not been tampered, if the flow point 2 completes the verification of the one-quarter transaction information, the signature 011110011110 specific to the flow point 2 is written in the one-quarter transaction information at 15:00, and then the one-quarter transaction information with the signature specific to the flow point 1 and the signature specific to the flow point 2 is transferred to the flow point 3, and the steps executed by the flow point 3 are the same as those of the flow point 2, i.e., it is determined whether the signatures of the flow point 1 and the flow point 2 are correct, and when the signature is correct, the signature specific to the flow point 3 is written and then transferred to the next flow point until the flow point is transferred.
Flow point/time 1 2 3 4
14:00 011100001110 010100101110 011100001111 111100001110
15:00 000100001110 011110011110 011101101110 001100001010
16:00 011001101110 011110010010 010011101110 011101100011
17:00 111001101110 111100111010 110110011010 110001101010
TABLE 1
Specifically, the steps after S70 further include:
step b1, if the target flow point information is tampered, determining the target flow point corresponding to the target signature.
Step b2, acquiring object flow point information corresponding to the object flow point, sending the object flow point information to an initial flow point, and starting flow transmission.
As shown in the specific application scenario of step S80, if the signature included in the quarterly transaction information received by the flow point 3 is different from 011110011110, the blockchain-based messaging program determines that the quarter transaction message was tampered with, and that tampering occurred during the transfer from point 2 to point 3, this indicates that the quarter transaction information is still correct (i.e. no tampering problems have occurred) when passed to flow point 2, in the application scenario, the flow point 2 is the target flow point in the embodiment, the quarterly transaction information transmitted to the flow point 2 is the flow point information in the embodiment, after the block chain-based information transmission program determines that the transmission process from the flow point 2 to the flow point 3 is tampered, the quarter transaction message delivered to flow point 2 is de-signed and sent to the original flow point to restart the message delivery process.
Specifically, the steps after S70 further include:
step c1, if the target process point information is tampered, determining the tampered information in the target process point information.
And c2, if the tampered information belongs to preset sensitive information, outputting early warning prompt information.
As can be seen from the specific application scenarios given in steps b1 and b2, if the tampered quarterly transaction information belongs to business-sensitive information (i.e., preset sensitive information in this embodiment), the information delivery program based on the blockchain will stop the information delivery process, and output an early warning prompt message to remind relevant people to investigate the leakage and tampering of the information. In combination with a specific application scenario, the tampered information in this embodiment refers to a tampered part in the one-quarter transaction information, for example, a transaction amount, a transaction item, and the like.
In the embodiment, the security of information transmission among the flow points is ensured by special limitation on the signature, and a convenient solution is provided when the information is tampered through various alternative schemes.
Further, referring to fig. 4, three embodiments of the information delivery method based on the block chain according to the present invention are proposed on the basis of the above-mentioned embodiments of the present invention.
This embodiment is a step of the first embodiment, which is a refinement of step S30, and the difference between this embodiment and the above-described embodiment of the present invention is:
step S31, if the target process point information is not tampered, obtaining the current time, and querying the current signature corresponding to the current time in the preset signature database.
As can be seen from the specific application scenario given in the second embodiment, a person associated with the flow point 2 checks the signature and the signature time of the flow point 1, and queries the preset signature database, to know that the signature corresponding to the flow point 1 at the signature time of 14:00 should be 011100001110, if the signature included in the one-quarter transaction information received by the flow point 2 is the same as 011100001110, the information transfer program based on the block chain determines that the one-quarter transaction information has not been tampered with, in this case, the information transfer program based on the block chain acquires the current time of the system (i.e., the current time in this embodiment), and queries the table 1, and if the current time is 15:00, the corresponding signature is 011110011110 (i.e., the current signature in this embodiment).
And step S32, adding the current signature to the target flow point information.
Therefore, after the current signature corresponding to the current time is inquired, the information transfer program based on the block chain adds the information of the flow point 2 to the target flow point information, and uses the information of the current signature at the flow point 2 to correspondingly write the signature, and adds the current time as the signature time for the subsequent flow points, and checks whether the information transferred from the flow point 2 is tampered according to the signature time and the current signature.
Specifically, the step of step S40 refinement in the first embodiment further includes:
and d1, if the target flow point information added with the new signature is transmitted to the tail flow point, uploading the target flow point information added with the new signature to the target block chain.
As can be seen from the specific application scenario given by step S80 in the second embodiment, after writing the unique signature, the flow point 3 transmits the one-quarter transaction information including the flow point 1 unique signature, the flow point 2 unique signature, and the flow point 3 unique signature to the flow point 4, because the flow point 4 is the last flow point, the one-quarter transaction information including the flow point 1 unique signature, the flow point 2 unique signature, the flow point 3 unique signature, and the flow point 4 unique signature is the last flow point information in this embodiment, it is known that there is no flow point after the flow point 4, and the process of determining whether the information is tampered still exists, and the information transmission program based on the block chain determines whether the last flow point information is tampered according to the flow point 4 unique signature (i.e., the last signature in this embodiment) in the last flow point information, the above embodiments have been described in detail.
It can be seen from the specific application scenario given by step S80 in the second embodiment that, after the check of the one-quarter transaction information by the flow point 4 is completed, the signature 110001101010 specific to the flow point 4 is written in the one-quarter transaction information at 17:00, and then, whether the one-quarter transaction information with the 4 flow point unique signatures is tampered by the block chain-based information transfer program is determined, as can be seen from the lookup table 1, the unique signature corresponding to the flow point 4 at 17:00 is 110001101010, and if the signature included in the one-quarter transaction information sent by the flow point 4 is the same as 110001101010, the block chain-based information transfer program determines that the last flow point information is not tampered, and the block chain-based information transfer program further uploads the last flow point information to the block chain (i.e., the target block chain in this embodiment) to complete the uplink work of the information.
In the embodiment, through the change relationship between the signature and the time, the security of information transmission is ensured while the signature integrated with the information binding is ensured to be accurate.
In addition, referring to fig. 5, an embodiment of the present invention further provides an information transfer apparatus based on a block chain, where the information transfer apparatus based on a block chain includes:
the acquisition module 10 is used for acquiring target process point information corresponding to an approval request when the approval request is received;
a judging module 20, configured to judge whether the target process point information is tampered according to a target signature in the target process point information;
the signature adding module 30 is configured to add a new signature to the target flow point information if the target flow point information is not tampered;
and the uploading block chain module 40 is configured to upload the target process point information to which the new signature is added to the target block chain.
In one embodiment, the target text acquiring module includes:
the device comprises a flow point determining unit, a processing unit and a processing unit, wherein the flow point determining unit is used for determining a first flow point and a second flow point corresponding to an approval request when the approval request is received;
the query unit is used for querying a public key corresponding to the first flow point in a preset public key library;
and the decryption unit is used for decrypting the approval request according to the public key corresponding to the first process point and the private key of the second process point to obtain the target process point information.
In an embodiment, the apparatus for block chain based information transfer further includes:
the signature time acquisition module is used for acquiring the signature time of the target signature and inquiring a standard signature corresponding to the signature time in a preset signature database;
the signature judging module is used for judging whether the target signature is the same as the standard signature or not;
a tampered determining module, configured to determine that the target process point information is tampered if the target signature is different from the standard signature;
and the tampering determination module is used for determining that the target process point information is not tampered if the target signature is the same as the standard signature.
In an embodiment, the apparatus for block chain based information transfer further includes:
an object flow point determining module, configured to determine an object flow point corresponding to the target signature if the target flow point information is tampered with;
and the process transmission starting module is used for acquiring the object process point information corresponding to the object process point, sending the object process point information to the initial process point and starting process transmission.
In an embodiment, the apparatus for block chain based information transfer further includes:
the tampered information query module is used for determining tampered information in the target process point information if the target process point information is tampered;
and the prompt information output module is used for outputting early warning prompt information if the tampered information belongs to preset sensitive information.
In one embodiment, the add signature module includes:
a current time obtaining unit, configured to obtain a current time if the target process point information is not tampered, and query a current signature corresponding to the current time in the preset signature database;
and the signature unit is used for adding the current signature to the target flow point information.
In one embodiment, the upload blockchain module includes:
and the uploading unit is used for uploading the target process point information added with the new signature to the target block chain if the target process point information added with the new signature is transmitted to the tail process point.
In addition, the embodiment of the invention also provides a storage medium.
The storage medium has a computer program stored thereon, and the computer program, when executed by a processor, implements the operations in the block chain based information delivery method provided by the above embodiments.
The method executed by each program module can refer to each embodiment of the method of the present invention, and is not described herein again.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity/action/object from another entity/action/object without necessarily requiring or implying any actual such relationship or order between such entities/actions/objects; the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
For the apparatus embodiment, since it is substantially similar to the method embodiment, it is described relatively simply, and reference may be made to some descriptions of the method embodiment for relevant points. The above-described apparatus embodiments are merely illustrative, in that elements described as separate components may or may not be physically separate. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the invention. One of ordinary skill in the art can understand and implement it without inventive effort.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium (e.g., ROM/RAM, magnetic disk, optical disk) as described above and includes instructions for enabling a terminal device (e.g., a mobile phone, a computer, a server, an air conditioner, or a network device) to execute the method according to the embodiments of the present invention.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. An information transfer method based on a block chain is characterized in that the information transfer method based on the block chain comprises the following steps:
when an approval request is received, acquiring target process point information corresponding to the approval request;
judging whether the target process point information is tampered or not according to a target signature in the target process point information;
if the target process point information is not tampered, adding a new signature in the target process point information;
and uploading the target process point information added with the new signature to a target block chain.
2. The blockchain-based information transfer method according to claim 1, wherein the step of obtaining the target process point information corresponding to the approval request when the approval request is received comprises:
when an approval request is received, determining a first process point and a second process point corresponding to the approval request;
inquiring a public key corresponding to the first flow point in a preset public key library;
and decrypting the approval request according to the public key corresponding to the first process point and the private key of the second process point to obtain the target process point information.
3. The method as claimed in claim 1, wherein the step of determining whether the target flow point information is tampered with according to the target signature in the target flow point information is followed by:
acquiring the signature time of the target signature, and inquiring a standard signature corresponding to the signature time in a preset signature database;
judging whether the target signature is the same as the standard signature;
if the target signature is different from the standard signature, determining that the target process point information is tampered;
and if the target signature is the same as the standard signature, determining that the target process point information is not tampered.
4. The blockchain-based message delivery method of claim 3, wherein the step of determining that the target flow point message is tampered with if the target signature is not the same as the standard signature comprises:
if the target process point information is tampered, determining an object process point corresponding to the target signature;
and acquiring object process point information corresponding to the object process point, sending the object process point information to an initial process point, and starting process transmission.
5. The blockchain-based information delivery method of claim 3, wherein after the step of determining that the target flow point information is tampered with if the target signature is not the same as the standard signature, the method further comprises:
if the target process point information is tampered, determining the tampered information in the target process point information;
and if the tampered information belongs to preset sensitive information, outputting early warning prompt information.
6. The blockchain-based information transfer method of claim 1, wherein the step of adding a new signature to the target flow point information if the target flow point information is not tampered with comprises:
if the target process point information is not tampered, acquiring current time, and inquiring a current signature corresponding to the current time in the preset signature database;
and adding the current signature to the target process point information.
7. The blockchain-based information delivery method of claim 1, wherein the step of uploading the target flow point information added with the new signature to the target blockchain comprises:
and if the target process point information added with the new signature is transmitted to the tail process point, uploading the target process point information added with the new signature to a target block chain.
8. A blockchain-based information transfer apparatus, comprising:
the acquisition module is used for acquiring target process point information corresponding to an approval request when the approval request is received;
the judging module is used for judging whether the target process point information is tampered or not according to the target signature in the target process point information;
the signature adding module is used for adding a new signature into the target process point information if the target process point information is not tampered;
and the uploading block chain module is used for uploading the target process point information added with the new signature to a target block chain.
9. A blockchain-based information transfer apparatus, characterized in that the blockchain-based information transfer apparatus comprises: memory, a processor and a blockchain based information transfer program stored on the memory and executable on the processor, which when executed by the processor implements the steps of the blockchain based information transfer method according to any one of claims 1 to 7.
10. A storage medium, characterized in that the storage medium has stored thereon a blockchain based information transfer program, which when executed by a processor implements the steps of the blockchain based information transfer method according to any one of claims 1 to 7.
CN202010375107.XA 2020-05-06 2020-05-06 Block chain based information transfer method, device, equipment and storage medium Active CN111541549B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010375107.XA CN111541549B (en) 2020-05-06 2020-05-06 Block chain based information transfer method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010375107.XA CN111541549B (en) 2020-05-06 2020-05-06 Block chain based information transfer method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111541549A true CN111541549A (en) 2020-08-14
CN111541549B CN111541549B (en) 2022-01-14

Family

ID=71979247

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010375107.XA Active CN111541549B (en) 2020-05-06 2020-05-06 Block chain based information transfer method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111541549B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112712452A (en) * 2020-12-02 2021-04-27 杭州趣链科技有限公司 Approval information processing method and device based on block chain
CN112883428A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 Tamper-proof method for IT asset management system
CN112883414A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 IT asset management and renovation platform

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109345240A (en) * 2018-09-13 2019-02-15 海智(天津)大数据服务有限公司 A kind of electronic business license application system and method based on block chain
CN109754226A (en) * 2019-01-03 2019-05-14 中国联合网络通信集团有限公司 Data managing method, equipment and storage medium
US20190173667A1 (en) * 2016-12-23 2019-06-06 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Block generation method, device and blockchain network
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device
CN111080222A (en) * 2018-10-22 2020-04-28 西安企业资本服务中心有限公司 Approval method and approval system

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190173667A1 (en) * 2016-12-23 2019-06-06 Cloudminds (Shenzhen) Robotics Systems Co., Ltd. Block generation method, device and blockchain network
CN109345240A (en) * 2018-09-13 2019-02-15 海智(天津)大数据服务有限公司 A kind of electronic business license application system and method based on block chain
CN111080222A (en) * 2018-10-22 2020-04-28 西安企业资本服务中心有限公司 Approval method and approval system
CN109754226A (en) * 2019-01-03 2019-05-14 中国联合网络通信集团有限公司 Data managing method, equipment and storage medium
CN110365662A (en) * 2019-06-28 2019-10-22 北京思源互联科技有限公司 Business approval method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112712452A (en) * 2020-12-02 2021-04-27 杭州趣链科技有限公司 Approval information processing method and device based on block chain
CN112883428A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 Tamper-proof method for IT asset management system
CN112883414A (en) * 2021-01-21 2021-06-01 贵州电网有限责任公司 IT asset management and renovation platform

Also Published As

Publication number Publication date
CN111541549B (en) 2022-01-14

Similar Documents

Publication Publication Date Title
CN111541549B (en) Block chain based information transfer method, device, equipment and storage medium
US20180160255A1 (en) Nfc tag-based web service system and method using anti-simulation function
CN100507907C (en) Methods and apparatus for content protection in a wireless network
US10521834B2 (en) Mobile solution for purchase orders
WO2017211205A1 (en) Method and device for updating whitelist
US20060255917A1 (en) System for protecting tag related information and method thereof
KR102144509B1 (en) Proximity communication method and apparatus
CN112199719A (en) Data processing method, device, equipment and computer readable storage medium
CN111899022B (en) Transaction information management method, device, equipment and computer readable storage medium
US9769171B2 (en) Management apparatus, membership managing method, service providing apparatus, and membership managing system
US20130311373A1 (en) Apparatus and method for paying for a product using a near field communication device
CN106384255B (en) Method and device for creating information code popularization information
JP6022904B2 (en) Visit authentication system
CN113421084B (en) Bus card processing method, device, equipment and readable storage medium
JP2017010591A (en) Visit authentication system
CN114422586A (en) Event notification method and device, computer equipment and storage medium
US11604770B2 (en) Methods and systems for secure product tracking data storage and verification
CN113204946B (en) Data control method, device, equipment and storage medium
US11985122B2 (en) Method and apparatus for sharing content data between networked devices
US20220247736A1 (en) Method and apparatus for sharing content data between networked devices
US20210144113A1 (en) Information processing system, information processing apparatus, and information processing method
KR102274055B1 (en) Message system, method for activating application, and user terminal executing the same
CN104639510A (en) Data importing method and system
US20190188926A1 (en) Service management system, non-transitory computer-readable medium storing service management program, and service management method
CN113704700A (en) Method, device, system, electronic equipment and medium for software authorization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210326

Address after: 2309, building 4, excellence Century Center and Huanggang business center, Southeast of the junction of Fuhua third road and Jintian Road, Fushan community, Futian street, Futian District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen Tianji Data Co.,Ltd.

Address before: No.525 Yuanshan Middle Road, Yuanzhou District, Yichun City, Jiangxi Province

Applicant before: Jiangxi yiyuexin Network Technology Co.,Ltd.

GR01 Patent grant
GR01 Patent grant