CN111597562A - Block chain-based on-chain data verification method, device, equipment and storage medium - Google Patents

Block chain-based on-chain data verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN111597562A
CN111597562A CN202010269637.6A CN202010269637A CN111597562A CN 111597562 A CN111597562 A CN 111597562A CN 202010269637 A CN202010269637 A CN 202010269637A CN 111597562 A CN111597562 A CN 111597562A
Authority
CN
China
Prior art keywords
data
service
trade
encrypted
service data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010269637.6A
Other languages
Chinese (zh)
Other versions
CN111597562B (en
Inventor
赵达悦
王梦寒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202010269637.6A priority Critical patent/CN111597562B/en
Publication of CN111597562A publication Critical patent/CN111597562A/en
Application granted granted Critical
Publication of CN111597562B publication Critical patent/CN111597562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present application relates to the field of big data technologies, and in particular, to a block chain-based on-chain data verification method and apparatus, a computer device, and a storage medium. The method comprises the following steps: acquiring encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service; acquiring an incidence relation between each service data of the trade service corresponding to the service identification, and taking the incidence relation as the incidence relation between each encrypted service data of the trade service; and performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result. By adopting the method, the safety of the data on the chain can be improved.

Description

Block chain-based on-chain data verification method, device, equipment and storage medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a device, and a storage medium for verifying data on a chain based on a blockchain.
Background
Supply chain financing as a branch of financing service is characterized by the self-compensation of financing service, i.e. the supply chain service (including trade) on which the financing service is based can generate sufficient cash inflow for reimbursing all principal, interest and cost of the financing service. In supply chain financial transactions, verification of the authenticity of trade transaction data is important.
In the traditional verification mode, an applicant provides various trade service data, and then verification is performed manually, the provided trade service data are plaintext data, potential safety hazards exist, and the processing process is not intelligent enough due to manual verification.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a block chain-based on-chain data verification method, apparatus, device and storage medium capable of improving data security.
A block chain based on-chain data validation method, the method comprising:
acquiring encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service;
acquiring an incidence relation between each service data of the trade service corresponding to the service identification, and taking the incidence relation as the incidence relation between each encrypted service data of the trade service;
and performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
In one embodiment, before obtaining the association relationship between the business data of the trade business corresponding to the business identifier, the method further includes:
receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identification of the trade task;
based on the service identification, the authorization key is sent to other participants of the trade service corresponding to the task identification;
the association relationship is established by performing association operation on each encrypted service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, acquiring an association relationship between service data of a trade service corresponding to a service identifier, and taking the association relationship as an association relationship between encrypted service data of the trade service includes:
acquiring an incidence relation between the same data items in each business data of the trade business, and taking the incidence relation as the incidence relation between the same data items in each encrypted business data of the trade business;
judging whether the encrypted service data corresponding to the association relation is consistent or not, including:
and judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
In one embodiment, after performing cross-validation on each encrypted service data and outputting a cross-validation result, the method further includes:
receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of a trade service for auditing treatment;
and acquiring encrypted service data corresponding to the financing request, a verification result of cross validation of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of cross validation of the encrypted service data and the authorization key of the encrypted service data to the financing terminal, so that the financing terminal can audit the financing request and receive an audit processing result fed back to the block chain by the financing terminal.
In one embodiment, after receiving a financing request from a financing applicant, the method further comprises:
receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant;
and inquiring the historical financing request and the auditing processing result corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
An apparatus for block chain based on-chain data validation, the apparatus comprising:
the encrypted service data acquisition module is used for acquiring encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service;
the incidence relation acquisition module is used for acquiring the incidence relation between the business data of the trade business corresponding to the business identification and taking the incidence relation as the incidence relation between the encrypted business data of the trade business;
and the cross validation module is used for performing text recognition on each encrypted service data of the trade service and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
In one embodiment, the apparatus further includes:
the authorization key receiving module is used for receiving authorization keys respectively sent by all participants of the trade service, and the authorization keys carry service identifiers of the trade tasks;
the authorization key sending module is used for sending the authorization key to other participants of the trade service corresponding to the task identifier based on the service identifier;
the association relationship is established by performing association operation on each encrypted service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the association relationship obtaining module is configured to obtain an association relationship between the same data entry in each piece of business data of the trade business, and use the association relationship as an association relationship between the same data entry in each piece of encrypted business data of the trade business;
and the cross validation module is used for judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
A computer device comprising a memory storing a computer program and a processor implementing the steps of any of the methods described above when the processor executes the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any of the above.
According to the block chain-based on-chain data verification method, device, equipment and storage medium, encrypted service data uploaded by each participant of a trade service based on corresponding block chain link points are obtained, wherein the encrypted service data are data obtained by encrypting the service data by each participant through a homomorphic encryption algorithm, the encrypted service data carry a service identifier of the trade service, then an incidence relation between the service data of the trade service corresponding to the service identifier is obtained, the incidence relation is used as the incidence relation between the encrypted service data of the trade service, text recognition is further performed on the encrypted service data of the trade service, whether the encrypted service data corresponding to the incidence relation are consistent or not is judged, and cross verification is performed on the encrypted service data of the trade service. Therefore, the service data on the block chain are encrypted data, and the data for verification are also encrypted data, so that the safety of the data on the chain can be improved. And the server performs cross validation on the service data through the incidence relation, so that manual participation is reduced, and data processing is more intelligent.
Drawings
FIG. 1 is a diagram of an application scenario of a block chain-based on-chain data verification method in one embodiment;
FIG. 2 is a flow diagram illustrating a method for block chain based on-chain data verification in one embodiment;
FIG. 3 is a block diagram of an on-chain data validation device based on a blockchain in one embodiment;
FIG. 4 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The block chain-based on-chain data verification method provided by the application can be applied to the application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 includes a terminal for each participant to perform data uplink operation, and may also include a terminal for submitting financing application in financing service processing and auditing the financing application. Specifically, the terminal 102 uplinks the encrypted service data corresponding to the trade service through the corresponding block link point. The server 104 obtains encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, obtains an association relationship between each service data of the trade service corresponding to the service identifier based on the service identifier of the trade service, and uses the association relationship as the association relationship between each encrypted service data of the trade service, and then the server 104 performs text recognition on each encrypted service data of the trade service and judges whether the encrypted service data corresponding to the association relationship are consistent or not, so as to perform cross validation on each encrypted service data, thereby obtaining a validation result. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the server 104 may be implemented by an independent server or a server cluster formed by a plurality of servers.
In one embodiment, as shown in fig. 2, a block chain-based on-chain data verification method is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step S202, encrypted service data uploaded by each participant of the trade service based on the corresponding block link point is obtained, the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service.
The trade service refers to a service for performing a trade transaction, such as an order transaction. Each participant in the trading transaction may include a plurality of participants, such as buyers, sellers, logistics parties, and the like.
The business data of the trading business refers to data generated in the trading business, and may include, but is not limited to, purchase order data, invoice data, waybill data, and the like. Wherein, the purchase order data can include but is not limited to purchase order number, name of purchased article, purchase quantity, type of article, size of article, unit price of article, purchase time, delivery address of article, etc.; the invoice data can include but is not limited to invoice number, invoicing date, item name, purchase quantity, item model, item unit price, buyer name, buyer identification number, buyer address and other data; the waybill data may include, but is not limited to, waybill number, consignee and shipper names, addresses, associated times, item types, and the like.
The encrypted service data refers to data obtained by encrypting the service data through a homomorphic encryption algorithm, and the encrypted service data may carry a service identifier of the trade service. The homomorphic encryption algorithm may include, but is not limited to, algorithms such as RSA algorithm, Paillier algorithm, and Gentry algorithm, and the service identifier may be an order number or a trade order number in the trade service.
In this embodiment, the manner in which each participant uploads the encrypted service data to the blockchain may be that each participant fills in the service data in a manner of manual terminal entry, encrypts and then uploads the service data, or may also be a manner of system docking, for example, automatically synchronizes the encrypted service data in an Enterprise Resource Planning system (ERP) to the blockchain through a relevant docking interface.
Optionally, before each participant uploads the encrypted service data, the server may create a block chain node corresponding to each participant, authenticate the authentication information uploaded by each participant through the block chain node corresponding to each participant, and obtain an electronic signature of each participant after the authentication is passed.
The server can authenticate the authentication information submitted by each participant by means of butting external enterprise business information, and the specific authentication method is to authenticate by means of four elements of an enterprise, namely, the authentication method comprises the step of authenticating enterprise names, enterprise codes, legal representative names, legal representative identity numbers and the like of the enterprise.
The server authenticates each participant and acquires the electronic signature of each participant, so that the encrypted service data uploaded by each participant carries the electronic signature of each participant, and the authenticity of the uploaded encrypted service data can be improved.
Step S204, acquiring the association relationship between each service data of the trade service corresponding to the service identification, and taking the association relationship as the association relationship between each encrypted service data of the trade service.
The incidence relation refers to the relation among purchase order data, invoice data and waybill data uploaded by different participants in business data of the trade business.
Specifically, the server may obtain an association relationship between corresponding business data from the block chain through the business identifier of the trade business, and thus obtain an association relationship between encrypted purchase order data, invoice data, and invoice data by using the association relationship as an association relationship between encrypted business data of the trade business.
Alternatively, in some trade services, the transaction amount involved may be large, the buyer may be a purchase made through only one purchase order, the data of the purchase order is only one, but the seller may be a shipment and invoicing made through time-sharing or batch-sharing, so that in the trade service, there are multiple invoices and multiple pieces of logistics information, i.e. multiple pieces of invoice data and multiple pieces of waybill data. In this embodiment, the association relationship may be a relationship of the purchase order data, the plurality of invoice data, and the plurality of waybill data associated with the trade service.
And step S206, performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
As described above, each encrypted service data is ciphertext data obtained through a homomorphic encryption algorithm.
In this embodiment, for each encrypted service data, the plaintext is consistent, the encryption algorithm is consistent, and the ciphertext obtained after encryption is also consistent.
The server can determine whether the encrypted service data corresponding to the association relationship are consistent by performing text recognition on the acquired encrypted service data, so as to perform cross validation on the encrypted service data.
Specifically, if the server determines that the encrypted service data corresponding to the association relationship are consistent, the encrypted service data is determined to be real data, and the server outputs a cross validation result that the encrypted service data of the trade service are consistent in validation; and if the server judges that the encrypted service data corresponding to the association relation are not consistent, determining that the encrypted service data are non-real data, and outputting a cross verification result of inconsistent verification of the encrypted service data of the trade service by the server.
In the block chain-based on-link data verification method, encrypted service data uploaded by each participant of a trade service based on corresponding block chain link points is obtained, wherein the encrypted service data are data obtained by encrypting the service data by each participant through a homomorphic encryption algorithm, the encrypted service data carry service identification of the trade service, then association relations among the service data of the trade service corresponding to the service identification are obtained, the association relations are used as the association relations among the encrypted service data of the trade service, text recognition is further performed on the encrypted service data of the trade service, whether the encrypted service data corresponding to the association relations are consistent or not is judged, and cross verification is performed on the encrypted service data of the trade service. Therefore, the service data on the block chain are encrypted data, and the data for verification are also encrypted data, so that the safety of the data on the chain can be improved. And the server performs cross validation on the service data through the incidence relation, so that manual participation is reduced, and data processing is more intelligent.
In one embodiment, the method may further include: receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identification of the trade task; and based on the service identification, sending the authorization key to other participants of the trade service corresponding to the task identification.
As mentioned above, the association relationship refers to a relationship between purchase order data, invoice data, and waybill data uploaded by different parties in the business data of the trade business. In this embodiment, the association relationship may be established by performing association operation on each encrypted service data obtained by decrypting each encrypted service data of the trade service by an authorized party of the authorization key.
Specifically, the server determines each participant of the trade service corresponding to the service identifier according to the service identifier, and sends the authorization key of each participant to each other participant, for example, the server grants the authorization key of the logistics company for encrypting the waybill data to the seller and the buyer, sends the authorization key of the buyer for encrypting the purchase order data to the seller, and sends the authorization key of the seller for encrypting the invoice data to the buyer.
Optionally, the server may obtain the corresponding authorization key according to the key obtaining request of each participant, and send the authorization key to the corresponding authorized requesting party, or may also send the authorization key according to an authorization operation of the authorizing party of the authorization key.
Further, the authorized party of the authorization key may decrypt the encrypted business data according to the obtained authorization key, as described above, the authorization key for encrypting the waybill data is authorized to the seller and the buyer, so that the authorized party of the authorization key for encrypting the waybill data is authorized to the seller and the buyer, the authorization key for encrypting the purchase order data is authorized to the seller, the authorized party of the authorization key for encrypting the purchase order data is authorized to the seller, and similarly, the authorized party of the authorization key for encrypting the invoice data is the buyer.
Specifically, after the authorized party decrypts the encrypted service data of the trade service based on the authorization key to obtain the service data, the authorized party may perform association operation on each service data of the trade service, that is, associate the purchase order data, the invoice data, and the invoice data to obtain an association relationship between each service data of the trade service, and upload the association relationship to the block chain.
In the embodiment, the authorization keys sent by the participants of the trade service are received, and based on the service identifier of the trade task carried by the authorization keys, the authorization keys are sent to the other participants of the trade service corresponding to the task identifier, so that only the participants of the trade service can obtain the keys and decrypt the encrypted service data, and the data security is further improved.
In one embodiment, obtaining an association relationship between each service data of the trade service corresponding to the service identifier, and taking the association relationship as an association relationship between each encrypted service data of the trade service, may include: and acquiring the association relation among the same data items in each business data of the trade business, and taking the association relation as the association relation among the same data items in each encrypted business data of the trade business. The server determines whether the encrypted service data corresponding to the association relationship are consistent, which may include: and judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
The data entry refers to each piece of data in the aforementioned each service data or each encrypted service data, for example, for purchase order data, the data entry is a purchase order number, a name of a purchased article, a purchase quantity, an article model, an article size, an article unit price, purchase time, an article delivery address, and the like; for invoice data, the data items are invoice numbers, invoicing dates, article names, purchase quantities, article models, article unit prices, buyer names, buyer identification numbers, buyer addresses and the like; for waybill data, the data entries are waybill number, consignee and shipper names, addresses, associated times, item types, etc.
In this embodiment, the association relationship may be an association relationship among invoice data, purchase order data, and waybill data of the associated trade service, and an association relationship among the same invoice entry, for example, an association relationship among buyer names in the invoice data, purchase order data, and waybill data, and an association relationship among seller names in the invoice data, purchase order data, and waybill data. Specifically, the method may further include an association relationship in which a name of the goods, a specification of the goods, a unit price of the goods, a currency, a quantity of the goods, a unit, a total price of the goods, and the like are associated one by one. For example, company a placed a purchase order to company B, including the name of the item, iphone x, in a quantity of 10, and a unit price of 1 ten thousand; and then, company B issues an invoice which comprises item names iphone x, the quantity of the items is 10, and the unit price is 2 thousands, so that the purchase order and the item names, the quantity and the unit prices in the invoice can be associated to obtain the association relation between the same document items, and the association relation is uploaded to the block chain.
Further, the server may use an association relationship between the same data entry in each service data of the trade service acquired from the blockchain as an association relationship between the same data entry in each encrypted service data of the trade service.
Further, the server can perform text recognition on each encrypted service data, acquire the same data entry in each encrypted service data based on the incidence relation of the same data entry in each service receipt, and determine whether the data entries are consistent. For example, by using the previous example, regarding the "item name" in the purchase order and the invoice associated with the association relationship, the "iphone x" in both the purchase order and the invoice is encrypted in a homomorphic manner, and then the ciphertext is consistent, so that the determination result of the "item name" data entry is consistent; however, since the "unit price" in the purchase order and the invoice associated with the association relationship is "1 ten thousand" in the purchase order and "2 ten thousand" in the invoice, and the ciphertext thereof is inconsistent, the determination result of the "unit price" data entry is inconsistent.
Optionally, the server may select the same data entry corresponding to each association from the encrypted service data to serve as one data set, and then the server determines the same data entry in each data set to determine whether the data entries are consistent, so as to obtain a determination result of each same data entry.
Alternatively, the server may perform determination on a plurality of identical data entries in each encrypted service data of the trade service in a certain logical order or in a parallel manner, and obtain a determination result of each data entry.
In this embodiment, if the determination results of all the data entries in each encrypted service data of the trade service are consistent, a determination result that the service data is real service data is obtained, and if the determination result of at least one data entry is inconsistent, a determination result that the service data is non-real service data is obtained.
In the embodiment, the incidence relation between the same data items in the encrypted business data of the trade business is obtained by obtaining the incidence relation between the same data items in the business data of the trade business, so that when judging whether the encrypted business data are consistent or not, each data item can be judged, a more accurate judgment result can be obtained, and the accuracy of data verification is improved.
In one embodiment, the method may further include: receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of a trade service for auditing treatment; and acquiring encrypted service data corresponding to the financing request, a verification result of cross validation of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of cross validation of the encrypted service data and the authorization key of the encrypted service data to the financing terminal, so that the financing terminal can audit the financing request and receive an audit processing result fed back to the block chain by the financing terminal.
The financing application party is an application party requesting financing, and the financing application party can apply financing according to the business data of the trade business, namely, the financing application party can be a buyer or a seller in the trade transaction.
The financing request carries a service identifier of the trade service for auditing the financing request, and the financing request can include but is not limited to information of an applicant, information of a designated financial institution, an application reason, a financing amount, detailed financing usage, collateral and the like.
Specifically, the financing applicant may initiate financing application to one or more financial institutions based on the business data of one trade service, which may be simultaneous application or sequential application, and is not limited to this.
The server acquires corresponding encrypted service data, a cross validation result of the encrypted service data and an authorization key of the encrypted service data on the block chain according to a financing request of a financing application party and based on a service identifier of a trade service carried by the financing request, and sends the acquired encrypted service data, the cross validation result of the encrypted service data and the authorization key of the encrypted service data to the financing terminal.
Further, the financing terminal decrypts the encrypted service data according to the financing request and an authorization key sent by the server, and performs auditing processing on whether financing is performed or not based on the service data obtained after decryption and a verification result of cross verification performed by the server to determine whether financing is performed or not, for example, the verification result is failed, and the financing organization can determine whether the financing application fails or not due to counterfeiting or input error and the like according to the decrypted service data and then determine whether financing is performed or not; if the verification result is passed, the financing can be directly agreed.
In this embodiment, the auditing processing result of auditing processing performed on the financing application by the financing organization can be uploaded to the block chain through the financing terminal, and then notified to the financing application party. The financing applicant can determine whether the financing application passes through the auditing processing result uploaded by the financing organization, and carry out subsequent processing work.
In the above embodiment, by receiving the financing request of the financing application party, acquiring the corresponding data based on the service identifier carried in the financing request, sending the data to the financing terminal, and receiving the auditing processing result of the financing terminal, all data of the financing application can be uploaded to the block chain, thereby ensuring the integrity of the data on the chain and providing a reference basis for the subsequent financing application.
In one embodiment, the method may further include: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and inquiring the historical financing request and the auditing processing result corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
The financing history result obtaining request may be a request for obtaining a financing history result of a financing applicant, and the financing history result obtaining request carries a user identifier of the financing applicant. The applicant identification may be the enterprise name, enterprise code, etc. of the financing applicant as described above.
Specifically, the server may query, according to the applicant identifier, the historical financing request of the financing applicant corresponding to the applicant identifier and the result of the auditing process thereof from the block chain, for example, the specific historical financing application amount, the application time of each historical financing application, whether each application passes or fails, and the reason of failing to pass, such as invoice counterfeiting, data falseness, and the like.
Further, the financing terminal can take the historical financing request and the auditing processing result of the financing applicant as reference, and audit and judge the financing request of the financing applicant, and obtain the auditing processing result corresponding to the financing application.
In the above embodiment, the historical financing request and the auditing processing result corresponding to the user identifier on the block chain are queried and sent to the financing terminal, so that the financing terminal can determine whether to give the financing application of the financing applicant with reference to the historical data, and further reduce the financing risk of the financing organization.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least a portion of the steps in fig. 2 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 3, there is provided an on-chain data verification apparatus based on a blockchain, including: the system comprises an encrypted service data acquisition module 100, an association relation acquisition module 200 and a cross validation module 300, wherein:
the encrypted service data obtaining module 100 is configured to obtain encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, where the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service.
And the association relationship obtaining module 200 is configured to obtain an association relationship between each service data of the trade service corresponding to the service identifier, and use the association relationship as an association relationship between each encrypted service data of the trade service.
The cross validation module 300 is configured to perform text recognition on each encrypted service data of the trade service, and determine whether the encrypted service data corresponding to the association relationship are consistent, so as to perform cross validation on each encrypted service data and output a cross validation result.
In one embodiment, the apparatus may further include:
and the authorization key receiving module is used for receiving authorization keys respectively sent by all participants of the trade service, and the authorization keys carry service identifiers of the trade tasks.
And the authorization key sending module is used for sending the authorization key to other participants of the trade service corresponding to the task identifier based on the service identifier.
The association relationship is established by performing association operation on each encrypted service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the association relationship obtaining module 200 may be configured to obtain an association relationship between the same data entries in each piece of business data of the trade business, and use the association relationship as an association relationship between the same data entries in each piece of encrypted business data of the trade business;
the cross validation module 300 is configured to determine whether the same data entry in each encrypted service data corresponding to the association relationship is consistent.
In one embodiment, the apparatus may further include:
and the financing request receiving module is used for receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of the trade service for auditing processing.
And the result receiving module is used for acquiring the encrypted service data corresponding to the financing request, the verification result of the cross verification of the encrypted service data and the authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of the cross verification of the encrypted service data and the authorization key of the encrypted service data to the financing terminal, so that the financing terminal can audit the financing request and receive the audit processing result fed back to the block chain by the financing terminal.
In one embodiment, the apparatus may further include:
and the financing history result acquisition request receiving module is used for receiving a financing history result acquisition request, and the financing history result acquisition request carries the user identification of the financing applicant.
And the query module is used for querying the historical financing request and the auditing processing result of the historical financing request corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
For specific definition of the block chain based on-chain data verification apparatus, reference may be made to the above definition of the block chain based on-chain data verification method, and details are not described here. The modules in the block chain based on-chain data verification device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing encrypted service data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a block chain based on-chain data verification method.
Those skilled in the art will appreciate that the architecture shown in fig. 4 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory storing a computer program and a processor, the processor when executing the computer program implementing the steps of: acquiring encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service; acquiring an incidence relation between each service data of the trade service corresponding to the service identification, and taking the incidence relation as the incidence relation between each encrypted service data of the trade service; and performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
In one embodiment, before the processor executes the computer program to obtain the association relationship between the business data of the trade business corresponding to the business identifier, the following steps may be further implemented: receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identification of the trade task; based on the service identification, the authorization key is sent to other participants of the trade service corresponding to the task identification; the association relationship is established by performing association operation on each encrypted service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, when the processor executes the computer program, acquiring an association relationship between each piece of service data of the trade service corresponding to the service identifier, and taking the association relationship as an association relationship between each piece of encrypted service data of the trade service may include: and acquiring the association relation among the same data items in each business data of the trade business, and taking the association relation as the association relation among the same data items in each encrypted business data of the trade business. When the processor executes the computer program, determining whether the encrypted service data corresponding to the association relationship are consistent may include: and judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
In one embodiment, after the processor executes the computer program to perform cross validation on each encrypted service data and output a cross validation result, the following steps may be further implemented: receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of a trade service for auditing treatment; and acquiring encrypted service data corresponding to the financing request, a verification result of cross validation of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of cross validation of the encrypted service data and the authorization key of the encrypted service data to the financing terminal, so that the financing terminal can audit the financing request and receive an audit processing result fed back to the block chain by the financing terminal.
In one embodiment, after the processor executes the computer program to receive the financing request of the financing applicant, the following steps are also implemented: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and inquiring the historical financing request and the auditing processing result corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
In one embodiment, a computer-readable storage medium is provided, on which a computer program is stored, which when executed by a processor may carry out the steps of: acquiring encrypted service data uploaded by each participant of the trade service based on the corresponding block link point, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service; acquiring an incidence relation between each service data of the trade service corresponding to the service identification, and taking the incidence relation as the incidence relation between each encrypted service data of the trade service; and performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
In one embodiment, before the computer program is executed by the processor to obtain the association relationship between the business data of the trade business corresponding to the business identifier, the following steps may be further implemented: receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identification of the trade task; based on the service identification, the authorization key is sent to other participants of the trade service corresponding to the task identification; the association relationship is established by performing association operation on each encrypted service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, when executed by the processor, the computer program implements obtaining an association relationship between the service data of the trade service corresponding to the service identifier, and taking the association relationship as an association relationship between the encrypted service data of the trade service, which may include: and acquiring the association relation among the same data items in each business data of the trade business, and taking the association relation as the association relation among the same data items in each encrypted business data of the trade business. When executed by the processor, the computer program may determine whether encrypted service data corresponding to the association relationship is consistent, and may include: and judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
In one embodiment, after the computer program is executed by the processor to perform cross validation on each encrypted service data and output a cross validation result, the following steps may be further performed: receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of a trade service for auditing treatment; and acquiring encrypted service data corresponding to the financing request, a verification result of cross validation of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of cross validation of the encrypted service data and the authorization key of the encrypted service data to the financing terminal, so that the financing terminal can audit the financing request and receive an audit processing result fed back to the block chain by the financing terminal.
In one embodiment, the computer program when executed by the processor, after receiving a financing request from a financing applicant, further implements the steps of: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and inquiring the historical financing request and the auditing processing result corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), Synchronous Link DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A block chain based on-chain data validation method, the method comprising:
acquiring encrypted service data uploaded by each participant of a trade service based on corresponding block link points, wherein the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service;
acquiring an association relation between each service data of the trade service corresponding to the service identification, and taking the association relation as an association relation between each encrypted service data of the trade service;
and performing text recognition on each encrypted service data of the trade service, and judging whether the encrypted service data corresponding to the association relation are consistent or not so as to perform cross validation on each encrypted service data and output a cross validation result.
2. The method according to claim 1, wherein before the obtaining the association relationship between the business data of the trade business corresponding to the business identifier, the method further comprises:
receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identifiers of the trade tasks;
based on the service identification, the authorization key is sent to other participants of the trade service corresponding to the task identification;
and the association relationship is established by performing association operation on each decrypted business data after each encrypted business data of the trade business is decrypted by an authorized party of the authorization key.
3. The method according to claim 1, wherein the obtaining of the association relationship between the service data of the trade service corresponding to the service identifier and taking the association relationship as the association relationship between the encrypted service data of the trade service comprises:
acquiring an association relation between the same data items in each business data of the trade business, and taking the association relation as the association relation between the same data items in each encrypted business data of the trade business;
the determining whether the encrypted service data corresponding to the association relationship are consistent includes:
and judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
4. The method of claim 1, wherein after performing cross-validation on each encrypted service data and outputting a cross-validation result, the method further comprises:
receiving a financing request of a financing applicant, wherein the financing request carries a service identifier of a trade service for auditing treatment;
acquiring encrypted service data corresponding to the financing request, a verification result of cross validation of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of cross validation of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal can audit the financing request and receive an audit processing result fed back to a block chain by the financing terminal.
5. The method of claim 4, wherein after receiving a financing request from a financing applicant, further comprising:
receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of the financing applicant;
and inquiring a historical financing request and an audit processing result thereof corresponding to the user identifier on the block chain according to the user identifier, and sending the historical financing request and the audit processing result to the financing terminal.
6. An apparatus for block chain based on-chain data verification, the apparatus comprising:
the system comprises an encrypted service data acquisition module, a block link point acquisition module and a block link point acquisition module, wherein the encrypted service data acquisition module is used for acquiring encrypted service data uploaded by each participant of a trade service based on the corresponding block link point, the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service;
the incidence relation acquisition module is used for acquiring the incidence relation among the business data of the trade business corresponding to the business identification and taking the incidence relation as the incidence relation among the encrypted business data of the trade business;
and the cross validation module is used for performing text recognition on each encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation are consistent or not, performing cross validation on each encrypted service data and outputting a cross validation result.
7. The apparatus of claim 6, further comprising:
the authorization key receiving module is used for receiving authorization keys sent by all participants of the trade service respectively, wherein the authorization keys carry service identifiers of the trade tasks;
the authorization key sending module is used for sending the authorization key to other participants of the trade service corresponding to the task identifier based on the service identifier;
and the association relationship is established by performing association operation on each decrypted business data after each encrypted business data of the trade business is decrypted by an authorized party of the authorization key.
8. The apparatus according to claim 6, wherein the association obtaining module is configured to obtain an association relationship between the same data entries in each encrypted service data of the trade service, and use the association relationship as an association relationship between the same data entries in each encrypted service data of the trade service;
and the cross validation module is used for judging whether the same data entry in each encrypted service data corresponding to the association relation is consistent.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 5 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 5.
CN202010269637.6A 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium Active CN111597562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010269637.6A CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010269637.6A CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111597562A true CN111597562A (en) 2020-08-28
CN111597562B CN111597562B (en) 2023-06-23

Family

ID=72183514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010269637.6A Active CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111597562B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016924A (en) * 2020-10-21 2020-12-01 支付宝(杭州)信息技术有限公司 Data evidence storage method, device and equipment based on block chain
CN113034265A (en) * 2020-11-24 2021-06-25 腾讯科技(深圳)有限公司 Data verification method and device, computer equipment and computer readable storage medium
CN113051597A (en) * 2021-04-21 2021-06-29 深圳壹账通智能科技有限公司 Method and device for generating combined shipping bill, electronic equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657843A (en) * 2015-03-06 2015-05-27 上海玖纳信息科技有限公司 Cross-border on-line automatic customs clearance and reconciliation method and system
CN108428106A (en) * 2018-02-05 2018-08-21 深圳市资本在线金融信息服务有限公司 A kind of intelligent application method, system and terminal device of financing
CN109544160A (en) * 2018-11-20 2019-03-29 杭州呯嘭智能技术有限公司 A kind of transaction authenticity verification methods and system based on block chain and intelligent contract

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657843A (en) * 2015-03-06 2015-05-27 上海玖纳信息科技有限公司 Cross-border on-line automatic customs clearance and reconciliation method and system
CN108428106A (en) * 2018-02-05 2018-08-21 深圳市资本在线金融信息服务有限公司 A kind of intelligent application method, system and terminal device of financing
CN109544160A (en) * 2018-11-20 2019-03-29 杭州呯嘭智能技术有限公司 A kind of transaction authenticity verification methods and system based on block chain and intelligent contract

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016924A (en) * 2020-10-21 2020-12-01 支付宝(杭州)信息技术有限公司 Data evidence storage method, device and equipment based on block chain
CN113034265A (en) * 2020-11-24 2021-06-25 腾讯科技(深圳)有限公司 Data verification method and device, computer equipment and computer readable storage medium
WO2022111196A1 (en) * 2020-11-24 2022-06-02 腾讯科技(深圳)有限公司 Data verification method and apparatus, computer device, and computer readable storage medium
CN113034265B (en) * 2020-11-24 2024-05-07 腾讯科技(深圳)有限公司 Data verification method, device, computer equipment and computer readable storage medium
CN113051597A (en) * 2021-04-21 2021-06-29 深圳壹账通智能科技有限公司 Method and device for generating combined shipping bill, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111597562B (en) 2023-06-23

Similar Documents

Publication Publication Date Title
CN111159779B (en) Customs clearance data processing method and device, computer equipment and storage medium
US11392880B2 (en) Split shipment processing
US11727397B2 (en) Systems and methods for domain restriction with remote authentication
CN110599137B (en) Electronic bill data processing method and device and computer equipment
CN109034924B (en) Electronic bill generating method, electronic bill generating device, storage medium and computer equipment
US20220150236A1 (en) Browser integration with cryptogram
TWI716056B (en) Identity authentication, number storage and sending, and number binding method, device and equipment
CN111597562B (en) Block chain-based on-chain data verification method, device, equipment and storage medium
JP5766199B2 (en) Secure mobile payment processing
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
CN112383611B (en) File evidence storing method and system based on block chain and server
US10460367B2 (en) System for user authentication based on linking a randomly generated number to the user and a physical item
CN111815308A (en) Trade data processing method based on block chain and related equipment thereof
CN112513904B (en) Digital asset transaction control method, device, terminal equipment and storage medium
CN114761952A (en) Techniques to provide secure federated machine learning
US20220108322A1 (en) Systems and methods for use in biometric-enabled network interactions
CN110599322B (en) Data auditing method and device based on blockchain network
CN110070365B (en) Commodity evidence storing method and device based on block chain and electronic equipment
KR102056612B1 (en) Method for Generating Temporary Anonymous Certificate
US20220376914A1 (en) Token management system and method
CN113191754A (en) Game equipment transaction method, device, equipment and system based on block chain
CN112669035A (en) Block chain based bulk commodity spot transaction system and method
CN117252702B (en) Block chain-based data asset transaction method and system
AU2018282255A1 (en) System and method for secure transmission of data and data authentication
CN111861476B (en) Malicious associated transaction monitoring method and device based on blockchain and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant