CN111898148A - Information supervision method and device based on block chain - Google Patents

Information supervision method and device based on block chain Download PDF

Info

Publication number
CN111898148A
CN111898148A CN202010754149.4A CN202010754149A CN111898148A CN 111898148 A CN111898148 A CN 111898148A CN 202010754149 A CN202010754149 A CN 202010754149A CN 111898148 A CN111898148 A CN 111898148A
Authority
CN
China
Prior art keywords
information
supervision
risk
information record
governance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010754149.4A
Other languages
Chinese (zh)
Other versions
CN111898148B (en
Inventor
于君泽
周扬
唐强
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Advanced New Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Advanced New Technologies Co Ltd filed Critical Advanced New Technologies Co Ltd
Priority to CN202010754149.4A priority Critical patent/CN111898148B/en
Publication of CN111898148A publication Critical patent/CN111898148A/en
Application granted granted Critical
Publication of CN111898148B publication Critical patent/CN111898148B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The present specification provides an information monitoring method and apparatus, which is used for an information monitor to monitor information provided by an information provider, and the information monitor and the information provider are set as nodes of a block chain; the information supervisor acquires the encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key associated with a public key of the information administrator; decrypting the encrypted information record by using a secret key related to a private key of the information monitoring party to obtain an original information record; performing a risk supervision process on the raw information record based on preconfigured supervision rules.

Description

Information supervision method and device based on block chain
Technical Field
The present disclosure relates to the field of data processing technologies, and in particular, to an information monitoring method and apparatus based on a block chain.
Background
The existing information supervision usually adopts an offline on-site supervision mode, and a supervision organization conducts active point burying or dark visiting according to complaint clues and public sentiments and refers to supervision regulations to check the service compliance condition of the supervised organization. The problem of on-site inspection is that it is relatively costly, and it is necessary for the supervised entity to centrally work for a while, and it is not excluded that the supervised entity assaults to prepare for the supervision, which also increases the cost of the supervised entity.
With the development of diversified services, mastering the situation of a supervised organization at any time and any place becomes the rigid service requirement of the supervising organization. Therefore, it is urgently needed to construct a set of basic supervision method and facilities, which are convenient for the supervised entity to join in dynamically at low cost, and meanwhile, the supervision entity can remotely master the compliance condition of the supervised entity under the corresponding regulations without going to the site.
Disclosure of Invention
In view of the above-mentioned current situation of information supervision, the present specification provides an information supervision method based on a blockchain, where the blockchain includes at least one information supervisor node and several information provider nodes, and the supervision method includes:
the information supervisor acquires the encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key associated with a public key of the information administrator;
decrypting the encrypted information record by using a secret key related to a private key of the information monitoring party to obtain an original information record;
performing a risk supervision process on the raw information record based on preconfigured supervision rules.
Preferably, the executing risk supervision process on the original information record based on the preconfigured supervision rules comprises:
and calling a risk supervision intelligent contract issued on the blockchain, executing an executive program corresponding to a supervision rule stated in the intelligent contract, and executing risk supervision processing on the original information record.
Preferably, the intelligent contract is issued to the blockchain by the information manager.
Preferably, the block chain is a federation chain.
Preferably, the encrypting information record is encrypted based on a secret key associated with a public key of the information administrator, and includes:
encrypting the original information record based on a secret key related to a public key of the information monitoring party to obtain an encrypted information record, and then digitally signing the encrypted information record to obtain first signature information;
the decrypting the encrypted information record using the key associated with the private key of the information administrator to obtain the original information record includes:
and the information supervisor checks the first signature information, and decrypts the encrypted information record by using a secret key related to a private key of the information supervisor after the first signature information passes the checking to obtain the original information record.
Preferably, the key related to the public key of the information administrator is: the public key of the information supervisor, the secret key related to the private key of the information supervisor is: the private key of the information administrator.
Preferably, the key related to the public key of the information administrator is: the product of the public key of the information supervisor and the private key of the information provider, and the key related to the private key of the information supervisor is: the product of the private key of the information administrator and the public key of the information provider.
Preferably, the executing risk supervision process on the original information record based on the preconfigured supervision rules comprises:
and identifying the supervision factor in the original information record, comparing the value of the supervision factor with a preset supervision threshold value, and executing risk supervision processing according to the comparison result.
Preferably, the supervision indexes preset by the information supervisor comprise executable SQL statements generated by the conversion of the supervision rules and corresponding supervision thresholds;
identifying a supervision factor in the original information record, and comparing the value of the supervision factor with a threshold value of a preset supervision threshold value, including
Identifying a regulatory factor in the original information record,
inputting a supervision factor in an executable SQL statement of the supervision index for query,
and comparing the value of the supervision factor obtained by query with the supervision threshold value of the supervision index.
Preferably, the information monitoring party is also configured with a monitoring index pool;
the method further comprises the following steps:
converting the supervision rules into executable SQL statements;
and generating a supervision index name, establishing a mapping relation between the supervision index name and the SQL statement, and storing the mapping relation into a supervision index pool.
Preferably, the supervision indexes in the supervision index pool are multi-branch tree storage structures, and the supervision indexes are nodes on the multi-branch tree.
Preferably, the supervision indexes are also associated with corresponding supervision processing schemes;
the performing of risk supervision processing according to the comparison result includes,
determining whether the value of the supervision factor reaches a supervision threshold in the supervision index:
if not, no response is made;
and if so, executing the supervision processing scheme associated with the supervision index.
The present specification also provides an information monitoring apparatus based on a blockchain, where the blockchain includes at least one information monitor node and a plurality of information provider nodes, and the information monitoring apparatus includes:
the information acquisition unit is used for the information supervisor to acquire the encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key associated with a public key of the information administrator;
the information decryption unit is used for decrypting the encrypted information record by using a secret key related to a private key of the information supervisor to obtain an original information record;
and the risk supervision processing unit is used for executing risk supervision processing on the original information record based on a pre-configured supervision rule.
The present specification also provides a computer device comprising: a memory and a processor; the memory having stored thereon a computer program executable by the processor; and when the processor runs the computer program, executing the steps of the implementation method of the information supervision service.
The present specification also provides a computer-readable storage medium, on which a computer program is stored, which, when executed by a processor, performs the steps of the method for implementing the information monitoring service.
According to the technical scheme, the information supervision method and the information supervision device provided by the specification have the advantages that the information supervisor and the information provider are both set as the nodes of the block chain, an online channel is provided for the information provider to dynamically and low-cost add the block chain to receive supervision and the information supervisor to acquire supervision information from the block chain in real time, and therefore the cost paid by the two parties in online investigation supervision is saved; moreover, the information provider encrypts and distributes the information to the blockchain, and other arbitrary nodes in the blockchain cannot decrypt the information correctly, so that the safety of providing the information by each information provider is ensured; furthermore, the block chain structure ensures that the information provided by each information provider in real time cannot be tampered after being provided, so that the real effectiveness of information supervision is ensured; preferably, the information monitoring party digitalizes the monitoring requirement into a monitoring index, and adopts a mode of comparing corresponding values of the monitoring index and the monitoring factor, so that the information providing party can be digitally monitored in real time, a risk monitoring processing scheme is timely output, and the timeliness of monitoring behaviors is ensured; moreover, the information supervision method and device based on the block chain can simultaneously supervise multiple nodes and multiple mechanisms in real time, and can effectively prevent the phenomenon of violation of mechanisms and regions.
Drawings
Fig. 1 is a flowchart of a block chain-based information policing method according to an embodiment provided in the present specification;
FIG. 2 is a simplified schematic diagram of a consensus-achieving consistency process for the PBFT algorithm;
FIG. 3 is a flow chart illustrating information encryption and information decryption according to an embodiment provided herein;
fig. 4 is a flowchart illustrating an information encryption and an information decryption using ECDH according to another embodiment provided in the present specification;
FIG. 5 is a schematic diagram of a regulatory risk engine established by a financial regulatory agency in accordance with an embodiment of the present disclosure;
FIG. 6 is a schematic diagram illustrating a financial regulatory body generating an executable SQL statement according to regulatory requirements in an embodiment of the present specification;
FIG. 7 is a flow chart illustrating risk supervision by a financial regulatory agency for a user borrowing behavior according to an embodiment of the present disclosure;
FIG. 8 is a schematic diagram of an information monitoring apparatus according to an embodiment provided herein;
fig. 9 is a hardware structure diagram for operating an embodiment of the distributed information monitoring apparatus provided in the present specification.
Detailed Description
As shown in fig. 1, an embodiment provided in this specification illustrates a blockchain-based information supervision method for a blockchain, where the blockchain includes at least one information supervisor node and several information provider nodes, the supervision method includes:
102, the information supervisor acquires an encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key associated with a public key of the information administrator;
104, decrypting the encrypted information record by using a secret key related to a private key of the information supervisor to obtain an original information record;
and 106, executing risk supervision processing on the original information record based on a pre-configured supervision rule.
The "information providing party" provided in the embodiments of the present specification may specifically be a terminal of a monitored party in information monitoring, or may be another server or terminal in data connection with the monitored party, and the "information" provided by the "information providing party" is object information data to be monitored, such as loan data, transaction data, and the like. In the embodiments described in the present specification, an arbitrary information administrator and information provider can join the blockchain as a node of the blockchain by following the installation of a program that runs a node protocol according to a corresponding node protocol. Therefore, compared with the method that the supervising agency checks the service status of the supervised agency one by one offline, the method that the blockchain is added online to become the node of the block chain to participate in supervision or to be managed provided by the embodiment of the specification has more excellent convenience and economy, and can be added or withdrawn at any time.
The embodiments provided in this specification may be implemented in any device with computing and storage capabilities, such as a mobile phone, a tablet Computer, a PC (Personal Computer), a notebook, a server, and so on; the functions in the embodiments of the present specification may also be implemented by a logical node operating in two or more devices.
The "block chain" in the embodiments provided in this specification may specifically refer to a P2P network system having a distributed data storage structure, where each node achieves data sharing through a consensus mechanism, and data in the block chain is distributed in temporally consecutive blocks (blocks), and a subsequent block contains a data summary of a previous block, and a full backup of data of all or part of the nodes is achieved according to a difference of the particular consensus mechanism (e.g., POW, POS, DPOS, PBFT, etc.). It is well known to those skilled in the art that, since the blockchain system operates under a corresponding consensus mechanism, data that has been included in the blockchain database is difficult to be tampered with by any node, for example, a blockchain with Pow consensus is adopted, and it is possible to tamper with existing data only by an attack that requires at least 51% of effort on the whole network, so that the blockchain system has the characteristics of guaranteeing data security and anti-attack tampering that are compared with other centralized database systems. It can be seen that in the embodiments provided in the present specification, the "information" included in the blockchain provided by the information provider is not attacked or tampered, so as to ensure the authenticity and fairness of the supervision.
In order to further ensure the privacy of supervision, in the embodiments provided in the present specification, information provided by an information provider is encrypted with a key associated with a public key of the information supervisor; the encrypted information can only be decrypted by a key related to a private key of the information monitoring party to obtain the original information record, so that other nodes which are located in the same blockchain in a shared mode are prevented from acquiring the plaintext of the information (namely the original information record). There are many encryption methods that the corresponding information monitor can decrypt, such as ECDSA and RSA, and the encryption method can be specifically set according to the requirement in the embodiment provided in this specification.
In the information supervision method based on the block chain provided in the embodiment of the present specification, an information supervisor executes risk supervision processing on the original information record based on a preconfigured supervision rule, and there are many specific risk supervision processing schemes, for example, the supervision rule is digitized into a corresponding supervision index, a threshold of the supervision index is compared with a value of a supervision factor in the original information record acquired from a block chain network, and a supervision result is directly and effectively output according to whether violation occurs or not and the degree of violation; or identifying the violation factor from the original information record acquired from the block chain network, and executing preset risk supervision processing, such as early warning, alarming, blocking execution and the like, once the violation factor is identified. The scheme for executing the risk supervision processing on the original information record based on the preconfigured supervision rule is specifically set according to specific supervision requirements, and is not limited in the specification, so that the integrated digital supervision method from the collection of supervision information to the processing of the supervised behavior is finally completed, and the convenience, economy, authenticity and high efficiency of the supervision behavior are improved.
The following describes a specific embodiment provided by the present specification, taking the financial regulatory agency as an example to supervise the borrowing situation of the same borrower in the same network lending institution and different network lending institutions.
In this embodiment, the financial regulatory agency is an information administrator, each network lending agency is a different information provider, and the natural borrower user is the subject of the administration. To reduce transaction or data validation time, improve transaction throughput, and meet security and performance requirements, financial institutions often choose a federation chain architecture to construct the blockchain. Higher credit facilities such as large banks, large enterprises, and some regulatory agencies may participate in block accounting as preselected nodes in the federation chain. The consensus process of the federation chain is also controlled by the preselected node, and when more than a predetermined percentage (e.g., 2/3) of nodes on the network identify a block, the transaction or data recorded for that block will be identified globally. The alliance chain can determine the degree of openness to the public according to application scenarios, and gives an authority to access the alliance chain to an openable organization, for example, in this embodiment, a financial regulatory organization as an information administrator can participate in accounting for a preselected node, and each information provider such as a network credit organization can be a general node with the authority to access the alliance chain; of course, the financial regulatory agency may also be a general node having an access alliance chain authority, and is not limited in this specification.
The federation chain usually adopts rights and interests certification or consensus algorithms such as PBFT and RAFT. FIG. 2 illustrates the consensus process for achieving consensus for a simplified PBFT algorithm, where C is client and N is client0-N3Representing service nodes, in particular, N0Is a master node, N3Is a failed node. PBFT systems typically assume a number of m failed nodes and a number of 3m +1 total service nodes. Briefly, the whole communication process is as follows:
1) the client sends a request to the host node to call service operation;
2) after the main node receives the request, starting a three-stage protocol to broadcast the request to each slave node;
[2.1] sequence number allocation phase (also called PRE-prefix phase), the master node assigns a sequence number n to the request, broadcasts a sequence number allocation message and a request message m of the client, and constructs a PRE-PREPARE message to each slave node;
[2.2] an interaction phase (also called prefix phase) for receiving a PRE-PREPARE message from a node and broadcasting the PRE-PREPARE message to other server nodes;
[2.3] sequence number confirmation phase (also called COMMIT phase), after each node verifies the request and sequence in the view, the node broadcasts a COMMIT message, executes the received request of the client and gives the client a response.
3) The client side waits for responses from different nodes, and if m +1 responses are the same, the responses are the consensus result.
As with all state machine replica replication techniques, PBFT imposes two constraints on each replica node:
1) all nodes must be deterministic. That is, given that the states and parameters are the same, the results of the operation execution must be the same;
2) all nodes must start executing from the same state.
Under the two limiting conditions, even if the failed replica node exists, the PBFT algorithm agrees on the total sequence of the request execution of all the non-failed replica nodes, so that the safety is ensured.
A batch of records generates a block according to the consensus communication process shown in fig. 2, and finally forms a chain. The PBFT algorithm is a preferred embodiment provided in this specification because the algorithm is well-known and efficient, and can meet the requirement of high frequency transaction amount, such as frequent loan transaction in this embodiment; the consensus time delay is very low, the requirement of real-time processing is basically met, and the monitoring result can be rapidly output to the monitoring information in real time; the credible node is used as a preselected accounting node, and safety and stability are considered; in addition, the PBFT algorithm does not consume excessive computer power resources, does not need token circulation, and has good usability.
Preferably, in the embodiments provided in the present specification, each network lending institution serves as an information provider, and the information related to personal lending provided by each network lending institution generally relates to privacy information such as identity, and as shown in table 1, in order to ensure that the information related to the privacy of the self institution or lender is only known in the clear text by the corresponding financial regulatory authority with regulatory authority and is not known or illegally used by other nodes in the same block chain, each network lending institution shall process the regulatory information provided by each network lending institution in an encrypted manner. The specific encryption mode is various, for example, a network lending institution can agree with a financial regulatory agency in advance to encrypt and decrypt the symmetric key; the network credit institution may also use the key associated with the financial regulatory authority's public key for asymmetric encryption, and the financial regulatory authority may use the key associated with its private key for decryption to obtain the plaintext (as shown in table 1) of the credit information provided by the network credit institution, thereby preventing other nodes from learning the regulatory information.
Figure BDA0002610982490000091
Table 1 information form for lending from person C to person B occurring on the network lending institution a platform
For example, as shown in fig. 3, a network lending institution serving as an information provider first encrypts a plaintext (shown in table 1) of lending information provided by the network lending institution by using a public key of a corresponding financial regulatory authority to obtain a ciphertext of the lending information, and then, to ensure that the ciphertext is not tampered and forged, the network lending institution digitally signs the ciphertext and uploads the digital signature of the ciphertext and the ciphertext to a block chain database cache in which a network lending institution node is located; an bookkeeper of the block chain, such as a preselected node with a bookkeeping authority in the federation chain, needs to verify the data record which can be recorded into the block chain, the verification process necessarily includes a signature verification of the digital signature, the signature verification process is to prevent the data from being tampered or the information from being forged by other participants, and the signature verification process includes the digital signature and the ciphertext of the ciphertext into the block of the block chain by a post-bookkeeper.
After the digital signature and the ciphertext of the pair of ciphertext are recorded into the blockchain by the preselected node in the alliance chain, the financial regulatory agency can obtain the digital signature and the ciphertext of the pair of ciphertext from the blockchain as the node of the blockchain, and accordingly, the financial regulatory agency can decrypt the ciphertext by using the private key corresponding to the public key so as to obtain the plaintext of the specific loan information. In this embodiment, the financial monitoring authority as the information monitoring party may be a preselected node having an accounting right, or may be a common node, which is not specifically limited in this specification as long as it has an access viewing right to the above digital signature and the ciphertext of the ciphertext.
The embodiment of the present specification does not specifically limit the algorithms related to the digital signature and signature verification algorithm and the public key-private key pair of the financial regulatory institution itself, and may be implemented by using an elliptic curve algorithm, an RSA algorithm, and the like, and the related hash algorithm may be implemented by using MD5, SHA256, and the like.
The process of encrypting the loan information to obtain the ciphertext may be implemented by using a symmetric key agreed by both parties. For example, as shown in fig. 4, the network lending institution serving as the information provider may encrypt the plaintext of lending information by using ECDH to exchange a key. It will be appreciated by those skilled in the art that in a blockchain system that uses the same elliptic curve algorithm (i.e., using the same straight line or base point) to obtain public-private key pairs associated with identities of organizations, the product of private key AS of organization a and public key BP of organization B is equal to the product of public key AP of organization a and private key BS of organization B.
Namely: AS · BP ═ AP · BS,
in the examples described in this specification: public key JP of financial supervision institution, private key DS of network credit institution being private key JS of financial supervision institution, public key DP of network credit institution
Therefore, the network lending institution may encrypt the plaintext of the lending information by using a key obtained by multiplying the public key JP of the corresponding financial monitoring institution by the private key DS of the network lending institution to obtain a ciphertext of the lending information, and similarly, in order to ensure that the ciphertext is not falsified or forged, the network lending institution performs digital signature on the ciphertext, and uploads the digital signature and the ciphertext of the ciphertext, the public key DP corresponding to the private key DS of the network lending institution used for encrypting the lending information, and the public key JP of the financial monitoring institution to the block chain database cache where the network lending institution node is located; and an bookkeeper of the block chain, such as a preselected node with a bookkeeping authority in the alliance chain, firstly checks the digital signature, wherein the checking process is to prevent data from being tampered or the information from being forged by other participants, and the bookkeeper records the digital signature and the ciphertext of the ciphertext pair, the public key DP corresponding to the private key DS used for encrypting the loan information and the public key JP of the financial regulatory agency into the block of the block chain after the checking process.
After the digital signature of the ciphertext, the ciphertext and the public key corresponding to the private key of the financial monitoring authority used for encrypting the loan information are recorded into the block chain by a preselected node in a alliance chain, the financial monitoring authority may obtain the digital signature of the ciphertext and the ciphertext from the block chain, and accordingly, the financial monitoring authority may decrypt the ciphertext by using a secret key obtained by multiplying the private key JS corresponding to the public key JP obtained from the network by the DP obtained from the network, thereby obtaining the plaintext of the loan information. And other arbitrary nodes cannot decrypt the ciphertext because the private key JS of the financial supervision institution cannot be obtained.
It should be noted that, since the same organization may have multiple sets of public-private key pairs in a block chain, the public keys DP and the private keys DS of the network lending organization used for encrypting the credit information are not necessarily the same as the private keys and the public keys used in the digital signature process and the signature verification, but this does not affect the implementation of the present technical solution, but rather reduces the possibility of being attacked due to the increased complexity of the system.
Although the accounting node of the block chain already verifies the digital signature of the ciphertext when recording data, in order to further ensure the correctness of the source of the regulatory information and prevent data from being tampered or malicious nodes from forging data, in the description of the embodiments provided in this specification, after acquiring data such as the ciphertext of the loan information from the block chain, the digital signature of the loan information by the network lending institution, and the like, the financial regulatory institution may first verify the acquired digital signature again, and decrypt the ciphertext after the verification is passed, thereby further preventing other institutions or individuals from forging the loan information and enhancing the true reliability and authority of the financial regulatory behavior.
In the embodiments provided in the present specification, the financial regulatory agency as the information manager may establish a regulatory risk engine to modularly process loan information provided by each network loan agency. As shown in fig. 5, the regulatory risk engine may specifically include: a data input module M1, a regulatory index generation module M2, a risk decision module M3, a risk treatment module M4, and the like. It should be noted that the risk monitoring engine is just an example name of a program of the risk monitoring process, and there is no specific boundary between the modules of the risk monitoring engine, and the risk monitoring engine is manually divided into a plurality of modules only for convenience of explaining the functions of the risk engine.
The data input module M1 is configured to process data acquired by the financial monitoring authority from the block chain, including data such as a ciphertext of the loan information, a digital signature of the loan information by the network lending authority, and the like, decrypt the ciphertext of the loan information according to a related decryption algorithm, or decrypt the ciphertext of the loan information after passing the verification of the digital signature, and analyze data information included in a plaintext of the loan information according to a data format required by the risk decision module M3. Since the data structure carried by the existing distributed shared network system or the blockchain system is usually in a text format and has no good operability, the data input module M1 can perform data tabulation analysis on the plaintext of the decrypted loan information, and establish the important data information required by the risk decision module M3 into a table form, for example, the important data information is restored into the data table described in table 1 above and input into the risk decision module M3.
The supervision index generating module M2 is configured to generate a supervision index corresponding to the supervision behavior according to the supervision regulations or the rules. In this embodiment, in order to supervise the behavior of "the upper limit of the borrowing balance of the same borrower in the same online lending institution", a corresponding index is trained and established according to a financial law that "the upper limit of the borrowing of a single individual and a single natural person on a platform is 20 ten thousand". The training process is as follows,
1) as shown in fig. 6, by using automatic analysis techniques such as named entity recognition, syntax analysis, dependency analysis, and the like, the structural features of the principal and predicate object of the dependency analysis sentence are obtained to obtain an action tuple (single, natural person or individual, borrow, online, 20 ten thousand), and the regulatory compliance sentence is further converted into a segment of SQL sentence executable by the computer program through a predefined mapping structural relationship.
2) Generating an index Z1', associating the index with the SQL statement mapping generated in the step 1, and storing the index and the SQL statement mapping into a supervision index pool candidate;
3) checking the SQL statement manually, and storing the SQL statement formally into a supervision index pool named as a Z1 index after revising and confirming the correctness of the SQL statement; the Z1 index includes the executable SQL statement described above, and its threshold-20W.
Similarly, according to the financial regulation that the upper limit of the loan of a single individual and a single natural person on a plurality of platforms is 100 ten thousand, the Z2 index can be trained; the Z2 index includes a segment of executable SQL statements and its threshold-100W.
In the embodiments described in this specification, in order to facilitate management of multiple supervision indexes, a supervision index multi-branch tree storage structure may be established in a supervision index pool, and multiple supervision indexes, such as Z1 and Z2, are stored on nodes of the multi-branch tree, respectively. Furthermore, in order to facilitate uniform supervision on similar types of behaviors, a plurality of different types of multi-branch trees can be set in the supervision index pool, and corresponding classes of supervision indexes are correspondingly stored, for example, a storage multi-branch tree with indexes of 'natural person → loan alarm' is set in the supervision index pool, and the above Z1, Z2 and other indexes related to the loan behaviors of natural person users on the online loan platform can be stored on the storage multi-branch tree; and if the upper limit of the borrowing balance of the same legal person or other organizations on the same network loan information intermediary platform does not exceed 100 RMB and other related supervision method items, an enterprise → borrowing alarm class supervision index multi-branch tree can be set in the supervision index pool, and the supervision indexes related to the legal quota borrowing of enterprise users on the network loan platform are stored on the supervision index pool.
Moreover, in order to facilitate multi-level supervision and better achieve the supervision effect of warning in advance to prevent illegal activities, some indexes may be provided with corresponding early warning indexes (the threshold corresponding to the early warning index may be set to 95% of the threshold of the full index or other values), for example, an early warning supervision statement such as "single individual, single natural person borrows no more than 19W on one platform, and generates the early warning index Z1Y according to the above 1) -3), and Z1Y includes an executable SQL statement trained by the early warning supervision statement and a corresponding threshold 19W, and stores the executable SQL statement and the corresponding threshold 19W in the supervision index pool. Similarly, a "nature → borrowing early warning" class index storage multi-branch tree may be built in the supervision index pool, and Z1Y may be stored on the nodes of the multi-branch tree. The "natural person → early warning for borrowing" type index multi-branch tree can also store the Z2Y index related to early warning supervision of borrowing behavior of the same natural person on a plurality of network loan platforms, and the detailed description is omitted here.
So far, the supervision index generation module M2 maps and associates the supervision indexes with executable SQL statements through the above data training, auditing, index establishment or index multi-branch tree establishment processes, creates an executable supervision template for supervising the borrowing situation of the natural person user on the online lending institution, and the specific risk supervision and handling processes are performed in the risk decision module M3. It should be noted that, in this specification, for convenience of explaining the functions of the risk engine, the risk engine is divided into a plurality of modules, and there is no specific limit between the modules, for example, the supervision index pool may be attributed to the supervision generation module M2 and also to the risk decision module M3.
As shown in fig. 7, the above-mentioned supervision index pool (the supervision index data mart shown in the figure) is stored in the risk decision module M3, and several supervision indexes may be contained in the supervision index pool. After the risk decision module M3 receives a supervision instruction indicating whether a single individual and a single natural person need to give an early warning for borrowing on one platform, first, whether a corresponding supervision index Z1Y exists is searched in the supervision index pool, and if so, the risk decision module M3 enters a risk factor identification stage. The risk decision module M3 reads the data information input from the data input module M1, and identifies a supervision factor from the data information according to the supervision instruction, in this example, the supervision object is a single borrowed natural person, since the factor that can uniquely determine whether the natural person is a single person is the identity number (or other unique user ID) of the natural person, the supervision factor in this example is the identity number of the natural person, then the risk decision module M3 inputs the identity number of the user in the SQL statement corresponding to the supervision index Z1Y, runs the SQL statement to query the identity number, so as to obtain the actual loan number (balance) of the single natural person on the single platform, and compares the value of the supervision factor-the actual loan number with the threshold 19W of the index Z1Y, and the risk handling module M4 of the risk engine outputs the corresponding supervision processing scheme: when the actual number of borrowed single physical person is below 19W, the risk handling module M4 may not regard it as a risk event and does not respond; when the actual loan amount of a single natural person is higher than 19W, according to the preset risk supervision and processing logic, the risk processing module M4 may send an early warning message to the corresponding network lending platform node, such as "a large amount of borrowed money is about to reach the upper limit of the supervision limit", so as to prevent the network lending institution platform from newly paying the user beyond the balance of the payable money, and reduce the possible loss of a certain service. The specific risk treatment schemes described above may be associated with regulatory indicators to facilitate the treatment scheme output by the risk treatment module M4.
The financial supervision organization finds that the borrowing of a natural person on a single platform exceeds the early warning threshold value, can be associated in a predetermined way to further supervise the warning index: firstly, searching whether a corresponding supervision index Z1 exists in a supervision index pool, and if so, entering a risk factor identification stage by a risk decision module M3. Similarly, the risk decision module M3 reads the data information input from the data input module M1, identifies the regulatory factor, i.e., the identification number of the natural person, from the data information according to the regulatory instruction, then the risk decision module M3 inputs the identification number in the SQL statement corresponding to the indicator Z1, and runs a query, so as to obtain the actual loan number of the single natural person on the single platform, and compares the value of the regulatory factor, i.e., the actual loan number with the threshold 20W of the indicator Z1, and the risk handling module M4 of the risk engine outputs the corresponding regulatory processing scheme: when the actual number of borrowed money of a single natural person is less than 20W, the risk handling module M4 may not output; when the actual loan amount of a single natural person is higher than 20W, the risk processing module M4 may send a strong alarm message to the corresponding network loan platform node, or report to the present regulatory agency or higher regulatory department. Likewise, the specific risk treatment protocol described above may be managed with specific regulatory guidelines to facilitate the treatment protocol output of the risk treatment module M4.
Of course, according to the specific requirements of supervision, the supervision on the early warning index can be omitted and the warning index can be directly supervised, which is not limited in this specification.
When a plurality of supervision indexes in the supervision index pool are stored in a multi-branch tree form, the efficiency of traversal search is improved conveniently due to the multi-branch tree data structure, and therefore supervision efficiency can be improved when the supervision indexes are screened and whether illegal behaviors exist or not is monitored or not or similar generalized supervision instructions are faced. When the general supervision has an early warning or violation, the financial supervision institution may traverse the monitoring index multi-way tree stored in the supervision index pool, and perform a corresponding risk decision for each established monitoring index, where the specific process of the risk decision is similar to the above process for the monitoring index Z1 or the early warning monitoring index Z1Y, and is not described herein again.
It should be noted that the above-mentioned supervision processing schemes output by the risk handling module M4 for a specific supervision indicator (e.g. Z1Y or Z1) may also be associated with the node of the supervision indicator multi-way tree where the supervision indicator is located, for example, two processing schemes are associated with the node of the supervision indicator Z1Y: when the value of the supervision factor is smaller than the threshold value of the supervision index Z1Y, no response is made; and when the value of the supervision factor is greater than or equal to the threshold value of the supervision index Z1Y, sending an early warning prompt message to the corresponding network credit platform node. Thus, when the traversal supervision program for the storage multi-branch tree of the index of 'natural person → loan alarm' is operated to the supervision index Z1Y, the identity number of a specific natural person is input into an executable SQL statement of the index Z1Y and inquired in data provided by each supervised platform, an actual loan value of the natural person on each platform is obtained, and a corresponding processing scheme is output and executed from a Z1Y node according to the comparison relation of the value in a Z1Y threshold value. The technical scheme of associating the supervision processing scheme with the corresponding node of the supervision multi-branch tree facilitates risk processing procedures or risk processing engines to carry out risk processing more quickly, and therefore supervision efficiency is improved.
The financial supervision institution completes the process of extracting the supervision inquiry factor from the supervision information, comparing the value of the supervision inquiry factor with the threshold value of the supervision index and executing the risk supervision processing program according to the comparison result, particularly, by simultaneously supervising the supervision information provided on multiple platforms, the financial supervision institution not only identifies the risk of a single platform and supervises multiple network loan platforms in a penetrating and centralized manner, the time and the economic cost of offline supervision of the multiple platforms are greatly reduced, and the cross-institution and cross-region illegal behaviors can be effectively prevented.
In the embodiment provided in this specification, the execution of the risk supervision processing on the original information record based on the preconfigured supervision rules may be implemented by an information supervisor such as a centralized server of a financial supervision institution through programmed operation, or may invoke a risk supervision intelligent contract issued on the supervision block chain, execute an execution program corresponding to the supervision rules stated in the intelligent contract, and execute the risk supervision processing on the original information record. The issuing party of the intelligent contract can be the financial monitoring organization, and can also be a superior monitoring organization of the financial monitoring organization, namely the superior monitoring organization, and can issue an intelligent contract program which is universal for a plurality of subordinate monitoring organizations for the monitoring convenience, and the intelligent contract program is used by each subordinate monitoring organization. Those skilled in the art should know that, compared with a centralized server operation mode, the intelligent contract is called at any time according to the request of a corresponding user, and the supervision efficiency is greatly improved; and the intelligent contract execution has the advantages of low human intervention and decentralization authority, and the fairness of the supervision action is further increased.
Corresponding to the above flow implementation, an embodiment of the present specification further provides a distributed information monitoring apparatus. The apparatus may be implemented by software, or by hardware, or by a combination of hardware and software. Taking a software implementation as an example, the logical device is formed by reading a corresponding computer program instruction into a memory for running through a Central Processing Unit (CPU) of the device. In terms of hardware, in addition to the CPU, the memory, and the storage shown in fig. 9, the device in which the apparatus for implementing the cyber risk service is located generally includes other hardware such as a chip for transmitting and receiving a wireless signal and/or other hardware such as a board card for implementing a network communication function.
Fig. 8 is a block chain-based information monitoring apparatus provided in this specification, where the block chain includes at least one information monitor node and a plurality of information provider nodes, and the information monitoring apparatus includes
An information obtaining unit 802, configured to obtain, by the information administrator, an encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key associated with a public key of the information administrator;
an information decryption unit 804, configured to decrypt the encrypted information record using a key associated with a private key of the information administrator to obtain an original information record;
a risk supervision processing unit 806, configured to perform a risk supervision process on the raw information record based on a preconfigured supervision rule.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
The systems, devices, modules or modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with certain functionality. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
In correspondence with the above method embodiments, embodiments of the present specification provide a computer device comprising a memory and a processor. Wherein the memory has stored thereon a computer program executable by the processor; the processor, when executing the stored computer program, performs the steps of the method for implementing block chain based information policing in the embodiments of the present specification. For detailed descriptions of the steps of the implementation method for the above-mentioned information supervision, please refer to the previous contents, and they are not repeated.
Corresponding to the above method embodiments, embodiments of the present specification provide a computer-readable storage medium, on which computer programs are stored, and when the computer programs are executed by a processor, the computer programs execute the steps of the implementation method of block chain-based information supervision in the embodiments of the present specification. For detailed descriptions of the steps of the implementation method for the above-mentioned information supervision, please refer to the previous contents, and they are not repeated.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, embodiments of the present description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.

Claims (13)

1. A method of information supervision based on a blockchain, the blockchain comprising at least one information supervisor node and a number of information provider nodes, the supervision method comprising:
the information supervisor node acquires an encrypted information record issued to the block chain by the information provider node; decrypting the encrypted information record to obtain an original information record;
performing risk supervision processing on the original information record based on a preconfigured supervision rule;
wherein the preconfigured supervision rules are converted to generate supervision metrics, the supervision metrics including corresponding thresholds; the executing risk supervision processing on the original information record based on the preconfigured supervision rules comprises:
acquiring a supervision index corresponding to the supervision rule;
identifying a regulatory factor in the original information record,
comparing the value of the supervision factor with a threshold value corresponding to the supervision index,
and executing risk supervision processing according to the comparison result.
2. The information governance method of claim 1, the performing a risk governance process on the raw information record based on a preconfigured governance rule, comprising:
and calling a risk supervision intelligent contract issued on the blockchain, executing an executive program corresponding to a supervision rule stated in the intelligent contract, and executing risk supervision processing on the original information record.
3. The information governance method according to claim 2, the intelligent contract issued by the information supervisor to the blockchain.
4. The method of information governance according to any one of claims 1 to 3, the blockchain being a federation chain.
5. The information supervising method according to claim 1, wherein the encrypted information record is encrypted based on a key associated with a public key of the information supervising party;
decrypting the encrypted information record to obtain an original information record, comprising: and decrypting the encrypted information record by using a secret key related to the private key of the information monitoring party to obtain an original information record.
6. The information supervision method according to claim 1 or 5, wherein the key related to the public key of the information supervisor is: the public key of the information supervisor, the secret key related to the private key of the information supervisor is: the private key of the information administrator.
7. The information supervision method according to claim 1 or 5, wherein the key related to the public key of the information supervisor is: the product of the public key of the information supervisor and the private key of the information provider, and the key related to the private key of the information supervisor is: the product of the private key of the information administrator and the public key of the information provider.
8. The information governance method according to claim 1, the governance indicators being saved to a pool of governance indicators; the supervision indexes in the supervision index pool are multi-branch tree storage structures, and the supervision indexes are nodes on the multi-branch trees.
9. The information governance method according to claim 8, the governance indicator further associated with a corresponding governance processing scheme;
the performing of risk supervision processing according to the comparison result includes,
determining whether the value of the supervision factor reaches a threshold value in the supervision index:
if not, no response is made;
and if so, executing the supervision processing scheme associated with the supervision index.
10. The information governance method according to claim 1, said governance indicator further comprising an executable SQL statement generated based on said preconfigured governance rules; the value of the supervisory factor is obtained based on inputting the supervisory factor in the executable SQL statement and querying in the original information record.
11. An information policing apparatus based on a blockchain, the blockchain including at least one information policer node and a number of information provider nodes, the information policing apparatus comprising:
an information acquisition unit, configured to the information supervisor node acquire an encrypted information record issued to the block chain by the information provider node;
the information decryption unit is used for decrypting the encrypted information record to obtain an original information record;
a risk supervision processing unit for performing risk supervision processing on the original information record based on a preconfigured supervision rule; wherein the preconfigured supervision rules are converted to generate supervision metrics, the supervision metrics including corresponding thresholds; the executing risk supervision processing on the original information record based on the preconfigured supervision rules comprises:
acquiring a supervision index corresponding to the supervision rule;
identifying a regulatory factor in the original information record,
comparing the value of the supervision factor with a threshold value corresponding to the supervision index,
and executing risk supervision processing according to the comparison result.
12. A computer device, comprising: a memory and a processor; the memory having stored thereon a computer program executable by the processor; the processor, when executing the computer program, performs the method of any of claims 1 to 10.
13. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 10.
CN202010754149.4A 2018-05-11 2018-05-11 Information supervision method and device based on blockchain Active CN111898148B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010754149.4A CN111898148B (en) 2018-05-11 2018-05-11 Information supervision method and device based on blockchain

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010754149.4A CN111898148B (en) 2018-05-11 2018-05-11 Information supervision method and device based on blockchain
CN201810446957.7A CN108681966B (en) 2018-05-11 2018-05-11 Information supervision method and device based on block chain

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201810446957.7A Division CN108681966B (en) 2018-05-11 2018-05-11 Information supervision method and device based on block chain

Publications (2)

Publication Number Publication Date
CN111898148A true CN111898148A (en) 2020-11-06
CN111898148B CN111898148B (en) 2024-08-20

Family

ID=63805498

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202010754149.4A Active CN111898148B (en) 2018-05-11 2018-05-11 Information supervision method and device based on blockchain
CN201810446957.7A Active CN108681966B (en) 2018-05-11 2018-05-11 Information supervision method and device based on block chain

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201810446957.7A Active CN108681966B (en) 2018-05-11 2018-05-11 Information supervision method and device based on block chain

Country Status (3)

Country Link
CN (2) CN111898148B (en)
TW (1) TWI694350B (en)
WO (1) WO2019214311A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113191881A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Financial business supervision data processing method, device and system based on block chain
CN113971015A (en) * 2021-11-10 2022-01-25 哲库科技(北京)有限公司 UIA2 calculation circuit and data processing method, chip, electronic equipment and storage medium thereof

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111898148B (en) * 2018-05-11 2024-08-20 创新先进技术有限公司 Information supervision method and device based on blockchain
CN109472166B (en) * 2018-11-01 2021-05-07 恒生电子股份有限公司 Electronic signature method, device, equipment and medium
CN110059495B (en) * 2018-12-14 2020-11-17 创新先进技术有限公司 Data sharing method, device and system and electronic equipment
CN109784918A (en) * 2018-12-15 2019-05-21 深圳壹账通智能科技有限公司 Information measure of supervision, device, equipment and storage medium based on block chain
CN110009317A (en) * 2018-12-27 2019-07-12 阿里巴巴集团控股有限公司 The monitoring method and device of resource transfers data
CN109886677B (en) * 2018-12-29 2021-06-29 创新先进技术有限公司 Commodity purchasing method and device based on block chain
CN109753792B (en) * 2018-12-29 2020-12-11 北京金山安全软件有限公司 Attack detection method and device and electronic equipment
CN109413116A (en) * 2019-01-03 2019-03-01 国家电网有限公司 A kind of believable cloud identity identifying method and system
CN109831545B (en) 2019-01-31 2020-10-09 中国互联网络信息中心 Domain name abuse processing method and system based on block chain
CN110061845A (en) * 2019-03-14 2019-07-26 深圳壹账通智能科技有限公司 Block chain data ciphering method, device, computer equipment and storage medium
CN110365475B (en) * 2019-06-21 2021-12-10 深圳壹账通智能科技有限公司 Block chain two-stage supervision method, device, equipment and storage medium
CN112152982B (en) * 2019-06-28 2022-01-07 华为技术有限公司 Processing method, device and medium of block chain information
CN110490728B (en) * 2019-07-30 2021-03-19 创新先进技术有限公司 Transaction and transaction supervision method, device and equipment based on block chain
CN110533318A (en) * 2019-08-27 2019-12-03 腾讯科技(深圳)有限公司 A kind of data processing method and equipment based on block chain
CN110661790A (en) * 2019-09-10 2020-01-07 连连银通电子支付有限公司 Block chain private data protection method, device, equipment and medium
CN110955909B (en) * 2019-10-12 2022-08-05 四川九洲电器集团有限责任公司 Personal data protection method and block link point
CN110956476A (en) * 2019-12-17 2020-04-03 江苏扬子易联智能软件有限公司 Method and platform for realizing GMP/GSP automatic supervision based on block chain
CN111681723A (en) * 2020-04-27 2020-09-18 山东浪潮通软信息科技有限公司 Health information management method, equipment and medium based on block chain
CN112561540A (en) * 2020-08-14 2021-03-26 北京京东振世信息技术有限公司 Article supervision method and device
CN112115497B (en) * 2020-09-28 2023-06-27 上海对外经贸大学 Block chain-based public opinion storage information erasable treatment method
CN112581339B (en) * 2020-12-16 2024-03-29 深圳市深汕特别合作区智慧城市研究院有限公司 Smart city social element expression system with fairness and openness
CN112529696B (en) * 2020-12-24 2021-06-25 优观融资租赁(中国)有限公司 Financial wind control system based on block chain and public sentiment
CN112435029B (en) * 2021-01-27 2021-04-23 支付宝(杭州)信息技术有限公司 Service processing method and device based on block chain and electronic equipment
CN113051551A (en) * 2021-03-16 2021-06-29 上海图灵加佳网络科技有限公司 Data supervision method, system, medium and supervised terminal based on block chain
CN113360569B (en) * 2021-06-03 2023-10-13 沈阳工业大学 Power grid block chain architecture method based on energy storage parameter selection and capacity decomposition
US12019653B2 (en) 2021-12-07 2024-06-25 International Business Machines Corporation Blockchain clock for storing event data
CN114580029A (en) * 2022-04-28 2022-06-03 浙江甲骨文超级码科技股份有限公司 Block chain digital asset privacy protection method, device, equipment and storage medium
CN114579581B (en) * 2022-05-05 2022-08-30 武汉北大高科软件股份有限公司 Data supervision method and device based on block chain

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208720B1 (en) * 1998-04-23 2001-03-27 Mci Communications Corporation System, method and computer program product for a dynamic rules-based threshold engine
US20050120009A1 (en) * 2003-11-21 2005-06-02 Aker J. B. System, method and computer program application for transforming unstructured text
US20090292779A1 (en) * 2008-05-22 2009-11-26 International Business Machines Corporation Method and System for Supervising Electronic Text Communications of an Enterprise
US20110246229A1 (en) * 2007-11-12 2011-10-06 Debra Pacha System and Method for Detecting Healthcare Insurance Fraud
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170213287A1 (en) * 2012-03-06 2017-07-27 Daniel B. Bruno System and method for providing a cryptographic platform for exchanging debt securities denominated in virtual currencies
CN104320262B (en) * 2014-11-05 2017-07-21 中国科学院合肥物质科学研究院 The method and system of client public key address binding, retrieval and the verification of account book technology are disclosed based on encryption digital cash
US20160321751A1 (en) * 2015-04-28 2016-11-03 Domus Tower, Inc. Real-time settlement of securities trades over append-only ledgers
EP3257191B1 (en) * 2016-02-23 2018-04-11 Nchain Holdings Limited Registry and automated management method for blockchain-enforced smart contracts
CN106228344A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of electronic government affairs system building method based on block chain technology
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN106991612A (en) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 Method, device and the electronic equipment shared for finance data
CN107451485B (en) * 2017-06-02 2020-03-13 创新先进技术有限公司 Data processing method and device based on block chain
CN111898148B (en) * 2018-05-11 2024-08-20 创新先进技术有限公司 Information supervision method and device based on blockchain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6208720B1 (en) * 1998-04-23 2001-03-27 Mci Communications Corporation System, method and computer program product for a dynamic rules-based threshold engine
US20050120009A1 (en) * 2003-11-21 2005-06-02 Aker J. B. System, method and computer program application for transforming unstructured text
US20110246229A1 (en) * 2007-11-12 2011-10-06 Debra Pacha System and Method for Detecting Healthcare Insurance Fraud
US20090292779A1 (en) * 2008-05-22 2009-11-26 International Business Machines Corporation Method and System for Supervising Electronic Text Communications of an Enterprise
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
刘敦楠, 李瑞庆, 陈雪青, 何光宇, 周双喜: "电力市场监管指标及市场评价体系", 电力系统自动化, no. 09, 15 September 2004 (2004-09-15) *
贺诗俊: "基于.Net动态监管信息系统", 《智能计算机与应用》, pages 57 - 59 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113191881A (en) * 2021-05-24 2021-07-30 中国工商银行股份有限公司 Financial business supervision data processing method, device and system based on block chain
CN113971015A (en) * 2021-11-10 2022-01-25 哲库科技(北京)有限公司 UIA2 calculation circuit and data processing method, chip, electronic equipment and storage medium thereof
CN113971015B (en) * 2021-11-10 2023-09-08 哲库科技(北京)有限公司 UIA2 computing circuit, data processing method, chip, electronic device and storage medium

Also Published As

Publication number Publication date
WO2019214311A1 (en) 2019-11-14
CN111898148B (en) 2024-08-20
TW201947446A (en) 2019-12-16
CN108681966A (en) 2018-10-19
TWI694350B (en) 2020-05-21
CN108681966B (en) 2020-07-21

Similar Documents

Publication Publication Date Title
CN108681966B (en) Information supervision method and device based on block chain
CN110046996B (en) Data processing method and device
CN110033258B (en) Service data encryption method and device based on block chain
CN110363527B (en) Block chain-based evidence storage and supervision method and device
US11387979B2 (en) Partially-ordered blockchain
TW202026909A (en) Blockchain certificate storage method and apparatus, and computer device
TW202029086A (en) Block chain-based evidence storage method and device
US11949794B2 (en) Data anonymization of blockchain-based processing pipeline
US10956204B1 (en) Free-riding node identification for blockchain
Wu et al. A blockchain based access control scheme with hidden policy and attribute
EP4092984A1 (en) Data processing method and apparatus, device and medium
WO2020000777A1 (en) Method and apparatus for acquiring individual credit information on the basis of block chain, and computer device
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
US11575499B2 (en) Self auditing blockchain
US20230070625A1 (en) Graph-based analysis and visualization of digital tokens
Anwar et al. A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
Zainal et al. A decentralized autonomous personal data management system in banking sector
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
Yadav et al. Big data hadoop: Security and privacy
Kumari et al. A survey on big data security: Issues challenges and techniques
Li et al. An EMR sharing and privacy protection mechanism based on medical consortium blockchain
US20220393875A1 (en) Plagiarism detection from encrypted documents
Shekar et al. Securing personal identity using blockchain
CN111984378B (en) Database abnormal transaction commit prevention
Badarla et al. Information Systems Security: 18th International Conference, ICISS 2022, Tirupati, India, December 16–20, 2022, Proceedings

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40039814

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant