CN112818384B - Asset processing method, device, equipment and storage medium based on blockchain - Google Patents

Asset processing method, device, equipment and storage medium based on blockchain Download PDF

Info

Publication number
CN112818384B
CN112818384B CN202110064696.4A CN202110064696A CN112818384B CN 112818384 B CN112818384 B CN 112818384B CN 202110064696 A CN202110064696 A CN 202110064696A CN 112818384 B CN112818384 B CN 112818384B
Authority
CN
China
Prior art keywords
asset
borrowing
data
verification
borrower
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110064696.4A
Other languages
Chinese (zh)
Other versions
CN112818384A (en
Inventor
杜茂兵
张佳妮
王挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN202110064696.4A priority Critical patent/CN112818384B/en
Publication of CN112818384A publication Critical patent/CN112818384A/en
Application granted granted Critical
Publication of CN112818384B publication Critical patent/CN112818384B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

The application provides a method, a device, equipment and a storage medium for asset processing based on a blockchain, wherein the method comprises the following steps: the asset borrowing sends an asset borrowing request to an asset provider, a verification request of an asset borrowing proof is sent to any node on a block chain, the asset provider receives the asset borrowing request sent by the asset borrower, the upper limit of asset borrowing set for the asset borrower is obtained, asset borrowing verification data are generated according to first asset borrowing data and first limiting asset borrowing data, the asset borrowing verification data are sent to the block chain node, the block chain node verifies the asset borrowing proof according to the asset borrowing verification data, an asset borrowing verification result is obtained, and the asset borrowing verification result is fed back to the asset provider. In the application, the asset provider only knows the asset borrowing situation between the asset provider and the asset borrower, other borrowing situations of the asset borrower are prevented from being revealed, and the asset borrower is prevented from tampering with liability data through block chain node verification.

Description

Asset processing method, device, equipment and storage medium based on blockchain
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to a method, an apparatus, a device, and a storage medium for processing assets based on a blockchain.
Background
With the rapid development of economy, various companies have a great demand in terms of funds in order to expand production and operation scales, and thus, more and more companies satisfy the demand through bank loans.
In the related art, for a bank, loan information of a company at other banks and the bank is disclosed, and the bank can inquire of the company how much loan exists in total at any time so as to judge whether to continue paying money to the user.
However, since the existing bank loan system lacks information security means, leakage of loan information of a company is easily caused.
Disclosure of Invention
The present application aims to provide a method, a device, equipment and a storage medium for processing assets based on a blockchain, aiming at the defects in the prior art, so as to solve the problem that information is easy to leak in the prior art.
In order to achieve the above purpose, the technical solution adopted in the embodiment of the present application is as follows:
in a first aspect, an embodiment of the present application provides a method for processing assets based on a blockchain, applied to any node on the blockchain, the method including:
Receiving asset borrowing verification data sent by an asset provider; the asset borrowing verification data comprise first asset borrowing data and first limiting asset borrowing data, wherein the first asset borrowing data are ciphertext data of a first asset borrowing amount requested to be borrowed by an asset provider, and the first limiting asset borrowing data are ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrower;
receiving a verification request of an asset borrowing certificate sent by the asset borrower, wherein the verification request comprises liability data of the asset borrower;
and verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feeding back the asset borrowing verification result to the asset provider.
Optionally, the asset borrowing proof is used for proving that a sum of the liability data and the first asset borrowing amount is less than or equal to the asset borrowing upper limit.
Optionally, the asset borrowing verification data further includes a transaction identifier corresponding to the first asset borrowing data.
Optionally, the verifying the asset borrowing proof according to the asset borrowing verification data, to obtain an asset borrowing verification result, includes:
Acquiring actual liability data of the asset borrower;
generating a check borrowing proof according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower by adopting a zero knowledge proof algorithm, wherein the check borrowing proof is used for representing that the sum of the actual liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset borrower;
and carrying out matching verification on the asset borrowing proof according to the verification borrowing proof to obtain a first verification result, wherein the asset borrowing verification result comprises the first verification result.
Optionally, the verifying the asset borrowing proof according to the asset borrowing verification data, to obtain an asset borrowing verification result, further includes:
and carrying out matching verification on the liability data according to the actual liability data to obtain a second verification result, wherein the asset borrowing verification result also comprises the second verification result.
Optionally, the verification request further includes second asset borrowing data, where the second asset borrowing data is ciphertext data of a second asset borrowing amount stored in the asset borrower;
And verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and further comprising:
and carrying out matching verification on the second asset borrowing data according to the first asset borrowing data to obtain a third verification result, wherein the asset borrowing verification result further comprises the third verification result.
Optionally, the verification request further includes second limiting asset borrowing data, where the second limiting asset borrowing data is ciphertext data stored in the asset borrower and set by the asset provider for an upper limit of asset borrowing set by the asset provider;
and verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and further comprising:
and carrying out matching verification on the second limit asset borrowing data according to the first limit asset borrowing data to obtain a fourth verification result, wherein the asset borrowing verification result further comprises the fourth verification result.
Optionally, the method further comprises:
receiving asset return check data sent by the asset provider, wherein the asset return check data is ciphertext data of a first asset return amount required to be returned by the asset provider by the asset borrower;
Receiving a verification request of an asset return certificate sent by the asset borrower, wherein the verification request of the asset return certificate comprises asset residual return data borrowed by the asset borrower to the asset provider;
and verifying the asset return certification according to the asset return verification data to obtain an asset return verification result, and feeding back the asset return verification result to the asset provider.
Optionally, the asset return proof is used to prove that a sum of the asset remaining return data stored in the asset borrower and the first return amount is equal to a total amount of assets borrowed by the asset borrower stored in the asset borrower to the asset provider.
In a second aspect, another embodiment of the present application provides a blockchain-based asset processing method, applied to an asset provider, the method including:
receiving an asset borrowing request sent by an asset borrower, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset borrower to the asset provider;
acquiring an upper limit of asset borrowing set by the asset provider for the asset borrower;
Encrypting the first asset borrowing amount by adopting a preset encryption algorithm to generate first asset borrowing data;
encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data;
generating asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and sending the asset borrowing verification data to any node on a block chain;
and receiving an asset borrowing verification result sent by any node on the block chain, wherein the asset borrowing verification result is obtained by verifying the asset borrowing proof of the asset borrower by any node on the block chain by adopting the asset borrowing verification data.
Optionally, the method further comprises:
and if the asset borrowing verification result indicates that the verification is passed, updating the asset data of the account of the asset borrower according to the first asset borrowing amount.
Optionally, the encrypting the first asset borrowing amount by using a preset encryption algorithm to generate first asset borrowing data includes:
encrypting the first asset borrowing amount and the sum of keys corresponding to the first asset borrowing amount by adopting the preset encryption algorithm to generate first asset borrowing data;
The encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data comprises the following steps:
and encrypting the sum of the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by adopting the preset encryption algorithm to generate the first limit asset borrowing data.
Optionally, the method further comprises:
receiving an asset return request sent by the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
encrypting the first asset return amount by adopting a preset encryption algorithm, generating asset return check data, and transmitting the asset return check data to any node on the blockchain;
and receiving an asset return verification result sent by any node on the block chain, wherein the asset return verification result is obtained by verifying asset return evidence of the asset borrower by any node on the block chain by adopting the asset return verification data.
Optionally, the method further comprises:
and if the asset return verification result indicates that the verification is passed, updating asset data of the account of the asset borrower according to the first asset return amount.
In a third aspect, another embodiment of the present application provides a blockchain-based asset processing method applied to an asset borrower, the method including:
sending an asset borrowing request to an asset provider, and acquiring liability data of the asset borrower, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset provider by the asset borrower;
and sending a verification request of asset borrowing proof to any node on a blockchain, wherein the verification request comprises liability data of the asset borrower.
Optionally, after the sending the asset borrowing request to the asset provider, the method further comprises:
receiving asset borrowing data sent by the asset provider, wherein the asset borrowing data comprises first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data is ciphertext data of the first asset borrowing amount, and the first limiting asset borrowing data is ciphertext data of an upper asset borrowing limit set by the asset provider for the asset borrowing party;
and generating the asset borrowing proof according to the liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset provider for the asset borrower, wherein the asset borrowing proof is used for proving that the sum of the liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset provider for the asset borrower.
Optionally, before the step of sending the verification request of the asset borrowing proof to any node on the blockchain, the method further includes:
and encrypting the second asset borrowing amount stored in the asset borrower by adopting a preset encryption algorithm to obtain second asset borrowing data, wherein the verification request also comprises the second asset borrowing data.
Optionally, before the step of sending the verification request of the asset borrowing proof to any node on the blockchain, the method further includes:
encrypting the liability amount by adopting a preset encryption algorithm to obtain the liability data, wherein the verification request comprises the liability data.
Optionally, the method further comprises:
an asset return request sent to the asset provider and acquiring the residual asset return data of the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
and sending a verification request of asset return certification to any node on the blockchain, wherein the verification request of asset return certification comprises the residual return data of the asset.
In a fourth aspect, another embodiment of the present application provides a blockchain-based asset processing device, comprising:
The receiving module is used for receiving asset borrowing verification data sent by the asset provider; the asset borrowing verification data comprise first asset borrowing data and first limiting asset borrowing data, wherein the first asset borrowing data are ciphertext data of a first asset borrowing amount requested to be borrowed by an asset provider, and the first limiting asset borrowing data are ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrower;
the receiving module is used for receiving a verification request of the asset borrowing evidence sent by the asset borrower, and the verification request comprises liability data of the asset borrower;
and the processing module is used for verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feeding back the asset borrowing verification result to the asset provider.
Optionally, the asset borrowing proof is used for proving that a sum of the liability data and the first asset borrowing amount is less than or equal to the asset borrowing upper limit.
Optionally, the asset borrowing verification data further includes a transaction identifier corresponding to the first asset borrowing data.
Optionally, the processing module is specifically configured to:
acquiring actual liability data of the asset borrower;
generating a check borrowing proof according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower by adopting a zero knowledge proof algorithm, wherein the check borrowing proof is used for representing that the sum of the actual liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset borrower;
and carrying out matching verification on the asset borrowing proof according to the verification borrowing proof to obtain a first verification result, wherein the asset borrowing verification result comprises the first verification result.
Optionally, the processing module is specifically configured to:
and carrying out matching verification on the liability data according to the actual liability data to obtain a second verification result, wherein the asset borrowing verification result also comprises the second verification result.
Optionally, the verification request further includes second asset borrowing data, where the second asset borrowing data is ciphertext data of a second asset borrowing amount stored in the asset borrower;
the processing module is specifically configured to:
And carrying out matching verification on the second asset borrowing data according to the first asset borrowing data to obtain a third verification result, wherein the asset borrowing verification result further comprises the third verification result.
Optionally, the verification request further includes second limiting asset borrowing data, where the second limiting asset borrowing data is ciphertext data stored in the asset borrower and set by the asset provider for an upper limit of asset borrowing set by the asset provider;
the processing module is specifically configured to:
and carrying out matching verification on the second limit asset borrowing data according to the first limit asset borrowing data to obtain a fourth verification result, wherein the asset borrowing verification result further comprises the fourth verification result.
Optionally, the receiving module is further configured to receive asset return checking data sent by the asset provider, where the asset return checking data is ciphertext data of a first asset return amount that the asset borrows to request return to the asset provider;
receiving a verification request of an asset return certificate sent by the asset borrower, wherein the verification request of the asset return certificate comprises asset residual return data borrowed by the asset borrower to the asset provider;
The processing module is further configured to:
and verifying the asset return certification according to the asset return verification data to obtain an asset return verification result, and feeding back the asset return verification result to the asset provider.
Optionally, the asset return proof is used to prove that a sum of the asset remaining return data stored in the asset borrower and the first return amount is equal to a total amount of assets borrowed by the asset borrower stored in the asset borrower to the asset provider.
In a fifth aspect, another embodiment of the present application provides a blockchain-based asset processing device, comprising:
the receiving module is used for receiving an asset borrowing request sent by an asset borrowing party, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset borrowing party to the asset provider;
the acquisition module is used for acquiring an upper limit of asset borrowing set by the asset provider for the asset borrower;
the processing module is used for encrypting the first asset borrowing amount by adopting a preset encryption algorithm to generate first asset borrowing data; encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data; generating asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and sending the asset borrowing verification data to any node on a block chain;
The receiving module is configured to receive an asset borrowing verification result sent by any node on the blockchain, where the asset borrowing verification result is obtained by verifying an asset borrowing proof of the asset borrower by any node on the blockchain by using the asset borrowing verification data.
Optionally, the processing module is further configured to:
and if the asset borrowing verification result indicates that the verification is passed, updating the asset data of the account of the asset borrower according to the first asset borrowing amount.
Optionally, the processing module is specifically configured to:
encrypting the first asset borrowing amount and the sum of keys corresponding to the first asset borrowing amount by adopting the preset encryption algorithm to generate first asset borrowing data;
and encrypting the sum of the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by adopting the preset encryption algorithm to generate the first limit asset borrowing data.
Optionally, the receiving module is further configured to:
receiving an asset return request sent by the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
The processing module is further configured to:
encrypting the first asset return amount by adopting a preset encryption algorithm, generating asset return check data, and transmitting the asset return check data to any node on the blockchain;
the receiving module is further configured to:
and receiving an asset return verification result sent by any node on the block chain, wherein the asset return verification result is obtained by verifying asset return evidence of the asset borrower by any node on the block chain by adopting the asset return verification data.
Optionally, the processing module is further configured to:
and if the asset return verification result indicates that the verification is passed, updating asset data of the account of the asset borrower according to the first asset return amount.
In a sixth aspect, another embodiment of the present application provides a blockchain-based asset processing device, comprising:
a first sending module, configured to send an asset borrowing request to an asset provider, and an obtaining module, configured to obtain liability data of the asset borrower, where the asset borrowing request includes a first asset borrowing amount that the asset borrowing request requests to borrow from the asset provider;
And the second sending module is used for sending a verification request of asset borrowing evidence to any node on the blockchain, wherein the verification request comprises liability data of the asset borrower.
Optionally, the apparatus further comprises:
the receiving module is used for receiving asset borrowing data sent by the asset provider, wherein the asset borrowing data comprises first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data is ciphertext data of the first asset borrowing amount, and the first limiting asset borrowing data is ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrowing party;
and the processing module is used for generating the asset borrowing proof according to the liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset provider for the asset borrower, wherein the asset borrowing proof is used for proving that the sum of the liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset provider for the asset borrower.
Optionally, the processing module is further configured to:
encrypting the liability amount by adopting a preset encryption algorithm to obtain the liability data, wherein the verification request comprises the liability data.
Optionally, the apparatus further comprises:
the third sending module is used for sending an asset return request to the asset provider and obtaining the residual asset return data of the asset borrower, wherein the asset return request comprises a first asset return amount for requesting return to the asset provider by the asset borrower;
and sending a verification request of asset return certification to any node on the blockchain, wherein the verification request of asset return certification comprises the residual return data of the asset.
In a seventh aspect, another embodiment of the present application provides a block link point apparatus comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor and the memory in communication over the bus when the block link point device is running, the processor executing the program instructions to perform the method of any of the first aspects.
In an eighth aspect, another embodiment of the present application provides an asset provider device comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor and the memory in communication over the bus when the asset provider device is running, the processor executing the program instructions to perform the method of any of the second aspects.
In a ninth aspect, another embodiment of the present application provides an asset borrower apparatus, comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor in communication with the memory over the bus when the asset borrower device is running, the processor executing the program instructions to perform the method of any of the third aspects.
In a tenth aspect, another embodiment of the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method according to any one of the first, second and third aspects.
The application provides a method, a device, equipment and a storage medium for asset processing based on a blockchain, wherein the method comprises the following steps: the asset borrowing sends an asset borrowing request to an asset provider, a verification request of an asset borrowing proof is sent to any node on a block chain, the asset provider receives the asset borrowing request sent by the asset borrower, the upper limit of asset borrowing set for the asset borrower is obtained, asset borrowing verification data are generated according to first asset borrowing data and first limiting asset borrowing data, the asset borrowing verification data are sent to the block chain node, the block chain node verifies the asset borrowing proof according to the asset borrowing verification data, an asset borrowing verification result is obtained, and the asset borrowing verification result is fed back to the asset provider. In the application, the asset provider only knows the asset borrowing situation between the asset provider and the asset borrower, other borrowing situations of the asset borrower are prevented from being revealed, and the asset borrower is prevented from tampering with liability data through block chain node verification.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered limiting the scope, and that other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 illustrates an architecture diagram of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 2 illustrates an interactive flowchart one of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 3 illustrates a first flow diagram of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 4 illustrates a second flow diagram of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 5 illustrates a third flow diagram of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 6 illustrates a fourth flow chart of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 7 illustrates a fifth flow diagram of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 8 illustrates an interactive flowchart second of a blockchain-based asset processing method provided by embodiments of the present application;
FIG. 9 illustrates a block chain based asset processing device provided by an embodiment of the present application;
FIG. 10 illustrates a second schematic block chain based asset processing device provided in an embodiment of the present application;
FIG. 11 illustrates a third schematic block chain based asset processing device provided by an embodiment of the present application;
FIG. 12 is a schematic diagram illustrating a block chain node device according to an embodiment of the present disclosure;
FIG. 13 illustrates a schematic diagram of an asset provider device provided by an embodiment of the present application;
fig. 14 shows a schematic structural diagram of an asset borrower device according to an embodiment of the present application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions of the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present application, and it should be understood that the accompanying drawings in the present application are only for the purpose of illustration and description, and are not intended to limit the protection scope of the present application. In addition, it should be understood that the schematic drawings are not drawn to scale. A flowchart, as used in this application, illustrates operations implemented according to some embodiments of the present application. It should be understood that the operations of the flow diagrams may be implemented out of order and that steps without logical context may be performed in reverse order or concurrently. Moreover, one or more other operations may be added to the flow diagrams and one or more operations may be removed from the flow diagrams as directed by those skilled in the art.
In addition, the described embodiments are only some, but not all, of the embodiments of the present application. The components of the embodiments of the present application, which are generally described and illustrated in the figures herein, may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
It should be noted that the term "comprising" will be used in the embodiments of the present application to indicate the presence of the features stated hereinafter, but not to exclude the addition of other features.
Before introducing the technical solution of the present application, the terms related to the present application are described:
blockchain: a brand new distributed infrastructure and computing paradigm that uses block chained data structures to validate and store data, distributed node consensus algorithms to generate and update data, cryptography to secure data transfer and access, and intelligent contracts composed of automated script code to program and manipulate data.
Zero knowledge proof: the prover can let the verifier trust that a certain assertion is correct without providing the verifier with any useful information.
Aiming at the problem that in the existing bank loans, the loan information of a user at other banks is disclosed for the banks, so that the bank can conveniently inquire the bank, the bank can know how much loan is available for the user at any time, but some business scenes exist, the loan situation of a company can be obtained by other competing companies through other banks, so that the borrowing situation is not beneficial in business competition, and on the basis of the method, the application provides a block chain-based property processing method, the property provider only knows the property borrowing data with the property borrower, the leakage of other loan situations of the property borrower is avoided, the privacy of the property borrower is protected, the pneumatic control requirement of the property provider can be met, the business competition among the users about the loan can be effectively avoided, and the property borrowing proof provided by the property borrower is verified according to the property borrowing verification data provided by the property provider through block chain link points, so that the property borrowing data is prevented from being tampered with the liability data.
FIG. 1 illustrates an architecture diagram of a blockchain-based asset processing method provided by an embodiment of the present application, as shown in FIG. 1, including: a network connected asset provider device 100, an asset borrower device 200, and a blockchain node device 300.
The asset provider device 100 may be a device corresponding to an asset provider, for example, a banking device, the asset borrower device 200 may be a device corresponding to an asset borrower, for example, a user device, and the blockchain node device 300 may be a device corresponding to a blockchain node.
The asset provider may send asset borrowing verification data to the block chain node device 300 through the asset provider device 100, the asset borrowing verification data includes first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data requests ciphertext data of a first asset borrowing amount borrowed by the asset provider, the first limiting asset borrowing data is ciphertext data of an upper asset borrowing limit set by the asset provider for the asset borrowing party, the asset borrowing party may send a verification request of asset borrowing evidence to the block chain node 300 through the asset borrowing device 200, the verification request includes liability data of the asset borrowing party, the block chain node device 300 verifies the asset borrowing evidence according to the asset borrowing verification data, an asset borrowing verification result is obtained, and the asset borrowing verification result is fed back to the asset provider.
It should be noted that the terms asset provider device 100, asset provider, bank are used interchangeably herein to refer to an individual, entity, or tool that may provide an asset providing service; the terms asset borrower device 200, asset borrower, user are used interchangeably herein to refer to a person, entity, or tool that may provide an asset borrowing service; the terms blockchain node device 300, blockchain node are used interchangeably in this application.
The asset processing method based on blockchain provided in the present application is described in detail below with reference to several embodiments, and includes an asset lending process and an asset return process, which are described in fig. 2 to 7, and in fig. 8.
FIG. 2 illustrates an interactive flowchart one of a blockchain-based asset processing method provided by an embodiment of the present application, as shown in FIG. 2, the method includes:
s11, sending an asset borrowing request to an asset provider by the asset borrowing party, and acquiring liability data of the asset borrowing party.
In the process of borrowing the asset, the asset borrower can send an asset borrowing request to the asset provider, wherein the asset borrowing request includes a first asset borrowing amount for the asset borrower to request to borrow, and accordingly, the asset provider receives the asset borrowing request sent by the asset borrower, and the first asset borrowing amount can be 10 ten thousand, for example.
In practical application, the asset borrower may be a user, the asset provider may be a bank, and the asset borrowing request may be a borrowing request, so that the user may initiate a borrowing request to the bank, where the borrowing request includes the first asset borrowing amount, that is, the above 10 ten thousand.
In this embodiment, when an asset borrowing is required, the asset borrower may send an asset borrowing request to the asset provider, and accordingly, the asset provider receives the asset borrowing request sent by the asset borrower, and the asset borrower may further acquire liability data of the asset borrower, where the liability data of the asset borrower may be the borrowed resource yield of the asset borrower borrowed by all the asset providers before the present borrowing, for example, the borrowed resource yield of the user at all banks before the present borrowing is 90 ten thousand, that is, the liability of the asset borrower is 90 ten thousand.
S12, the asset borrowing transmits a verification request of asset borrowing proof to any node on the block chain.
The asset borrowing transmits a verification request of the asset borrowing proof to any node on the blockchain, wherein the verification request comprises liability data of the asset borrower, and correspondingly, any node on the blockchain receives the verification request of the asset borrowing proof transmitted by the asset borrower.
The verification request is used for requesting any node on the blockchain to verify the asset borrowing proof of the asset borrower, that is, any node on the blockchain can inform the asset provider to issue the first asset borrowing amount to the asset borrower only after the asset borrowing proof provided by the asset borrower passes the verification.
It should be noted that, the liability data of the asset borrower may be plaintext data, or may be ciphertext data obtained by encrypting the liability amount of the asset borrower by using a preset encryption algorithm, where the preset encryption algorithm may be a Hash (Hash) encryption algorithm, so as to improve confidentiality of the liability data in a transmission process and prevent the liability data from being leaked.
S13, the asset provider acquires an upper limit of asset borrowing set by the asset provider for the asset borrower.
The asset provider receives the asset borrowing request sent by the asset borrower, and then the upper limit of the asset borrowing set by the asset provider for the asset borrower can be obtained, that is, the asset borrowing request can include information such as an identity of the asset borrower, the asset provider responds to the asset borrowing request, can determine lending qualification of the asset borrower according to the identity of the asset borrower, and sets the upper limit of the asset borrowing for the asset borrower according to the lending qualification of the asset borrower.
S14, the asset provider encrypts the first asset borrowing amount by adopting a preset encryption algorithm to generate first asset borrowing data.
S15, the asset provider encrypts the asset borrowing upper limit by adopting a preset encryption algorithm to generate first limit asset borrowing data.
And S16, the asset provider generates asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and transmits the asset borrowing verification data to any node on the blockchain.
The asset borrowing request includes a first asset borrowing amount which is requested to be borrowed by the asset provider, so that when the asset provider receives the asset borrowing request, a preset encryption algorithm can be adopted to encrypt the first asset borrowing amount to generate first asset borrowing data, and a preset encryption algorithm is adopted to encrypt an upper limit of asset borrowing to generate first limiting asset borrowing data.
The asset provider generates asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, that is, the asset borrowing verification data comprises the first asset borrowing data and the first limiting asset borrowing data, the first asset borrowing data is ciphertext data of a first asset borrowing amount requested to be borrowed by the asset provider, and the first limiting asset borrowing data is ciphertext data of an asset borrowing upper limit set by the asset provider to the asset borrowing party.
The asset provider also transmits asset borrowing verification data to any node on the blockchain to enable any node on the blockchain to verify the asset borrowing proof transmitted by the asset borrower according to the asset borrowing verification data transmitted by the asset provider.
It should be noted that, the preset encryption algorithm may be a Hash (Hash) encryption algorithm, so as to prevent the asset borrowing verification data from being leaked according to confidentiality of the asset borrowing verification data generated by the first asset borrowing data and the first limiting asset borrowing data in a transmission process.
And S17, any node on the blockchain verifies the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and the asset borrowing verification result is fed back to the asset provider.
Optionally, the asset borrowing proof is used for proving that the sum of the liability data and the first asset borrowing amount is smaller than or equal to an upper limit of asset borrowing, that is, the liability data is provided for an asset borrower, the blockchain can verify the liability data according to the first asset borrowing amount and the asset borrowing data provided by the asset provider, so as to verify whether the sum of the liability data and the first asset borrowing amount is smaller than or equal to the upper limit of asset borrowing, an asset borrowing verification result is obtained, the asset borrowing verification result comprises that the sum of the liability data and the first asset borrowing amount is not passed, and the sum of the liability data and the first asset borrowing amount is not passed, that is, the check is not passed, that is, the sum of the liability data and the first asset borrowing amount is larger than the upper limit of asset borrowing amount, that is, and the borrowing verification result is that any node on the blockchain adopts the asset borrowing verification data to verify that the asset borrowing of the asset borrowing party is verified.
Any node on the blockchain can also feed back an asset borrowing verification result to an asset provider, and correspondingly, the asset provider receives the asset borrowing verification result sent by any node on the blockchain, and if the asset borrowing verification result indicates that verification is passed, the method can further comprise:
the asset provider updates asset data of the account of the asset borrower based on the first asset borrowing amount.
If the verification of the asset borrowing proof provided by the asset provider is passed, it indicates that the sum of the liability data provided by the asset provider and the first asset borrowing amount is less than or equal to the upper limit of the asset borrowing, and it indicates that the asset borrower can also borrow the service from the asset provider, then the asset provider can update the asset data of the account of the asset borrower according to the first asset borrowing amount, that is, issue the first asset borrowing amount to the asset borrower.
Optionally, the asset borrowing verification data further includes a transaction identifier corresponding to the first asset borrowing data.
The transaction identifier corresponding to the first asset borrowing data is included in the asset borrowing verification data sent by any node on the asset providing direction blockchain, wherein the transaction identifier corresponding to the first asset borrowing data can provide the transaction identifier carried in the asset borrowing request sent to the asset providing direction asset, and the transaction identifier carried in the asset borrowing request can also be included in the verification request of the asset borrowing evidence sent by any node on the asset borrowing direction blockchain, so that any node on the blockchain can carry out matching searching according to the transaction identifier corresponding to the first asset borrowing data and the transaction identifier in the verification request to determine the asset borrowing verification data for verifying the asset borrowing evidence.
According to the asset processing method based on the blockchain, an asset borrowing request is sent to an asset provider by the asset borrowing, an asset borrowing proof verification request is sent to any node on the blockchain, the asset provider receives the asset borrowing request sent by the asset borrowing party, the upper limit of asset borrowing set for the asset borrowing party is obtained, asset borrowing verification data are generated according to first asset borrowing data and first limiting asset borrowing data, the asset borrowing verification data are sent to the blockchain link, the asset borrowing proof is verified by the blockchain node according to the asset borrowing verification data, an asset borrowing verification result is obtained, and the asset borrowing verification result is fed back to the asset provider. In this embodiment, the asset provider only knows the asset lending situation with the asset borrower, prevents the leakage of other lending situations of the asset borrower, protects the privacy of the asset borrower, and prevents the asset borrower from tampering with liability data through blockchain node verification.
One possible verification process of asset borrowing proof by any node on the blockchain is described below with reference to fig. 3, fig. 3 shows a flowchart of a blockchain-based asset processing method provided in an embodiment of the present application, as shown in fig. 3, and step S17 includes:
S170, any node on the block chain acquires actual liability data of the asset borrower.
The actual liability data of the asset borrower is stored in the blockchain, and the actual liability data can be the borrowed resource output of the asset borrower before the borrowing of the present time, for example, can be 95 ten thousand. Therefore, in this embodiment, when verifying the asset borrowing proof provided by the asset borrower, any node on the blockchain may specifically include verification of liability data provided by the asset borrower, and therefore, any node on the blockchain may acquire actual liability data of the asset borrower.
And S171, any node on the block chain adopts a zero knowledge proof algorithm, and generates check borrowing proof according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower.
The zero knowledge proof algorithm is used for acquiring constraint relations among actual liability data, first asset borrowing amount and asset borrowing upper limit set by an asset borrower, any node on the blockchain invokes the zero knowledge proof algorithm, and generates check borrowing evidence according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower, wherein the check borrowing evidence is used for representing that the sum of the actual liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset borrower, that is, the zero knowledge proof result is the constraint relations among the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower. Wherein the zero knowledge proof result may be in the form of a verifiable string.
And S172, any node on the blockchain performs matching verification on the asset borrowing evidence according to the verification borrowing evidence to obtain a first verification result.
The sum of the asset borrowing evidence and the first asset borrowing amount is smaller than or equal to the upper limit of asset borrowing, that is, any node on the blockchain can carry out matching verification on the asset borrowing evidence according to the checking borrowing evidence to obtain a first verification result, if the checking borrowing evidence is matched with the asset borrowing evidence, the first verification result indicates that the checking is passed, if the checking borrowing evidence is not matched with the asset borrowing evidence, the first verification result indicates that the checking is not passed, and if the checking is not passed, the first verification result indicates that the checking is not passed, the liability data provided by the asset borrowing party is tampered.
The asset borrowing verification result comprises a first verification result, wherein if the first verification result indicates that verification is passed, the asset borrowing verification result indicates that verification is passed, and if the first verification result indicates that verification is not passed, the asset borrowing verification result indicates that verification is not passed.
It should be noted that, if the sum of the liability data and the first asset borrowing amount is greater than the upper limit of asset borrowing, the asset borrower will not send the asset borrowing request to the asset provider, that is, in this embodiment, the asset borrower will send the asset borrowing request to the asset provider only if the sum of the liability data and the first asset borrowing amount is less than or equal to the upper limit of asset borrowing.
In addition, if the sum of the actual liability data and the first asset borrowing amount is greater than the upper limit of the asset borrowing amount set by the asset borrower, any node on the blockchain does not perform matching verification on the asset borrowing proof provided by the asset borrower, so that in this case, the asset borrower does not have qualification and borrows from the asset provider, and any node on the blockchain can send an indication indicating that the asset borrower does not have lending authority to the asset provider, so that the asset borrower cannot issue the first asset borrowing amount to the asset borrower.
Optionally, step S17 further includes:
and S173, any node on the block chain performs matching verification on the liability data according to the actual liability data to acquire a second verification result.
In order to prevent the user from tampering with the liability data, therefore, any node on the blockchain can also carry out matching verification on the liability data provided by the asset borrower according to the actual liability data, a second verification result is obtained, if the liability data is matched with the actual liability data, the second verification result indicates that the verification is passed, if the liability data is not matched with the actual liability data, the second verification result indicates that the verification is not passed, wherein the second verification result indicates that the verification is not passed, and the liability data provided by the asset borrower is tampered.
The asset borrowing verification result comprises a second verification result, and the fact that if the first verification result and/or the second verification result indicate that verification is not passed is indicated, the verification result indicates that verification is not passed, and if the first verification result and the second verification result both indicate that verification is passed, the verification result indicates that verification is passed.
According to the asset processing method based on the blockchain, any node on the blockchain acquires actual liability data of an asset borrower, a zero knowledge proving algorithm is adopted, a check borrowing evidence is generated according to the actual liability data, the first asset borrowing amount and the upper limit of the asset borrowing set by the asset borrower, the asset borrowing evidence is subjected to matching verification according to the check borrowing evidence, a first verification result is obtained, the liability data is subjected to matching verification according to the actual liability data, and a second verification result is obtained. In this embodiment, the asset provider only knows the asset borrowing situation with the asset borrower, and prevents leakage of other borrowing situations of the asset borrower, so as to protect the privacy of the asset borrower, and the blockchain verifies the asset borrowing proof and liability data provided by the asset borrower, so that the asset borrower is prevented from tampering with the liability data.
Optionally, the verification request may further include second asset borrowing data, where the second asset borrowing data is ciphertext data of a second asset borrowing amount stored in the asset borrower, and as described below with reference to fig. 4, fig. 4 shows a second flowchart of the blockchain-based asset processing method provided in the embodiment of the present application, as shown in fig. 4, and step S17 may further include, on the basis of fig. 3:
and S174, any node on the block chain performs matching verification on the second asset borrowing data according to the first asset borrowing data to obtain a third verification result.
The verification request further comprises second asset borrowing data, wherein the second asset borrowing data is ciphertext data of second asset borrowing amount stored in the asset borrower.
The second asset borrowing data may be obtained by encrypting the second asset borrowing amount stored in the asset borrower by a preset encryption algorithm, wherein the second asset borrowing amount stored in the asset borrower may be an asset borrowing amount stored in the asset borrower and requesting to borrow from the asset provider, the second asset borrowing amount may be a first asset borrowing amount or may be different from the first asset borrowing amount, and if the second asset borrowing amount is different from the first asset borrowing amount, it is indicated that the first asset borrowing amount may be tampered by a system of the asset borrower.
Therefore, any node on the blockchain can also carry out matching verification on the second asset borrowing data according to the first asset borrowing data so as to verify whether the first asset borrowing amount is the same as the second asset borrowing amount or not, a third verification result is obtained, if the first asset borrowing data is matched with the second asset borrowing data, the third verification result indicates that verification is passed, and if the first asset borrowing data is not matched with the second asset borrowing data, the third verification result indicates that verification is not passed.
The asset borrowing verification result further comprises a third verification result, wherein if the first verification result, the second verification result and the third verification result all indicate that verification is passed, the verification result indicates that verification is passed, and if at least one of the first verification result, the second verification result and the third verification result indicates that verification is not passed, the asset borrowing verification result indicates that verification is not passed.
It should be noted that, the preset encryption algorithm may be a Hash (Hash) encryption algorithm, so as to ensure confidentiality of the second asset borrowed data in the transmission process and prevent the second asset borrowed data from being leaked.
Optionally, the verification request further includes second limiting asset borrowing data, where the second limiting asset borrowing data is ciphertext data stored in the asset borrower, and the ciphertext data is upper limit of asset borrowing set by the asset provider for the asset borrower.
Step S17 may further include:
and S175, any node on the blockchain performs matching verification on the second limit asset borrowing data according to the first limit asset borrowing data to obtain a fourth verification result.
The second limiting asset borrowing data may be obtained by encrypting an asset borrowing upper limit set by the asset provider stored in the asset borrower by a preset encryption algorithm, wherein the second limiting asset borrowing amount stored in the asset borrower may be an asset borrowing upper limit set by the asset provider stored in the asset borrower itself, the asset borrowing upper limit set by the asset provider stored in the asset borrower may be the same as or different from an asset borrowing upper limit set by the asset provider to the asset borrower, and if the second limiting asset borrowing amount is different, it is indicated that the asset borrowing upper limit set by the asset provider to the asset borrower may be tampered by a system of the asset borrower.
Therefore, any node on the blockchain can also perform matching verification on the second limiting asset borrowing data according to the first limiting asset borrowing data so as to verify whether the upper limit of the asset borrowing stored in the asset borrowing party is the same as the upper limit of the asset borrowing set by the asset provider for the asset borrowing party, so that a fourth verification result is obtained, if the upper limit of the asset borrowing stored in the asset borrowing party is matched with the upper limit of the asset borrowing party, the fourth verification result indicates that the verification is passed, and if the upper limit of the asset borrowing stored in the asset borrowing party is not matched with the upper limit of the asset borrowing party, the fourth verification result indicates that the verification is not passed.
The asset borrowing verification result further comprises a fourth verification result, wherein if the first verification result, the second verification result, the third verification result and the fourth verification result all indicate that verification is passed, the verification result indicates that verification is passed, and if at least one of the first verification result, the second verification result, the third verification result and the fourth verification result indicates that verification is not passed, the asset borrowing verification result indicates that verification is not passed.
According to the asset processing method based on the block chain, any node on the block chain performs matching verification on second asset borrowing data according to the first asset borrowing data to obtain a third verification result, and performs matching verification on second limiting asset borrowing data according to the first limiting asset borrowing data to obtain a fourth verification result. In this embodiment, the asset provider only knows the asset borrowing situation with the asset borrower, and prevents leakage of other borrowing situations of the asset borrower, so as to ensure privacy of the asset borrower, and the blockchain verifies the second asset borrowing data and the second limiting asset borrowing data provided by the asset borrower, so that the asset borrower is prevented from tampering with the asset borrowing data and the limiting asset borrowing data.
One possible implementation process of encrypting and generating the first asset borrowing data by the asset provider is described below with reference to fig. 5, fig. 5 shows a flowchart three of a blockchain-based asset processing method provided in an embodiment of the present application, as shown in fig. 5, and step S14 includes:
and S140, encrypting the sum of the first asset borrowing amount and the key corresponding to the first asset borrowing amount by the asset provider by adopting a preset encryption algorithm, and generating first asset borrowing data.
The key corresponding to the first asset borrowing amount may be a unique key corresponding to the first asset borrowing amount, for example, may be a 256-bit value, and the asset provider receives an asset borrowing request sent by an asset borrowing party, where the asset borrowing request includes: the asset borrowing requests the first asset borrowing amount to the asset provider, the asset provider responds to the asset borrowing request to acquire a key corresponding to the first asset borrowing amount, then summation operation is carried out on the first asset borrowing amount and the key corresponding to the first asset borrowing amount, and a preset encryption algorithm is adopted to encrypt the sum of the first asset borrowing amount and the key corresponding to the first asset borrowing amount, so that first asset borrowing data is generated.
The preset encryption algorithm may be a hash encryption algorithm, and in order to prevent the first asset borrowing amount from being cracked, a key corresponding to the first asset borrowing amount and the first asset borrowing amount is taken as input, and the preset encryption algorithm is adopted to generate first asset borrowing data, so that leakage of the first asset borrowing amount in a transmission process is further prevented by adopting a double encryption method.
Correspondingly, step S15 includes:
and S150, encrypting the sum of the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by the asset provider by adopting a preset encryption algorithm, and generating first limit asset borrowing data.
The key corresponding to the upper limit of the asset borrowing can be a unique key corresponding to the upper limit of the asset borrowing, for example, the key can be a 256-bit value, the asset provider receives an asset borrowing request sent by the asset borrower, responds to the asset borrowing request, sets the upper limit of the asset borrowing set by the asset provider for the asset borrower, acquires the key corresponding to the upper limit of the asset borrowing, performs summation operation on the key corresponding to the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing, and encrypts the sum of the key corresponding to the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by adopting a preset encryption algorithm to generate first limit asset borrowing data.
The preset encryption algorithm may be a hash encryption algorithm, in order to prevent the upper limit of the asset borrowing from being broken, a key corresponding to the upper limit of the asset borrowing and the upper limit of the asset borrowing is taken as input, and the preset encryption algorithm is adopted to generate first limit asset borrowing data, so that the double encryption method is adopted to further prevent the upper limit of the asset borrowing from being leaked in the transmission process.
Taking a Hash encryption algorithm as an example, the first asset borrowing data is Hash (first asset borrowing amount+key corresponding to the first asset borrowing amount), and the first limiting asset borrowing data is Hash (asset borrowing upper limit+key corresponding to the asset borrowing upper limit).
According to the asset processing method based on the blockchain, a preset encryption algorithm is adopted, an asset provider encrypts the sum of the first asset borrowing amount and the key corresponding to the first asset borrowing amount to generate first asset borrowing data, and the preset encryption algorithm is adopted, the asset provider encrypts the sum of the asset borrowing upper limit and the key corresponding to the asset borrowing upper limit to generate first limiting asset borrowing data. In this embodiment, the first asset borrowing data and the first limiting asset borrowing data are generated in a double encryption manner, so that the first asset borrowing data and the first limiting asset borrowing data are prevented from being leaked in the transmission process, and the data confidentiality is improved.
The steps shown in fig. 6 may also be performed after the asset borrowing sends an asset borrowing request to the asset provider. Fig. 6 shows a fourth flowchart of a blockchain-based asset processing method according to the embodiment of the present application, as shown in fig. 6, further includes, after step S11:
s21, the asset borrower receives asset borrowing data sent by the asset provider.
After the asset borrowing requests are sent to the asset provider, the asset provider can also send asset borrowing data to the asset provider, wherein the asset borrowing data comprises first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data is ciphertext data of a first asset borrowing amount, and the first limiting asset borrowing data is ciphertext data of an upper limit of asset borrowing set by the asset provider to the asset borrowing party.
S22, the asset borrower generates asset borrowing evidence according to the liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset provider for the asset borrower.
And decrypting the first asset borrowing data and the first limiting asset borrowing data by adopting an adaptive decryption algorithm to obtain a first asset borrowing amount and an upper asset borrowing limit set by the asset provider for the asset borrowing party, and generating an asset borrowing evidence according to the liability data, the first asset borrowing amount and the upper asset borrowing limit set by the asset provider for the asset borrowing party, wherein the sum of the liability data and the first asset borrowing amount is smaller than or equal to the upper asset borrowing limit set by the asset provider for the asset borrowing party.
In the asset processing method based on the blockchain of the embodiment, the asset borrower receives asset borrowing data sent by the asset provider, and the asset borrower generates asset borrowing evidence according to the liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset provider for the asset borrower. In this implementation, the asset borrower generates asset borrowing evidence based on liability data, facilitating verification of the asset borrowing evidence by the subsequent blockchain.
Optionally, before the asset borrowing sends the verification request of the asset borrowing certificate to any node on the blockchain, the second asset borrowing amount stored in the asset borrower may be encrypted to obtain second asset borrowing data, which is described below with reference to fig. 7, fig. 7 shows a fifth flowchart of the asset processing method based on the blockchain, as shown in fig. 7, before step S12, further includes:
and S31, encrypting the second asset borrowing amount stored in the asset borrower by adopting a preset encryption algorithm to obtain second asset borrowing data.
The second asset borrowing amount stored in the asset borrower may be an asset borrowing amount stored in the asset borrower itself and requesting to borrow from the asset provider, and the second asset borrowing amount may be the first asset borrowing amount or may be different from the first asset borrowing amount. And the asset borrower encrypts the second asset borrowing amount by adopting a preset encryption algorithm to obtain second asset borrowing data.
Specifically, the second asset borrowing amount and the sum of the keys corresponding to the second asset borrowing amount are encrypted to generate second asset borrowing data, and the key corresponding to the second asset borrowing amount may be a unique key corresponding to the second asset borrowing amount, for example, may be a 256-bit value.
The verification request also includes second asset borrowing data, so that any node on the blockchain can perform matching verification on the second asset borrowing data.
Correspondingly, the asset borrower can also adopt a preset encryption algorithm to encrypt the upper limit of the asset borrowing set by the asset provider stored in the asset borrower to obtain second limit asset borrowing data.
The upper limit of the asset borrowing set by the asset provider for the asset borrower, which is stored in the asset borrower, may be the upper limit of the asset borrowing set by the asset provider stored in the asset borrower for the asset borrower, and the upper limit of the asset borrowing set by the asset provider for the asset borrower, which is stored in the asset borrower, may be the same as or different from the upper limit of the asset borrowing set by the asset provider for the asset borrower.
Specifically, the sum of the upper limit of the asset borrowing set by the asset provider for the asset borrower and the key corresponding to the upper limit of the asset borrowing set by the asset provider for the asset borrower stored in the asset borrower is encrypted to generate second limit asset borrowing data, and the key corresponding to the second limit asset borrowing amount may be a unique key corresponding to the upper limit of the asset borrowing set by the asset provider for the asset borrower stored in the asset borrower, for example, may be a 256-bit value.
The verification request also includes second limited asset borrowing data, so that any node on the blockchain can perform matching verification on the second limited asset borrowing data.
Taking a Hash encryption algorithm as an example, the second asset borrowing data is Hash (the second asset borrowing amount+a key corresponding to the second asset borrowing amount), and the second limiting asset borrowing data is Hash (an asset borrowing upper limit set by an asset provider for the asset borrower stored in the asset borrower+a key corresponding to the asset borrowing upper limit set by the asset provider for the asset borrower stored in the asset borrower).
Optionally, step S12 may further include:
S32, encrypting the liability amount by adopting a preset encryption algorithm to obtain liability data.
Because the liability data can be plaintext data, in order to improve confidentiality in the data transmission process, the asset borrower can also adopt a preset encryption algorithm to encrypt the liability amount to obtain liability data, and the verification request comprises the liability data, so that after the verification request is sent to any node on the blockchain, any node on the blockchain can adopt an adaptive decryption algorithm to encrypt the liability amount, and the liability amount is matched and verified according to the actual liability data.
Wherein the liability amount is the borrowed resource yield borrowed by all the asset providers before the present borrowing.
Specifically, the liability amount and the sum of keys corresponding to the liability amount are encrypted to generate liability data, and the key corresponding to the liability amount may be a unique key corresponding to the amount, for example, may be a 256-bit value.
Taking a Hash encryption algorithm as an example, liability data is Hash (liability amount+a key corresponding to liability amount).
According to the asset processing method based on the blockchain, a preset encryption algorithm is adopted, an asset borrower encrypts second asset borrowing amounts stored in the asset borrower to obtain second asset borrowing data, and the asset borrower encrypts liability amounts to obtain liability data by adopting the preset encryption algorithm. In this embodiment, the confidentiality of data transmission can be improved by encrypting the data.
FIG. 8 shows an interactive flowchart II of a blockchain-based asset processing method provided by an embodiment of the present application, as shown in FIG. 8, the method includes:
s41, an asset borrowing transmits an asset return request to an asset provider, and acquires the residual asset return data of the asset borrowed to the asset provider.
In the process of returning the asset, the asset borrower can send an asset returning request to the asset provider, wherein the asset returning request comprises a first asset returning amount for requesting the asset provider to return, and correspondingly, the asset provider receives the asset returning request sent by the asset borrower, and the first asset returning amount can be 20 ten thousand, for example.
The asset borrower may further obtain remaining return data of the asset borrowed from the asset provider, the remaining return data of the asset being a total borrowed amount of the asset borrowed from the asset provider minus the first remaining return amount of the asset.
S42, the asset borrowing transmits a verification request of asset return proof to any node on the block chain.
The asset borrowing transmits a verification request of the asset return proof to any node on the blockchain, wherein the verification request of the asset return proof comprises the residual asset return data, and correspondingly, any node on the blockchain receives the verification request of the asset return proof transmitted by the asset borrower.
The verification request of the asset return proof is used for requesting any node on the blockchain to verify the asset return proof of the asset borrower, that is, any node on the blockchain can only inform the asset provider to deduct the asset borrowing amount of the asset borrower after the asset return proof provided by the asset borrower passes the verification.
The asset residual return data can be plaintext data or ciphertext data obtained by encrypting the asset residual return quantity obtained by subtracting the first asset return quantity from the total asset return quantity by adopting a preset encryption algorithm by an asset borrower, wherein the preset encryption algorithm can be a Hash (Hash) encryption algorithm, so that confidentiality of the asset residual return data in a transmission process is improved, and leakage of the asset residual return data is prevented.
S43, the asset provider encrypts the first asset return amount by adopting a preset encryption algorithm, generates asset return check data, and transmits the asset return check data to any node on the blockchain.
The asset return request includes a first asset return amount that the asset borrowing direction requests to return to the asset provider, so when the asset provider receives the asset return request, a preset encryption algorithm may be adopted to encrypt the first asset return amount to generate asset return check data, optionally, the asset provider may encrypt a sum of keys corresponding to the first asset return amount and the first asset return amount to generate the asset return check data, taking the preset encryption algorithm as a Hash encryption algorithm as an example, and the asset return data is Hash (the first asset return amount+a key corresponding to the first asset return amount).
The asset provider also transmits asset return verification data to any node on the blockchain to enable any node on the blockchain to verify the asset return proof transmitted by the asset borrower according to the asset return verification data transmitted by the asset provider.
Correspondingly, any node on the blockchain receives asset return check data sent by an asset provider, wherein the asset return check data is ciphertext data of a first asset return amount required to be returned by the asset provider by asset borrowing.
And S44, any node on the blockchain verifies the asset return evidence according to the asset return verification data to obtain an asset return verification result, and feeds back the asset return verification result to the asset provider.
Any node on the blockchain verifies the asset return evidence according to the received asset return verification data to obtain an asset return verification result, and it is required to be noted that the asset return verification data further comprises a transaction identifier corresponding to the first asset return amount, so that any node on the blockchain can inquire and determine the actual total asset borrowing amount of the asset borrowing party lending to the asset provider according to the transaction identifier corresponding to the first asset return amount, and subtract the first asset return amount from the actual total asset borrowing amount to obtain the actual residual asset return amount, wherein the transaction identifier corresponding to the first asset return amount can be the identifier of the asset borrowing party lending to the asset provider.
Optionally, the asset return proof is used to prove that the sum of the remaining return data of the asset stored in the asset borrower and the first return amount is equal to the total amount of borrowed asset that the asset borrower borrows to the asset provider.
The remaining return data of the asset stored in the asset borrower may be, for example, 90 ten thousand of remaining return data of the asset borrowed from the asset provider set by the asset borrower, and the total borrowing amount of the asset borrowed from the asset borrower stored in the asset borrower to the asset provider may be, for example, 100 ten thousand of total borrowing amount of the asset borrowed from the asset provider set by the asset borrower.
Optionally, any node on the blockchain may adopt a zero knowledge proof algorithm, generate a check return proof according to the total borrowing amount of the actual asset, the remaining return amount of the actual asset and the first asset return amount, and verify the asset return proof according to the check return proof to obtain a first return verification result, where the check return proof is used for characterizing that the sum of the remaining return amount of the actual asset and the first asset return amount is equal to the total borrowing amount of the actual asset. That is, it is verified whether the constraint relation between the remaining return data of the asset stored in the asset borrower, the first return amount, and the total borrowed amount of the asset borrowed from the asset borrower to the asset provider is identical to the constraint relation between the remaining return amount of the actual asset, the first return amount of the asset, and the total borrowed amount of the actual asset.
The asset return verification result comprises a first return verification result, if the first return verification result indicates that the verification is passed, the asset return verification result indicates that the verification is passed, if the first return verification result indicates that the verification is not passed, the asset return verification result indicates that the verification is not passed, and if the verification is not passed, the asset residual return data stored in the asset borrower and/or the total asset borrowing amount stored in the asset borrower provided by the asset borrower are tampered.
Optionally, the verifying the asset return proof by any node on the blockchain according to the asset return verification data may further include: and carrying out matching verification on the total borrowing amount of the asset stored in the asset borrower according to the total borrowing amount of the asset to obtain a second return verification result, carrying out matching verification on the residual return data of the asset stored in the asset borrower according to the residual return amount of the actual asset to obtain a third return verification result, if the first return verification result, the second return verification result and the third return verification result indicate that all verification passes, indicating that the verification passes by the asset return verification result, and if at least one of the first return verification result, the second return verification result and the third return verification result indicates that the verification does not pass by the asset return verification result, indicating that the verification does not pass by the asset return verification result.
The verification request of the asset return proof may further include ciphertext data of the second asset return amount stored in the asset borrower, so that any node on the blockchain may perform matching verification on the second asset return amount according to the first asset return amount to obtain a fourth return verification result, if the first return verification result, the second return verification result, the third return verification result and the fourth return verification result indicate that all verification passes, the asset return verification result indicates that verification passes, and if any one of the first return verification result, the second return verification result, the third return verification result and the fourth return verification result indicates that verification does not pass, the asset return verification result indicates that verification does not pass.
Any node on the blockchain can also feed back an asset return verification result to the asset provider, and correspondingly, the asset provider receives the asset return verification result sent by any node on the blockchain, and if the asset return verification result indicates that verification is passed, the method can further comprise:
the asset provider updates asset data of the account of the asset borrower based on the first asset return amount.
If the asset return verification result indicates that the verification is passed, the sum of the total asset return data and the residual asset borrowing amount is equal to the total asset borrowing amount, and the asset borrowing party can perform return service, the asset provider can update the asset data of the account of the asset borrowing party according to the first asset return amount, namely, the account of the asset borrowing party is updated according to the difference between the total asset borrowing amount and the first asset return amount.
According to the asset processing method based on the blockchain, an asset borrowing transmits an asset return request to an asset provider, the asset borrowing transmits an asset return verification request to any node on the blockchain, the asset provider encrypts a first asset return amount by adopting a preset encryption algorithm to generate asset return verification data, any node on the blockchain transmits the asset return data to any node on the blockchain, any node on the blockchain verifies the asset return verification according to the asset return verification data to obtain an asset return verification result, and the asset return verification result is fed back to the asset provider. In this embodiment, the asset provider only knows the asset lending situation with the asset borrower, prevents the leakage of other lending situations of the asset borrower, and prevents the asset borrower from falsifying the return data through the blockchain node verification.
Fig. 9 shows a schematic structural diagram of a blockchain-based asset processing device provided in an embodiment of the present application, i.e., the blockchain-based asset processing device 50 is integrated on a blockchain node device. As shown in fig. 9, the blockchain-based asset processing device 50 includes:
a receiving module 51, configured to receive asset borrowing verification data sent by an asset provider; the asset borrowing verification data comprise first asset borrowing data and first limiting asset borrowing data, wherein the first asset borrowing data are ciphertext data of a first asset borrowing amount requested to be borrowed by an asset provider, and the first limiting asset borrowing data are ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrower;
The receiving module 51 is configured to receive a verification request of an asset borrowing proof sent by the asset borrower, where the verification request includes liability data of the asset borrower;
and the processing module 52 is configured to verify the asset borrowing proof according to the asset borrowing verification data, obtain an asset borrowing verification result, and feed back the asset borrowing verification result to the asset provider.
Optionally, the asset borrowing proof is used for proving that a sum of the liability data and the first asset borrowing amount is less than or equal to the asset borrowing upper limit.
Optionally, the asset borrowing verification data further includes a transaction identifier corresponding to the first asset borrowing data.
Optionally, the processing module 52 is specifically configured to:
acquiring actual liability data of the asset borrower;
generating a check borrowing proof according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower by adopting a zero knowledge proof algorithm, wherein the check borrowing proof is used for representing that the sum of the actual liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset borrower;
And carrying out matching verification on the asset borrowing proof according to the verification borrowing proof to obtain a first verification result, wherein the asset borrowing verification result comprises the first verification result.
Optionally, the processing module 52 is specifically configured to:
and carrying out matching verification on the liability data according to the actual liability data to obtain a second verification result, wherein the asset borrowing verification result also comprises the second verification result.
Optionally, the verification request further includes second asset borrowing data, where the second asset borrowing data is ciphertext data of a second asset borrowing amount stored in the asset borrower;
the processing module 52 is specifically configured to:
and carrying out matching verification on the second asset borrowing data according to the first asset borrowing data to obtain a third verification result, wherein the asset borrowing verification result further comprises the third verification result.
Optionally, the verification request further includes second limiting asset borrowing data, where the second limiting asset borrowing data is ciphertext data stored in the asset borrower and set by the asset provider for an upper limit of asset borrowing set by the asset provider;
the processing module 52 is specifically configured to:
And carrying out matching verification on the second limit asset borrowing data according to the first limit asset borrowing data to obtain a fourth verification result, wherein the asset borrowing verification result further comprises the fourth verification result.
Optionally, the receiving module 51 is further configured to receive asset return checking data sent by the asset provider, where the asset return checking data is ciphertext data of a first asset return amount that the asset borrows to request return from the asset provider;
receiving a verification request of an asset return certificate sent by the asset borrower, wherein the verification request of the asset return certificate comprises asset residual return data borrowed by the asset borrower to the asset provider;
the processing module 52 is further configured to:
and verifying the asset return certification according to the asset return verification data to obtain an asset return verification result, and feeding back the asset return verification result to the asset provider.
Optionally, the asset return proof is used to prove that a sum of the asset remaining return data stored in the asset borrower and the first return amount is equal to a total amount of assets borrowed by the asset borrower stored in the asset borrower to the asset provider.
The implementation process and implementation principle of the asset processing device based on blockchain in this embodiment may refer to the method executed by the blockchain node device, and this step is described in detail herein.
Fig. 10 shows a second schematic structural diagram of a blockchain-based asset processing device provided in an embodiment of the present application, where the blockchain-based asset processing device 60 is integrated on an asset provider device. As shown in fig. 10, the blockchain-based asset processing device 60 includes:
a receiving module 61, configured to receive an asset borrowing request sent by an asset borrowing party, where the asset borrowing request includes a first asset borrowing amount that the asset borrowing party requests to borrow from the asset provider;
an obtaining module 62, configured to obtain an upper limit of asset borrowing set by the asset provider for the asset borrower;
the processing module 63 is configured to encrypt the first asset borrowing amount by using a preset encryption algorithm to generate first asset borrowing data; encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data; generating asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and sending the asset borrowing verification data to any node on a block chain;
The receiving module 61 is configured to receive an asset borrowing verification result sent by any node on the blockchain, where the asset borrowing verification result is obtained by verifying an asset borrowing proof of the asset borrower by any node on the blockchain using the asset borrowing verification data.
Optionally, the processing module 63 is further configured to:
and if the asset borrowing verification result indicates that the verification is passed, updating the asset data of the account of the asset borrower according to the first asset borrowing amount.
Optionally, the processing module 63 is specifically configured to:
encrypting the first asset borrowing amount and the sum of keys corresponding to the first asset borrowing amount by adopting the preset encryption algorithm to generate first asset borrowing data;
and encrypting the sum of the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by adopting the preset encryption algorithm to generate the first limit asset borrowing data.
Optionally, the receiving module 61 is further configured to:
receiving an asset return request sent by the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
The processing module 63 is further configured to:
encrypting the first asset return amount by adopting a preset encryption algorithm, generating asset return check data, and transmitting the asset return check data to any node on the blockchain;
the receiving module 61 is further configured to:
and receiving an asset return verification result sent by any node on the block chain, wherein the asset return verification result is obtained by verifying asset return evidence of the asset borrower by any node on the block chain by adopting the asset return verification data.
Optionally, the processing module 63 is further configured to:
and if the asset return verification result indicates that the verification is passed, updating asset data of the account of the asset borrower according to the first asset return amount.
The implementation process and implementation principle of the asset processing device based on blockchain in this embodiment may refer to the method executed by the asset provider device, and this step is repeated herein.
Fig. 11 illustrates a third structural diagram of a blockchain-based asset processing device provided in an embodiment of the present application, where the blockchain-based asset processing device 70 is integrated on an asset borrower apparatus. As shown in fig. 11, the blockchain-based asset processing device 70 includes:
A first sending module 71, configured to send an asset borrowing request to an asset provider, and an obtaining module, configured to obtain liability data of the asset borrower, where the asset borrowing request includes a first asset borrowing amount that the asset borrowing request requests to borrow from the asset provider;
a second sending module 72 is configured to send a verification request for asset borrowing proof to any node on the blockchain, where the verification request includes liability data of the asset borrower.
Optionally, the apparatus further comprises:
a receiving module 73, configured to receive asset borrowing data sent by the asset provider, where the asset borrowing data includes first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data is ciphertext data of the first asset borrowing amount, and the first limiting asset borrowing data is ciphertext data of an upper limit of asset borrowing set by the asset provider for the asset borrowing party;
and the processing module 74 is configured to generate the asset borrowing proof according to the liability data, the first asset borrowing amount and an asset borrowing upper limit set by the asset provider for the asset borrower, where the asset borrowing proof is used to prove that a sum of the liability data and the first asset borrowing amount is less than or equal to the asset borrowing upper limit set by the asset provider for the asset borrower.
Optionally, the processing module 74 is further configured to:
encrypting the liability amount by adopting a preset encryption algorithm to obtain the liability data, wherein the verification request comprises the liability data.
Optionally, the apparatus further comprises:
a third sending module 75, configured to send an asset return request to the asset provider, and obtain remaining asset return data of the asset borrower, where the asset return request includes a first asset return amount that the asset borrower requests to return to the asset provider;
and sending a verification request of asset return certification to any node on the blockchain, wherein the verification request of asset return certification comprises the residual return data of the asset.
The implementation process and implementation principle of the asset processing device based on the blockchain in this embodiment may refer to the method executed by the asset borrower device, and this step is described in detail herein.
Fig. 12 illustrates a schematic structural diagram of a blockchain node device provided in an embodiment of the present application, and as shown in fig. 12, the blockchain node device 300 includes: the block chain node device 300 comprises a processor 81, a memory 82 and a bus 83, wherein the memory 82 stores program instructions executable by the processor 81, when the block chain node device 300 is running, the processor 81 and the memory 82 communicate through the bus 83, and the processor 81 executes the program instructions to execute the method executed by the block chain node device 300.
Fig. 13 shows a schematic structural diagram of an asset provider device provided in an embodiment of the present application, as shown in fig. 13, the asset provider device 100 includes: a processor 91, a memory 92 and a bus 93, said memory 92 storing program instructions executable by said processor 91, said processor 91 and said memory 92 communicating via the bus 93 when the asset provider device 100 is running, said processor 91 executing said program instructions to perform a method performed by the asset provider device 100 when executed.
Fig. 14 shows a schematic structural diagram of an asset borrower device provided in an embodiment of the present application, as shown in fig. 14, where the asset borrower device 200 includes a processor 210, a memory 220, and a bus 230, where the memory 220 stores program instructions executable by the processor 210, and when the asset borrower device 200 is running, the processor 210 communicates with the memory 220 through the bus 230, and the processor 210 executes the program instructions to execute a method executed by the asset borrower device 200.
The present application also provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the above-described method embodiments.
It will be clearly understood by those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system and apparatus may refer to corresponding procedures in the method embodiments, which are not described in detail in this application. In the several embodiments provided in this application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. The above-described apparatus embodiments are merely illustrative, and the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, and for example, multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be through some communication interface, indirect coupling or communication connection of devices or modules, electrical, mechanical, or other form.
In addition, each functional unit in each embodiment of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The functions, if implemented in the form of software functional units and sold or used as a stand-alone product, may be stored in a computer-readable storage medium. Based on this understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art or in a part of the technical solution, in the form of a software product stored in a storage medium, comprising several instructions for causing a computer device (which may be a personal computer, a server, a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
The foregoing is merely a specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any person skilled in the art can easily think about changes or substitutions within the technical scope of the present application, and the changes or substitutions are covered in the protection scope of the present application.

Claims (25)

1. A blockchain-based asset processing method, for any node on a blockchain, the method comprising:
receiving asset borrowing verification data sent by an asset provider; the asset borrowing verification data comprise first asset borrowing data and first limiting asset borrowing data, wherein the first asset borrowing data are ciphertext data of a first asset borrowing amount requested to be borrowed by an asset provider, and the first limiting asset borrowing data are ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrower;
receiving a verification request of an asset borrowing certificate sent by the asset borrower, wherein the verification request comprises liability data of the asset borrower;
verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feeding back the asset borrowing verification result to the asset provider;
And verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, wherein the method comprises the following steps of:
acquiring actual liability data of the asset borrower;
and carrying out matching verification on the liability data according to the actual liability data to obtain a second verification result, wherein the asset borrowing verification result also comprises the second verification result.
2. The method of claim 1, wherein the asset borrowing proof is used to prove that a sum of the liability data and the first asset borrowing amount is less than or equal to the upper asset borrowing limit.
3. The method of claim 1, wherein the asset borrowing verification data further comprises a transaction identifier corresponding to the first asset borrowing data.
4. The method of claim 2, wherein verifying the asset borrowing proof based on the asset borrowing verification data results in an asset borrowing verification result, comprising:
acquiring actual liability data of the asset borrower;
generating a check borrowing proof according to the actual liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset borrower by adopting a zero knowledge proof algorithm, wherein the check borrowing proof is used for representing that the sum of the actual liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset borrower;
And carrying out matching verification on the asset borrowing proof according to the verification borrowing proof to obtain a first verification result, wherein the asset borrowing verification result comprises the first verification result.
5. The method of claim 1 wherein the validation request further includes second asset borrowing data, the second asset borrowing data being ciphertext data of a second asset borrowing amount stored on the asset borrower;
and verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and further comprising:
and carrying out matching verification on the second asset borrowing data according to the first asset borrowing data to obtain a third verification result, wherein the asset borrowing verification result further comprises the third verification result.
6. The method of claim 5 wherein the validation request further includes second limit asset borrowing data, the second limit asset borrowing data being ciphertext data stored in the asset borrower for an upper limit of asset borrowing set by the asset provider for the asset borrower;
and verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and further comprising:
And carrying out matching verification on the second limit asset borrowing data according to the first limit asset borrowing data to obtain a fourth verification result, wherein the asset borrowing verification result further comprises the fourth verification result.
7. The method according to claim 1, wherein the method further comprises:
receiving asset return check data sent by the asset provider, wherein the asset return check data is ciphertext data of a first asset return amount required to be returned by the asset provider by the asset borrower;
receiving a verification request of an asset return certificate sent by the asset borrower, wherein the verification request of the asset return certificate comprises asset residual return data borrowed by the asset borrower to the asset provider;
and verifying the asset return certification according to the asset return verification data to obtain an asset return verification result, and feeding back the asset return verification result to the asset provider.
8. The method of claim 7 wherein the asset return proof is used to prove that a sum of the asset remaining return data stored at the asset borrower and the first asset return amount is equal to a total amount of assets borrowed from the asset borrower to the asset provider stored at the asset borrower.
9. A blockchain-based asset processing method, for application to an asset provider, the method comprising:
receiving an asset borrowing request sent by an asset borrower, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset borrower to the asset provider;
acquiring an upper limit of asset borrowing set by the asset provider for the asset borrower;
encrypting the first asset borrowing amount by adopting a preset encryption algorithm to generate first asset borrowing data;
encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data;
generating asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and sending the asset borrowing verification data to any node on a block chain;
receiving an asset borrowing verification result sent by any node on the blockchain, wherein the asset borrowing verification result is obtained by verifying an asset borrowing proof of the asset borrowing party by any node on the blockchain through the asset borrowing verification data, the asset borrowing party is used for sending a verification request of the asset borrowing proof to any node on the blockchain, the verification request comprises liability data of the asset borrowing party, and the asset borrowing verification result comprises: and the second verification result is obtained by any node on the blockchain obtaining actual liability data of the asset borrower and carrying out matching verification on the liability data according to the actual liability data.
10. The method according to claim 9, wherein the method further comprises:
and if the asset borrowing verification result indicates that the verification is passed, updating the asset data of the account of the asset borrower according to the first asset borrowing amount.
11. The method of claim 9, wherein encrypting the first asset borrowing amount using a predetermined encryption algorithm to generate first asset borrowing data comprises:
encrypting the first asset borrowing amount and the sum of keys corresponding to the first asset borrowing amount by adopting the preset encryption algorithm to generate first asset borrowing data;
the encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data comprises the following steps:
and encrypting the sum of the upper limit of the asset borrowing and the key corresponding to the upper limit of the asset borrowing by adopting the preset encryption algorithm to generate the first limit asset borrowing data.
12. The method according to claim 9, wherein the method further comprises:
receiving an asset return request sent by the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
Encrypting the first asset return amount by adopting a preset encryption algorithm, generating asset return check data, and transmitting the asset return check data to any node on the blockchain;
and receiving an asset return verification result sent by any node on the block chain, wherein the asset return verification result is obtained by verifying asset return evidence of the asset borrower by any node on the block chain by adopting the asset return verification data.
13. The method according to claim 12, wherein the method further comprises:
and if the asset return verification result indicates that the verification is passed, updating asset data of the account of the asset borrower according to the first asset return amount.
14. A blockchain-based asset processing method, for use with an asset borrower, the method comprising:
sending an asset borrowing request to an asset provider and obtaining liability data of the asset borrowing party, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset provider, the asset provider is used for obtaining an asset borrowing upper limit set by the asset provider for the asset borrowing party, a preset encryption algorithm is adopted to encrypt the first asset borrowing amount to generate first asset borrowing data, the preset encryption algorithm is adopted to encrypt the asset borrowing upper limit to generate first limit asset borrowing data, asset borrowing verification data are generated according to the first asset borrowing data and the first limit asset borrowing data, and the asset borrowing verification data are sent to any node on a block chain;
Sending a verification request of an asset borrowing proof to any node on a blockchain, wherein the verification request comprises liability data of the asset borrower, so that any node on the blockchain verifies the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feeds back the asset borrowing verification result to the asset provider, and the asset borrowing verification result comprises: and the second verification result is obtained by any node on the blockchain obtaining actual liability data of the asset borrower and carrying out matching verification on the liability data according to the actual liability data.
15. The method of claim 14, wherein after sending the asset borrowing request to the asset provider, the method further comprises:
receiving asset borrowing data sent by the asset provider, wherein the asset borrowing data comprises first asset borrowing data and first limiting asset borrowing data, the first asset borrowing data is ciphertext data of the first asset borrowing amount, and the first limiting asset borrowing data is ciphertext data of an upper asset borrowing limit set by the asset provider for the asset borrowing party;
And generating the asset borrowing proof according to the liability data, the first asset borrowing amount and the asset borrowing upper limit set by the asset provider for the asset borrower, wherein the asset borrowing proof is used for proving that the sum of the liability data and the first asset borrowing amount is smaller than or equal to the asset borrowing upper limit set by the asset provider for the asset borrower.
16. The method of claim 14, wherein prior to the sending the validation request of the asset borrowing proof to any node on the blockchain, further comprising:
and encrypting the second asset borrowing amount stored in the asset borrower by adopting a preset encryption algorithm to obtain second asset borrowing data, wherein the verification request also comprises the second asset borrowing data.
17. The method of claim 16, wherein prior to the sending the validation request of the asset borrowing proof to any node on the blockchain, further comprising:
encrypting the liability amount by adopting a preset encryption algorithm to obtain the liability data, wherein the verification request comprises the liability data.
18. The method of claim 14, wherein the method further comprises:
An asset return request sent to the asset provider and acquiring the residual asset return data of the asset borrower, wherein the asset return request comprises a first asset return amount of the asset borrower requesting return to the asset provider;
and sending a verification request of asset return certification to any node on the blockchain, wherein the verification request of asset return certification comprises the residual return data of the asset.
19. A blockchain-based asset processing device, comprising:
the receiving module is used for receiving asset borrowing verification data sent by the asset provider; the asset borrowing verification data comprise first asset borrowing data and first limiting asset borrowing data, wherein the first asset borrowing data are ciphertext data of a first asset borrowing amount requested to be borrowed by an asset provider, and the first limiting asset borrowing data are ciphertext data of an asset borrowing upper limit set by the asset provider for the asset borrower;
the receiving module is used for receiving a verification request of the asset borrowing evidence sent by the asset borrower, and the verification request comprises liability data of the asset borrower;
The processing module is used for verifying the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feeding back the asset borrowing verification result to the asset provider;
the processing module is specifically configured to:
acquiring actual liability data of the asset borrower;
and carrying out matching verification on the liability data according to the actual liability data to obtain a second verification result, wherein the asset borrowing verification result also comprises the second verification result.
20. A blockchain-based asset processing device, comprising:
the receiving module is used for receiving an asset borrowing request sent by an asset borrowing party, wherein the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by an asset provider by the asset borrowing party;
the acquisition module is used for acquiring an upper limit of asset borrowing set by the asset provider for the asset borrower;
the processing module is used for encrypting the first asset borrowing amount by adopting a preset encryption algorithm to generate first asset borrowing data; encrypting the asset borrowing upper limit by adopting the preset encryption algorithm to generate first limit asset borrowing data; generating asset borrowing verification data according to the first asset borrowing data and the first limiting asset borrowing data, and sending the asset borrowing verification data to any node on a block chain;
The receiving module is configured to receive an asset borrowing verification result sent by any node on the blockchain, where the asset borrowing verification result is obtained by verifying an asset borrowing proof of the asset borrower by any node on the blockchain using the asset borrowing verification data, and the asset borrower is configured to send a verification request of the asset borrowing proof to any node on the blockchain, where the verification request includes liability data of the asset borrower, and the asset borrowing verification result includes: and the second verification result is obtained by any node on the blockchain obtaining actual liability data of the asset borrower and carrying out matching verification on the liability data according to the actual liability data.
21. A blockchain-based asset processing device, comprising:
the system comprises a first sending module, an acquisition module and a block chain, wherein the first sending module is used for sending an asset borrowing request to an asset provider, the acquisition module is used for acquiring liability data of the asset borrowing party, the asset borrowing request comprises a first asset borrowing amount which is requested to be borrowed by the asset provider, the asset provider is used for acquiring an asset borrowing upper limit set by the asset provider for the asset borrowing party, a preset encryption algorithm is adopted for encrypting the first asset borrowing amount to generate first asset borrowing data, the preset encryption algorithm is adopted for encrypting the asset borrowing upper limit to generate first limit asset borrowing data, asset borrowing verification data are generated according to the first asset borrowing data and the first limit asset borrowing data, and the asset borrowing verification data are sent to any node on the block chain;
The second sending module is configured to send a verification request of an asset borrowing proof to any node on a blockchain, where the verification request includes liability data of the asset borrower, so that any node on the blockchain verifies the asset borrowing proof according to the asset borrowing verification data to obtain an asset borrowing verification result, and feed back the asset borrowing verification result to the asset provider, where the asset borrowing verification result includes: and the second verification result is obtained by any node on the blockchain obtaining actual liability data of the asset borrower and carrying out matching verification on the liability data according to the actual liability data.
22. A block link point apparatus, comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor and the memory in communication over the bus when the block link point device is running, the processor executing the program instructions to perform the method of any one of claims 1-8.
23. An asset provider apparatus, comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor and the memory in communication over the bus when the asset provider device is running, the processor executing the program instructions to perform the method of any of claims 9-13.
24. An asset borrower apparatus, comprising: a processor, a memory and a bus, the memory storing program instructions executable by the processor, the processor in communication with the memory via the bus when the asset borrower device is operating, the processor executing the program instructions to perform the method of any of claims 14-18.
25. A computer readable storage medium, characterized in that the computer readable storage medium has stored thereon a computer program which, when executed by a processor, performs the method according to any of claims 1-18.
CN202110064696.4A 2021-01-18 2021-01-18 Asset processing method, device, equipment and storage medium based on blockchain Active CN112818384B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110064696.4A CN112818384B (en) 2021-01-18 2021-01-18 Asset processing method, device, equipment and storage medium based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110064696.4A CN112818384B (en) 2021-01-18 2021-01-18 Asset processing method, device, equipment and storage medium based on blockchain

Publications (2)

Publication Number Publication Date
CN112818384A CN112818384A (en) 2021-05-18
CN112818384B true CN112818384B (en) 2023-07-04

Family

ID=75869740

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110064696.4A Active CN112818384B (en) 2021-01-18 2021-01-18 Asset processing method, device, equipment and storage medium based on blockchain

Country Status (1)

Country Link
CN (1) CN112818384B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730186A (en) * 2019-10-22 2020-01-24 全链通有限公司 Token issuing method, accounting node and medium based on block chain
CN111147460A (en) * 2019-12-16 2020-05-12 重庆邮电大学 Block chain-based cooperative fine-grained access control method
CN111292180A (en) * 2020-03-09 2020-06-16 江苏荣泽信息科技股份有限公司 Bank loan management system based on block chain

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201803706D0 (en) * 2018-03-08 2018-04-25 Nchain Holdings Ltd Computer-implemented system and method
US20200265515A1 (en) * 2019-02-14 2020-08-20 Dlcc, Llc Framework for digital asset lending and hedging using stable coin
US20200175509A1 (en) * 2019-06-28 2020-06-04 Alibaba Group Holding Limited Transferring method and system based on blockchain smart contract

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110730186A (en) * 2019-10-22 2020-01-24 全链通有限公司 Token issuing method, accounting node and medium based on block chain
CN111147460A (en) * 2019-12-16 2020-05-12 重庆邮电大学 Block chain-based cooperative fine-grained access control method
CN111292180A (en) * 2020-03-09 2020-06-16 江苏荣泽信息科技股份有限公司 Bank loan management system based on block chain

Also Published As

Publication number Publication date
CN112818384A (en) 2021-05-18

Similar Documents

Publication Publication Date Title
EP3685334B1 (en) Improving integrity of communications between blockchain networks and external data sources
CN112950367B (en) Method and device for generating and executing intelligent contract transaction
US11888974B1 (en) Secret sharing information management and security system
US9647845B2 (en) Key downloading method, management method, downloading management method, device and system
CN111654367B (en) Method for cryptographic operation and creation of working key, cryptographic service platform and device
US9547769B2 (en) Data protection hub
CN110348853B (en) Block chain off-line transaction method and system based on identification authentication
US20040165728A1 (en) Limiting service provision to group members
CN111160908B (en) Supply chain transaction privacy protection system, method and related equipment based on blockchain
CN115203749B (en) Data transaction method and system based on block chain
CN113010861B (en) Identity verification method and system in financing transaction based on block chain
CN111818186B (en) Information sharing method and system
CN108805574B (en) Transaction method and system based on privacy protection
CN111105235A (en) Supply chain transaction privacy protection system and method based on block chain and related equipment
CN112699353A (en) Financial information transmission method and financial information transmission system
CN109302286B (en) Fido equipment key index generation method
US20230327863A1 (en) Data management and encryption in a distributed computing system
CN115705601A (en) Data processing method and device, computer equipment and storage medium
CN114514550A (en) Partitioning requests into blockchains
KR102056612B1 (en) Method for Generating Temporary Anonymous Certificate
CN111510462A (en) Communication method, system, device, electronic equipment and readable storage medium
CN112818384B (en) Asset processing method, device, equipment and storage medium based on blockchain
CN115409511A (en) Personal information protection system based on block chain
CN116155483A (en) Block chain signing machine safety design method and signing machine
CN111861489A (en) Financial product transaction share determination method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant