CN113037827A - Voting method based on block chain, self-organization management method and computer equipment - Google Patents

Voting method based on block chain, self-organization management method and computer equipment Download PDF

Info

Publication number
CN113037827A
CN113037827A CN202110231094.3A CN202110231094A CN113037827A CN 113037827 A CN113037827 A CN 113037827A CN 202110231094 A CN202110231094 A CN 202110231094A CN 113037827 A CN113037827 A CN 113037827A
Authority
CN
China
Prior art keywords
voting
block chain
rule
information
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110231094.3A
Other languages
Chinese (zh)
Other versions
CN113037827B (en
Inventor
刘涛
于中阳
马博文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Jimu Galaxy Digital Technology Co ltd
Original Assignee
Shanghai Wangchain Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Wangchain Information Technology Co ltd filed Critical Shanghai Wangchain Information Technology Co ltd
Priority to CN202110231094.3A priority Critical patent/CN113037827B/en
Publication of CN113037827A publication Critical patent/CN113037827A/en
Application granted granted Critical
Publication of CN113037827B publication Critical patent/CN113037827B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/06Protocols specially adapted for file transfer, e.g. file transfer protocol [FTP]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The invention provides a voting method, a self-organizing management method and computer equipment based on a block chain, wherein the voting method comprises the steps of establishing a fabric block chain network supporting a cryptographic algorithm, and deploying an intelligent contract of a voting rule in the block chain; the application terminal initiates a voting request and checks parameter information of a voting interface according to the voting request; calling an intelligent contract to obtain a voting rule; carrying out service check on the voting request, and recording the voting behavior; and judging whether the voting is finished or not, counting voting results if the voting is finished, encrypting the voting result data according to a state cipher algorithm, and uploading the voting result data to a block chain for storage. By using the voting method, a block chain network (such as a super account book Fabric) supporting an intelligent contract is used as an operating environment, data chaining of a voting result is realized, voting data on the chain is credible, voting privacy is guaranteed, block chain storage symptoms are not reliable, and fairness, justness and credibility in the voting process are guaranteed.

Description

Voting method based on block chain, self-organization management method and computer equipment
Technical Field
The invention belongs to the technical field of data processing, and particularly relates to a voting method based on a block chain, a self-organization management method and computer equipment.
Background
The development of information technology brings great convenience to life, democrators are increasingly promoted in the current society, voting is a scheme which is often adopted in many activities such as unit election, project scheme selection, task acceptance and the like, and the common voting form comprises traditional voting and network voting. However, the voting process is usually performed by entrusting a third party, and the voting result is revealed by the third party, which causes that the voting privacy (anonymity), the voter identity information security and the voting reliability are difficult to be guaranteed to some extent, and are questioned by the public, the voting process cannot guarantee fairness and trustiness, the behavior of voting cheat easily occurs, and the functions of fully maintaining fairness, justice, guaranteeing group rights and interests, and the like are not achieved.
Disclosure of Invention
The present invention provides a voting method based on a block chain, so as to solve the above technical problems in the prior art.
In view of the above, in a first aspect, the present application provides a voting method based on a block chain, where the method includes:
creating a fabric block chain network supporting a state cipher algorithm, and deploying an intelligent contract of a voting rule in a block chain;
the application terminal initiates a voting request and verifies the parameter information of the voting interface according to the voting request;
calling an intelligent contract to obtain a voting rule;
performing service check on the voting request according to the obtained voting rule, and recording the voting behavior;
and judging whether the voting is finished or not, counting voting results if the voting is finished, encrypting the voting result data according to a state cipher algorithm, and uploading the voting result data to a block chain for storage.
Further, before the verifying the parameter information of the voting interface according to the voting request, after the application terminal initiates the voting request, the method further includes:
judging whether relevant personnel set a voting rule or not, and if not, calling an intelligent contract to initialize the voting rule; and if the voting rule exists and needs to be updated, calling the intelligent contract to update the voting rule.
Further, the step of counting the voting result if the voting is finished and uploading the statistical data of the voting result to a block chain for storage includes:
if the voting result is that the acceptance passes, the relevant personnel pay corresponding pass and upload the voting result to the block chain for storing the certificate;
and if the voting result is that the acceptance fails, uploading the voting result to a block chain for evidence storage to be used as a basis for managing and evaluating tasks, projects and organization members.
Further, the step of checking the parameter information of the voting interface according to the voting request includes:
judging whether the parameters in the voting request have key values, if so, checking to pass, and if not, checking not to pass; and the key value is key information for data encryption and decryption.
Further, the step of performing service check on the voting request according to the obtained voting rule includes:
judging whether the vote is from related personnel of the voting task based on the identity data, wherein the related personnel comprise a retriever, a publisher and an acceptance checker of the task;
judging whether the voting times of the related personnel of the voting task do not exceed a preset threshold value;
judging whether the voting time reaches a preset time limit of the voting effective time or not;
if the conditions are met, determining that the voting data meet the intelligent contract execution conditions; and if any one of the conditions is not met, determining that the voting data does not meet the voting intelligent contract execution condition.
Further, the intelligent contract comprises:
generating a composite key according to the related personnel Id and the voting rule type, and writing the key and the rule content into an account book in a key value pair form;
generating a composite key according to the related personnel Id and the voting rule type, and acquiring voting rule contents from the account book according to the key;
and generating a composite key according to the related personnel Id and the voting rule type, and acquiring a change record of the voting rule from the account book according to the key.
Further, the application end comprises a voting management module, a voting initiation module and a voting participation module;
the voting management module comprises the following alternatives: item type information, voting item initiation date, voting expiration date and voting item state;
the voting initiation module comprises the following alternatives: voting project name information, associated content information, attachment information, voting range information, voting time information and whether the voting is confidential options or not;
the voting participation module comprises the following alternatives: voting option information, screenable information, and the name of the voting item available for viewing, the status of the voting item, the expiration date of the vote, and the number of people who have participated in the vote.
Further, if the service check of the voting request is not passed according to the obtained voting rule, the step of initiating the voting request by the application terminal is executed again, and the parameter information of the voting interface is checked according to the voting request until the service check is passed;
and if the voting is not finished, re-executing the step that the application terminal initiates the voting request and checks the parameter information of the voting interface according to the voting request until the voting is finished.
In a second aspect, the present application provides a self-organizing management method, including: the system comprises a task issuing module, a task receiving module and a task acceptance module;
the release module releases task information through an application end and uploads the task information to the block chain;
the receiving module receives and completes the task information, and uploads the completed task information to a block chain for storage;
the acceptance module calls the information of the completed task and uploads an acceptance result to the block chain certificate storage,
if the issuing module and the receiving module have no objection to the checking and receiving result, the task issuer pays the pass certificate;
if the issuing module and the receiving module disagree with the acceptance result, the block chain voting method based on the block chain is executed to initiate the block chain voting according to any one of claims 1 to 8.
In a third aspect, the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the voting method when executing the computer program.
By adopting the technical scheme, compared with the prior art, the voting method, the self-organization management method and the computer equipment based on the block chain have the technical effects that:
creating a fabric block chain network supporting a state cipher algorithm, and deploying an intelligent contract of a voting rule in a block chain; the application terminal initiates a voting request and verifies the parameter information of the voting interface according to the voting request; calling an intelligent contract to obtain a voting rule; performing service check on the voting request according to the obtained voting rule, and recording the voting behavior; and judging whether the voting is finished or not, counting voting results if the voting is finished, encrypting the voting result data according to a state cipher algorithm, and uploading the voting result data to a block chain for storage. By utilizing the voting method, a block chain network (such as a super account book Fabric) supporting an intelligent contract is used as an operating environment, data chaining of voting results is realized, voting data on the chain is credible, voting privacy (anonymity) is guaranteed, identity security of voters is guaranteed, voting falsification is prevented, centralization is removed (a credible third party is not needed), and block chain storage symptoms are not repudiated, so that the doubt of the masses on the voting results is eliminated, the fairness, the justness and the credibility in the voting process are ensured, the trust of the masses in the voting process is enhanced, and the occurrence of bad voting cheating behaviors is greatly reduced.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a voting method based on a block chain according to a first embodiment of the present application;
fig. 2 is a schematic flowchart of creating a fabric blockchain network supporting the cryptographic algorithm in step S100;
fig. 3 is a flowchart illustrating an ad hoc management method according to a second embodiment of the present invention.
Detailed Description
The technical solutions of the present invention will be described clearly and completely with reference to the accompanying drawings, and it should be understood that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example one
The embodiment of the application provides a voting method based on a block chain, and by using the voting method, voting related personnel can vote by using intelligent contract, and voting results can be linked and stored, so that the privacy, the safety and the non-falsification of data can be guaranteed.
Specifically, as shown in fig. 1 and 2, the voting method includes:
s100, creating a fabric block chain network supporting a national cryptographic algorithm, and deploying an intelligent contract of a voting rule in the block chain;
s200, an application end initiates a voting request and checks parameter information of a voting interface according to the voting request;
s300, calling an intelligent contract to acquire a voting rule;
s400, carrying out service verification on the voting request according to the obtained voting rule, and recording the voting behavior;
and S500, judging whether the voting is finished or not, counting voting results if the voting is finished, encrypting the voting result data according to a state cipher algorithm, and uploading the voting result data to a block chain for storage.
The national cryptographic algorithm in this embodiment is a domestic cryptographic algorithm identified by the national cryptographic authority, i.e., a commercial cipher. The national cipher algorithm is a series of algorithms which are set by the national cipher bureau. The method comprises a symmetric encryption algorithm, an elliptic curve asymmetric encryption algorithm and a hash algorithm. Specifically, SM1, SM2, SM3, SM4 and the like are included.
The commercial cipher is a technology capable of realizing functions such as encryption, decryption, authentication, and the like of a commercial cipher algorithm. (including cryptographic algorithm programming technology and cryptographic algorithm chip, encryption card and other implementation technology). The commercial cryptography is the core of the commercial cryptography, the country puts the commercial cryptography into the national secret, and any unit and person have responsibility and obligation to protect the secret of the commercial cryptography.
The application field of the commercial password is very wide, and the commercial password is mainly used for carrying out encryption protection on sensitive internal information, administrative affair information, economic information and the like which do not relate to national secret content. Such as: the commercial password can be used for enterprise access control management, transmission encryption and storage encryption of various sensitive information in an enterprise, and an illegal third party is prevented from obtaining information content; and the method can also be used for various safety certifications, online banking, digital signatures and the like.
The fabric series sub-project is a core project in the super ledger and provides a complete alliance chain application development platform. The fabric series project (assembly) comprises a fabric, a fabric-ca, a fabric-sdk and the like, wherein the fabric is a core and a basic assembly of the alliance chain platform and provides blockchain network node deployment, intelligent contract operation environment construction, transaction initiation and consensus, distributed account book maintenance and other blockchain network core functions.
In the original fabric series of components, under the default condition, the hash algorithm in the blockchain network uses sha256, the digital signature uses the ecdsa algorithm, the digital certificate adopts the x509 format, the support of the national cipher algorithm is not provided, and the policy requirements of the blockchain platform in the aspects of supervision and control are not met. Therefore, a government or enterprise business system supporting the national cryptographic algorithm cannot realize interaction with the fabric alliance blockchain network based on the national cryptographic algorithm, and the large-scale controllable commercial process of the blockchain platform is seriously hindered.
In this embodiment, the fabric supporting the cryptographic algorithm, which is modified based on the fabric-v2.2.0 version, has completed network deployment and chain code operation test through the command line.
The SM2 is a public key cryptographic algorithm standard based on elliptic curve cryptography, and includes digital signature, key exchange, and public key encryption.
SM3 is cipher hash algorithm, which is used to replace MD5/SHA-1/SHA-256 international algorithm.
SM4 is a block cipher used to replace international algorithms such as DES/AES.
The transformation of the national secret is completed by encryption and decryption of the national secret SM2, signature verification of SM3with SM2 and hash of SM 3. SM2, SM3, SM4 are now open standards, using code directly as implemented by the suzhou congratulatory blockchain institute.
Referring to fig. 2, in an alternative embodiment, in step S100, for creating a fabric blockchain network supporting the cryptographic algorithm, the following is mainly modified, and specifically includes:
step S101, a CA certificate is created;
the certificate of the CA needs to specify a signature mode of the certificate, and calculate the SKI (Subject Key Identifier) of the private Key at the same time; the method mainly comprises the following steps: generating an sm2 private key, converting the x509 format certificate template into an sm2 certificate template, designating SKI of the certificate, designating the signature algorithm of the certificate as sm2.SM2WithSM3, generating an sm2 certificate, and finally generating a CA; the SKI is calculated in a mode that the byte code information of the public key is used as the content to carry out hash, the return value is modified from hash to hash, Sum (nil), and the original hash is abandoned;
it should be noted that the CA is an issuing authority of a certificate, which is the core of Public Key Infrastructure (PKI). CA is the authority responsible for issuing certificates, authenticating certificates, managing issued certificates; the CA has a certificate (containing a public key and a private key). A public user on the network trusts the CA by verifying its signature, and anyone can obtain the CA's certificate (including the public key) to verify the certificate it issued.
S102, packaging the generated private key to generate an sm2 private key, and storing an sm2 private key in a non-encryption mode;
s103, calculating the abstract by adopting a GMSM3 algorithm, and signing the abstract; the sm2 public key needs to remove ToLowS;
step S104, a gm state cipher module of bccsp is created;
BCCSP is known as blockchain cryptographic service provider, and can be used to provide encryption/decryption and signature verification related functions in Fabric. The BCCSP provides cryptographic algorithm related services to the associated core functions and client SDKs through a Membership Service. The related core functions are centralized in a core (the core refers to githu. com/hyperridge/fabric/lower, the name of the packet is core, the core module includes core codes in the fabric architecture, a hedger account book storage, chaincode chain codes, peer nodes, and scc system chain codes), and the core functions include a sensors module, an endorser module and the like.
The support for the national cryptographic algorithm firstly starts with the module to create a gm national cryptographic module of bccsp, and the realization idea is to realize the gm module by referring to the sw module. And (3) modifying the content:
gm-newly adding gmfactor.
sw-is a software implementation scheme in bccsp, and is added with the processing of sm2 and sm4 to define a related structure body;
factory-is a factory service in bccsp, provides configuration of password options, specifies an encryption and decryption mode, and generates a specific service factory;
the utils-is a tool function service in bccsp and provides a support service;
newly adding a national secret option;
the parsing function of the certificate in the signer package is modified.
Step S105, changing the ecdsa algorithm in the idemix package into sm2 algorithm;
the core of idemix (identity mixer) is the Zero Knowledge Proof (Zero Knowledge Proof). The idemix is a cipher protocol suite (X.509+ encryption algorithm), privacy is kept, anonymity is achieved, the identity of a transactor is not required to be disclosed during transaction, and the transactions are unrelated and cannot be traced forward. Specifically, the modification content is as follows: all ecdsa algorithms need to be changed into sm2 algorithms by modifying the idemix package, sm2 national secret algorithm is used in the idemix package to replace the ecdsa international password standard by modifying the idemix package, and the purpose is that the national secret sm2 algorithm can be used when zero knowledge proof verification data is needed.
In the technical scheme, the compatibility and the mobility of the national password modification of the fabric are better by directly carrying out necessary simplified modification on the source code of the fabric 2.2. And, after the country password is adapted, the advantages brought by upgrading the fabric1.0 to the fabric2.2 version are as follows:
new chain code (chainocode) lifecycle management: the redesigned chain code lifecycle management process introduces decentralized governance of intelligent contracts, and the new Fabric chain code lifecycle allows multiple organizations to be consistent in chain code parameters (such as chain code approval policies) before interacting with the ledger;
a new chaining code application mode for collaboration and consensus;
data privacy on a knowledge-needed basis: the organization may now choose to privately share data with a particular member of its direct network;
the new external chain code starts the program: this function allows the operator to build and launch a chain code using a technique of his own choosing;
the performance is improved: including parallelization of tasks and more efficient program flow, allows networks to support thousands of transactions per second.
In addition, in practical application, the existing code modified blockchain network of the version of fabric1.4, fabric2.1 and the like can be used for replacing the code.
In an alternative embodiment, in step S200, the step of checking the parameter information of the voting interface according to the voting request includes: judging whether the parameters in the voting request have key values, if so, checking to pass, and if not, checking not to pass; and the key value is key information for data encryption and decryption.
The voting interface may also be used to make calls when:
1. querying the voting transaction according to the voting code;
2. and (3) performing service logic verification according to the current voting transaction: the method comprises the following steps: whether the current user is a task related person or not; whether the current user is a voting committee member; whether the current user repeatedly votes, etc.;
3. calling an intelligent contract to inquire a voting rule;
4. recording the voting behavior of the current user;
5. and if the voting is finished, counting voting results.
In an alternative embodiment, in step S200, before verifying the parameter information of the voting interface according to the voting request, after the application terminal initiates the voting request, the method further includes:
judging whether relevant personnel set a voting rule or not, and if not, calling an intelligent contract to initialize the voting rule; and if the voting rule exists and needs to be updated, calling the intelligent contract to update the voting rule.
The intelligent contract in the embodiment is designed as a voting rule intelligent contract, and the irrevocability of voting rules and the traceability of rule change can be ensured through the contract.
The above-mentioned intelligent contract provides 3 contract methods, and when applying, the user authority of invoking the contract method is controlled by the application end, preferably, the intelligent contract includes:
1. the method for saving or updating the voting rules defined by the tenant by the user specifically comprises the following steps: generating a composite key according to the related personnel Id and the voting rule type, and writing the key and the rule content into an account book in a key value pair form; if the failure occurs, outputting abnormal information; if the prompt is successful, outputting a success prompt character string.
2. The user in the tenant queries the voting rules of the specified type: generating a composite key according to the related personnel Id and the voting rule type, and acquiring voting rule contents from the account book according to the key; if the query fails, returning an empty character string; otherwise, returning the corresponding voting rule.
3. Voting rule change history query: generating a composite key according to the related personnel Id and the voting rule type, and acquiring a change record of the voting rule from the account book according to the key; if the query fails, returning an empty character string; otherwise, returning the change record of the voting rule.
In an alternative embodiment, in step 500, the step of performing voting result statistics if the voting is finished, and uploading the voting result statistics data to a block chain for storage includes:
if the voting result is that the acceptance passes, the relevant personnel pay corresponding pass and upload the voting result to the block chain for storing the certificate; it should be noted that the token serves as an important incentive means in the self-organizing management platform governing process, and specializes and validates various elements (such as people, organizations, knowledge, events, products, and the like) in the organization, so that the monetary capital, the human capital, and other element capital are fully fused, and the efficiency of the organization and the value circulation are better stimulated. The certificate issuing person is a responsible person of the enterprise, and the task receiving person is a member of the organization.
And if the voting result is that the acceptance fails, uploading the voting result to a block chain for evidence storage to be used as a basis for managing and evaluating tasks, projects and organization members. For example, when the corresponding project, task or member is subsequently examined or evaluated, the above voting result of the block chain evidence can be called as a reference.
In an alternative embodiment, in step S400, the step of performing service check on the voting request according to the obtained voting rule includes:
judging whether the vote comes from related personnel of the voting task based on the identity data, wherein the related personnel comprise a retriever, a publisher, an acceptance checker and the like of the task;
judging whether the voting times of the related personnel of the voting task do not exceed a preset threshold value;
judging whether the voting time reaches a preset time limit of the voting effective time or not;
if the three conditions are met, determining that the voting data meets the intelligent contract execution condition; and if any one of the conditions is not met, determining that the voting data does not meet the voting intelligence contract execution condition.
If the service check of the voting request according to the obtained voting rule fails, re-executing the step of initiating the voting request by the application terminal, and checking the parameter information of the voting interface according to the voting request until the service check passes, that is, returning to the step S200, and executing the steps S200 to S400;
if the voting is not finished (for example, when the voting times of the voting related personnel do not exceed the preset threshold or the voting time does not reach the preset time limit), the process needs to return to step S200, and step S200 to step S400 are executed until the voting is finished.
In an alternative embodiment, the application end in this embodiment includes a voting management module, a voting initiation module, and a voting participation module;
the vote management module comprises the options available to the relevant person (e.g. the task originator): status of project type information, voting project initiation date, voting expiration date, voting project, etc.;
for example, in practical applications, the voting management module may include the following:
showing the voting project information with the voting attribute of public;
and (3) displaying characters: the voting item initiator name + 'initiates a vote' + voting item name;
a voting project initiation date;
a voting expiration date of the voting item;
the status of the voting project, including: not started, in progress, and finished;
and a detail viewing button is used for clicking a pop-up detail page and other related matters.
The voting initiation module comprises the following options selected by the relevant personnel: voting project name information, associated content information, attachment information, voting range information, voting time information and whether the voting is confidential options or not;
for example, in practical applications, the voting initiation module may include the following:
a voting project name;
the progress states of the voting items comprise not started, in progress, cancelled and ended;
a voting cut-off time of the voting item;
the number of people who have participated in the vote;
operations including [ editing ], [ detail ], [ deletion ], [ cancellation ]; the data with the progress status of 'in progress' and 'not started' has no delete button, the data with the progress status of 'finished' has no edit button, and only the data with the progress status of 'not started' has a 'cancel' button; clicking (editing), popping up an editing page, wherein only the fields of detailed description and attachment can be edited, and the page is the same as (voting initiation) and only the page fields have data; clicking a [ details ] button to pop up a details page; clicking deletion, popping up a secondary confirmation frame, prompting that deletion is successful after the deletion is confirmed, refreshing a page, and not displaying data any more; clicking a 'cancel' popup secondary confirmation box to prompt whether to confirm whether to cancel the voting item, and if the cancellation is confirmed, changing the page attribute and the data state into 'cancelled';
the data may be filtered according to the progress status of the voting items, the progress status including: not started, in progress, ended, cancelled;
the contents of the data, etc. can be searched fuzzily according to the name of the voting item.
The voting participation module comprises the following options selected by the relevant personnel: voting option information, screenable information, and the name of the voting item available for viewing, the status of the voting item, the expiration date of the vote, and the number of people who have participated in the vote.
For example, in practical applications, the voting participation module may include the following:
tab page, the displayed data is the voting project data of the voting range including the operator
Preferentially, sequencing and displaying according to the progress state of the voting project, wherein the sequence is as follows: "in progress", "not started", "ended", "in progress" are shown at the forefront; secondly, displaying and paging according to the reverse order of the creation time of the voting items
Showing the voting items in modules;
a voting project name;
the progress status of the voting project;
a voting cut-off time of the voting item;
the number of people who have participated in the vote;
the voting state of the operator comprises: "not voted" or "voted"
The data can be screened according to the voting state of the operator, and the voting state comprises the following steps: non-voted, etc.
Compared with the prior art, the voting method provided by the embodiment has at least the following advantages:
the block chain network (such as a super account book Fabric) supporting the intelligent contract is used as an operating environment, time service is provided for the block chain network, data chaining of voting is achieved, voting data on the chain is credible, voting privacy (anonymity) is guaranteed, identity safety of voters is guaranteed, voting tampering is prevented, centralization is achieved (a credible third party is not needed), and block chain storage is not reliable, public doubt on voting results is eliminated, fairness, justness and credibility in the voting process are guaranteed, trust of the public on the voting process is enhanced, and occurrence of bad voting cheating behaviors is greatly reduced.
Example two
In the enterprise organization management, the voting can play the roles of achieving consensus, maintaining fairness, guaranteeing group rights and interests and the like. In particular, the following scenarios apply:
employee incentive plan voting
When someone proposes to perform the equity incentive, the board of the enterprise needs to vote to determine whether to perform the equity incentive and the specific content of the equity incentive plan, such as the staff holding platform legal, the total stock holding proportion of the staff, the triggering condition of the incentive and the like.
Board of board
When a corporate board member needs to make modifications to board information, e.g., increases or decreases in board members, changes in holdings, changes in voting rights, etc. If consensus cannot be achieved, the solution is often required to be solved by means of voting. The characteristics of decentralized block chain and tamper resistance just can meet the requirement.
Determining whether a task passes acceptance by voting
In the self-organizing management platform, the acceptance results of tasks are sometimes diverged, and the voting of task completion conditions initiated to organization members is a relatively fair and easily-agreed method.
In the following, an example of determining whether a task passes acceptance by voting will be described as a self-organizing management method of the present application.
Specifically, referring to fig. 3, the self-organization management method provided by the present application includes: the system comprises a task issuing module, a task receiving module and a task acceptance module;
the release module releases task information through an application end and uploads the task information to the block chain;
the receiving module receives and completes the task information, and uploads the completed task information to a block chain for storage;
the acceptance check module calls the information of the completed task and uploads the acceptance check result to the block chain certificate storage,
if the issuing module and the receiving module have no objection to the checking and receiving result, the task issuer pays the pass certificate;
if the issuing module and the receiving module disagree with the acceptance result, the block chain voting method based on the block chain in the first embodiment is executed to initiate the block chain voting.
In a third aspect, the present application provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the voting method when executing the computer program.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A voting method based on a block chain, the method comprising:
creating a fabric block chain network supporting a state cipher algorithm, and deploying an intelligent contract of a voting rule in a block chain;
the application terminal initiates a voting request and verifies the parameter information of the voting interface according to the voting request;
calling an intelligent contract to obtain a voting rule;
performing service check on the voting request according to the obtained voting rule, and recording the voting behavior;
and judging whether the voting is finished or not, counting voting results if the voting is finished, encrypting the voting result data according to a state cipher algorithm, and uploading the voting result data to a block chain for storage.
2. A voting method according to claim 1, wherein before the checking the voting interface parameter information according to the voting request, after the application terminal initiates the voting request, the method further comprises:
judging whether relevant personnel set a voting rule or not, and if not, calling an intelligent contract to initialize the voting rule; and if the voting rule exists and needs to be updated, calling the intelligent contract to update the voting rule.
3. A voting method according to claim 1, wherein the steps of counting voting results if the voting is finished, and uploading the statistical voting result data to a block chain for storage comprise:
if the voting result is that the acceptance passes, the relevant personnel pay corresponding pass and upload the voting result to the block chain for storing the certificate;
and if the voting result is that the acceptance fails, uploading the voting result to a block chain for evidence storage to be used as a basis for managing and evaluating tasks, projects and organization members.
4. A voting method according to claim 1, wherein the step of checking the voting interface parameter information according to the voting request comprises:
judging whether the parameters in the voting request have key values, if so, checking to pass, and if not, checking not to pass; and the key value is key information for data encryption and decryption.
5. A voting method based on block chain according to claim 1, wherein the step of performing service check on the voting request according to the obtained voting rule comprises:
judging whether the vote is from related personnel of the voting task based on the identity data, wherein the related personnel comprise a retriever, a publisher and an acceptance checker of the task;
judging whether the voting times of the related personnel of the voting task do not exceed a preset threshold value;
judging whether the voting time reaches a preset time limit of the voting effective time or not;
if the conditions are met, determining that the voting data meet the intelligent contract execution conditions; and if any one of the conditions is not met, determining that the voting data does not meet the voting intelligent contract execution condition.
6. A blockchain-based voting method according to claim 1, wherein the intelligent contract comprises:
generating a composite key according to the related personnel Id and the voting rule type, and writing the key and the rule content into an account book in a key value pair form;
generating a composite key according to the related personnel Id and the voting rule type, and acquiring voting rule contents from the account book according to the key;
and generating a composite key according to the related personnel Id and the voting rule type, and acquiring a change record of the voting rule from the account book according to the key.
7. A voting method according to claim 1, wherein the application terminal comprises a voting management module, a voting initiation module and a voting participation module;
the voting management module comprises the following alternatives: item type information, voting item initiation date, voting expiration date and voting item state;
the voting initiation module comprises the following alternatives: voting project name information, associated content information, attachment information, voting range information, voting time information and whether the voting is confidential options or not;
the voting participation module comprises the following alternatives: voting option information, screenable information, and the name of the voting item available for viewing, the status of the voting item, the expiration date of the vote, and the number of people who have participated in the vote.
8. The blockchain-based voting method according to claim 1,
if the service check of the voting request is not passed according to the obtained voting rule, the step of initiating the voting request by the application terminal is executed again, and the parameter information of the voting interface is checked according to the voting request until the service check is passed;
and if the voting is not finished, re-executing the step that the application terminal initiates the voting request and checks the parameter information of the voting interface according to the voting request until the voting is finished.
9. An ad hoc management method, comprising: the system comprises a task issuing module, a task receiving module and a task acceptance module;
the release module releases task information through an application end and uploads the task information to the block chain;
the receiving module receives and completes the task information, and uploads the completed task information to a block chain for storage;
the acceptance module calls the information of the completed task and uploads an acceptance result to the block chain certificate storage,
if the issuing module and the receiving module have no objection to the checking and receiving result, the task issuer pays the pass certificate;
if the issuing module and the receiving module disagree with the acceptance result, the block chain voting method based on the block chain is executed to initiate the block chain voting according to any one of claims 1 to 8.
10. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the voting method according to any one of claims 1 to 9 are carried out when the computer program is executed by the processor.
CN202110231094.3A 2021-03-02 2021-03-02 Voting method based on block chain, self-organization management method and computer equipment Active CN113037827B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110231094.3A CN113037827B (en) 2021-03-02 2021-03-02 Voting method based on block chain, self-organization management method and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110231094.3A CN113037827B (en) 2021-03-02 2021-03-02 Voting method based on block chain, self-organization management method and computer equipment

Publications (2)

Publication Number Publication Date
CN113037827A true CN113037827A (en) 2021-06-25
CN113037827B CN113037827B (en) 2023-04-07

Family

ID=76465562

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110231094.3A Active CN113037827B (en) 2021-03-02 2021-03-02 Voting method based on block chain, self-organization management method and computer equipment

Country Status (1)

Country Link
CN (1) CN113037827B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114285552A (en) * 2021-12-09 2022-04-05 上海简苏网络科技有限公司 Block chain-based N-th power voting method and device
CN116384720A (en) * 2023-06-07 2023-07-04 青岛理工大学 DAO-oriented task management Web3 autonomous system and autonomous method

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170109955A1 (en) * 2015-10-20 2017-04-20 Follow My Vote, Inc. Blockchain electronic voting system and method
CN110097678A (en) * 2019-03-13 2019-08-06 深圳壹账通智能科技有限公司 Voting method, device, computer equipment and storage medium based on block chain
CN110633286A (en) * 2019-09-29 2019-12-31 山东爱城市网信息技术有限公司 Block chain-based time service prediction machine implementation method
CN110930578A (en) * 2019-11-21 2020-03-27 山东爱城市网信息技术有限公司 Voting method, equipment and medium based on block chain
CN111147227A (en) * 2019-12-27 2020-05-12 杭州中科先进技术研究院有限公司 Communication method and communication platform based on block chain
CN111163165A (en) * 2019-12-28 2020-05-15 北京工业大学 Voting consensus method based on Fabric alliance chain
CN111371562A (en) * 2020-02-27 2020-07-03 华信咨询设计研究院有限公司 Super book Fabric-SDK (Standard software development kit) cryptographic algorithm expansion and transformation method
CN111862440A (en) * 2020-08-10 2020-10-30 国网信通亿力科技有限责任公司 Voting system based on block chain technology
CN111970121A (en) * 2020-07-30 2020-11-20 山东爱城市网信息技术有限公司 Voting method based on block chain technology

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170109955A1 (en) * 2015-10-20 2017-04-20 Follow My Vote, Inc. Blockchain electronic voting system and method
CN110097678A (en) * 2019-03-13 2019-08-06 深圳壹账通智能科技有限公司 Voting method, device, computer equipment and storage medium based on block chain
CN110633286A (en) * 2019-09-29 2019-12-31 山东爱城市网信息技术有限公司 Block chain-based time service prediction machine implementation method
CN110930578A (en) * 2019-11-21 2020-03-27 山东爱城市网信息技术有限公司 Voting method, equipment and medium based on block chain
CN111147227A (en) * 2019-12-27 2020-05-12 杭州中科先进技术研究院有限公司 Communication method and communication platform based on block chain
CN111163165A (en) * 2019-12-28 2020-05-15 北京工业大学 Voting consensus method based on Fabric alliance chain
CN111371562A (en) * 2020-02-27 2020-07-03 华信咨询设计研究院有限公司 Super book Fabric-SDK (Standard software development kit) cryptographic algorithm expansion and transformation method
CN111970121A (en) * 2020-07-30 2020-11-20 山东爱城市网信息技术有限公司 Voting method based on block chain technology
CN111862440A (en) * 2020-08-10 2020-10-30 国网信通亿力科技有限责任公司 Voting system based on block chain technology

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董友康: "基于区块链的安全电子投票系统的设计与实现", 《中国优秀博硕士学位论文全文数据库(硕士) 社会科学Ⅰ辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114285552A (en) * 2021-12-09 2022-04-05 上海简苏网络科技有限公司 Block chain-based N-th power voting method and device
CN114285552B (en) * 2021-12-09 2023-08-22 上海简苏网络科技有限公司 N-th voting method and device based on block chain
CN116384720A (en) * 2023-06-07 2023-07-04 青岛理工大学 DAO-oriented task management Web3 autonomous system and autonomous method
CN116384720B (en) * 2023-06-07 2023-08-15 青岛理工大学 DAO-oriented task management Web3 autonomous system and autonomous method

Also Published As

Publication number Publication date
CN113037827B (en) 2023-04-07

Similar Documents

Publication Publication Date Title
US10708060B2 (en) System and method for blockchain-based notification
US11038670B2 (en) System and method for blockchain-based cross-entity authentication
US11025435B2 (en) System and method for blockchain-based cross-entity authentication
Du et al. An optimized consortium blockchain for medical information sharing
US11170092B1 (en) Document authentication certification with blockchain and distributed ledger techniques
CN110599181B (en) Data processing method, device and equipment based on block chain and storage medium
CN109474584B (en) Rule-based block chain network automatic permission joining method
CN108830733A (en) A kind of information processing method, block scm cluster and system
US11876915B2 (en) Method, apparatus, and computer-readable medium for authentication and authorization of networked data transactions
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN113037827B (en) Voting method based on block chain, self-organization management method and computer equipment
WO2018088475A1 (en) Electronic authentication method and program
CN113515756B (en) High-credibility digital identity management method and system based on block chain
Abraham et al. Qualified eID derivation into a distributed ledger based IdM system
CN114760071B (en) Zero-knowledge proof based cross-domain digital certificate management method, system and medium
Gulati et al. Self-sovereign dynamic digital identities based on blockchain technology
US11283623B1 (en) Systems and methods of using group functions certificate extension
Durán et al. An architecture for easy onboarding and key life-cycle management in blockchain applications
EP4254234A1 (en) Digital credential issuing for an entity
Zhang et al. FutureText: A blockchain-based contract signing prototype with security and convenience
Guo et al. Antitampering scheme of evidence transfer information in judicial system based on blockchain
CN113869901B (en) Key generation method, key generation device, computer-readable storage medium and computer equipment
US11343107B2 (en) System for method for secured logging of events
Rao et al. VAPKI: A blockchain-based identification system with validation and authentication
US20240046258A1 (en) Group payment accounts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20231013

Address after: Room 330, 3rd Floor, Building 1, No. 100 Hulan West Road, Baoshan District, Shanghai, 2019

Patentee after: Shanghai Jimu Galaxy Digital Technology Co.,Ltd.

Address before: 7b1-1, No. 588, Ji'an Road, Baoshan District, Shanghai, 201900

Patentee before: Shanghai wangchain Information Technology Co.,Ltd.

TR01 Transfer of patent right