CN114357494B - Account transaction information sharing method based on block chain - Google Patents

Account transaction information sharing method based on block chain Download PDF

Info

Publication number
CN114357494B
CN114357494B CN202210234544.9A CN202210234544A CN114357494B CN 114357494 B CN114357494 B CN 114357494B CN 202210234544 A CN202210234544 A CN 202210234544A CN 114357494 B CN114357494 B CN 114357494B
Authority
CN
China
Prior art keywords
transaction
cooperative
amount
ciphertext
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210234544.9A
Other languages
Chinese (zh)
Other versions
CN114357494A (en
Inventor
包祖明
张有荣
徐小平
蔡英
王海燕
陈望
吴砥柱
俞学劢
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Financial Comprehensive Service Platform Management Co ltd
Original Assignee
Zhejiang Financial Comprehensive Service Platform Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Financial Comprehensive Service Platform Management Co ltd filed Critical Zhejiang Financial Comprehensive Service Platform Management Co ltd
Priority to CN202210234544.9A priority Critical patent/CN114357494B/en
Publication of CN114357494A publication Critical patent/CN114357494A/en
Application granted granted Critical
Publication of CN114357494B publication Critical patent/CN114357494B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention relates to the technical field of information, in particular to an account transaction information sharing method based on a block chain, which comprises the following steps: the initiating row generates the main transaction information; initiating a row to issue a cooperative intelligent contract on the block chain; when other financial institutions generate transactions, the hash value of the name of the transaction account is extracted, and if the hash value of the name of the supervised user is consistent; the financial institution generates the associated transaction information for the management; after the assistant management associated transaction information is encrypted by using a time-limited encryption algorithm, an initiating row public key is used for encryption to obtain an assistant management ciphertext, and the assistant management ciphertext is uploaded to a block chain for storage; initiating a row polling block chain to obtain all the collaborative associated transaction information encrypted by using an initiating row public key; and judging whether the monitored funds flow into the monitoring limit industry or not according to the cooperative management associated transaction information, and if the funds flow into the monitoring limit industry in a preset proportion, initiating an off-line verification and punishment program. The invention has the substantial effects that: effectively guaranteeing the privacy of transaction data and realizing the sharing of related transaction information.

Description

Account transaction information sharing method based on block chain
Technical Field
The invention relates to the technical field of information security, in particular to an account transaction information sharing method based on a block chain.
Background
Banking financial institutions are responsible for monitoring and controlling some of the transactions in their accounts, such as monitoring loan applications, managing the use of specialized regulatory account funds, and identifying illegal financial activities. At present, cross-bank capital supervision data is collected by a supervision unit in a centralized reporting mode, but due to the requirements of relevant regulations, other data in centralized management cannot be shared by banks. Inter-bank independent objective cross-bank capital supervision depends on a data main body such as a customer acquiring offline paper materials from other banks and completing in an authorized submission mode, and the problems of low efficiency, non-real-time performance, uncontrollable transmission process and the like exist. Therefore, there is a need to develop a technical solution for sharing related transaction data between banks across institutions.
For example, chinese patent CN108596622A, published 2018, 9, 28, describes a system and method for sharing transaction information, including a client and a node; the node comprises a plurality of child nodes; the client is used for generating transaction information and sending the transaction information to any child node in the nodes; the child nodes are used for broadcasting the transaction information to the rest child nodes after receiving the transaction information; each child node broadcasts the transaction information to child nodes except the child node; after receiving the first set amount of transaction information, the child nodes broadcast submission requests to the child nodes except the child nodes; and after receiving the submission requests of the second set number, the child nodes send feedback information to the client. According to the technical scheme, the transaction information can be recorded in the distributed account book based on the block chain, the consensus mechanism of the block chain enables the transaction information to be consistent, safe and not to be falsified, profits are automatically distributed according to contracts, and communication cost of multi-party repeated account checking is reduced. However, the technical scheme of the method cannot give consideration to the control of the diffusion range of the transaction information, and easily causes uncontrolled diffusion of the transaction information.
Disclosure of Invention
The technical problem to be solved by the invention is as follows: the technical problem that a financial institution cross-institution transaction information sharing scheme giving consideration to privacy management and control is lacked at present. The account transaction information sharing method based on the block chain is provided, the account transaction information sharing can be realized, the spread range of the account transaction information is effectively controlled, and the transaction privacy control is considered.
In order to solve the technical problems, the technical scheme adopted by the invention is as follows: an account transaction information sharing method based on a blockchain comprises the following steps: when the supervised main body uses the supervised fund to generate a transaction, the initiating bank generates cooperative main transaction information, wherein the cooperative main transaction information comprises the identification information of the supervised main body, the identification information of a transaction object, the supervised amount, the cooperative amount interval and the supervised type code; issuing a collaborative intelligent contract on a block chain by an initiating bank, wherein the collaborative intelligent contract saves a collaborative amount interval and discloses a collaborative check identification code, the collaborative check identification code is obtained by adding interval characters to the hash value of the identification information of the supervised main body and the identification information of the transaction object and is obtained by splicing, and the collaborative intelligent contract discloses the hash value of the supervised amount and the code of the supervised type; when other financial institutions generate transactions, extracting the hash value of the name of the transaction account, inquiring the collaborative intelligent contract on the block chain, if the collaborative identification code is matched with the hash value of the current transaction account name, submitting the transaction amount to the collaborative intelligent contract, and feeding back whether the transaction amount is in a collaborative amount interval or not by the collaborative intelligent contract; if the transaction amount belongs to the cooperative amount interval, the financial institution generates cooperative associated transaction information and adds the hash value of the transaction object identification information into a cooperative identification code, wherein the cooperative associated transaction information comprises an account name, the transaction amount, transaction time, transaction object identification information and a transaction object industry code, and if the transaction object belongs to the type contained by the supervised type code, the financial institution sends alarm information to an initiating bank; the financial institution encrypts the assistant associated transaction information by using a time-limited encryption algorithm, then encrypts the assistant associated transaction information by using a public key of an initiating bank to obtain an assistant cryptograph, and uploads the assistant cryptograph to a block chain for storage; initiating a row polling block chain, decrypting the collaborative management ciphertext within a time limit, and acquiring all collaborative management associated transaction information encrypted by using an initiating row public key; and the initiating line judges whether the monitored funds flow into the monitoring limit type field or not according to the assistant management associated transaction information, and initiates an offline verification and punishment program if the funds with the preset proportion flow into the monitoring limit type field.
Preferably, when the initiating row generates the assistant management main transaction information, a assistant management turn value is generated according to the historical supervision credit condition of the supervised subject, and the assistant management intelligent contract stores the assistant management turn value; the auxiliary management intelligent contract generates a main transaction number for the auxiliary management intelligent main transaction, and the main transaction number is disclosed; when other financial institutions upload the assistant management ciphertext, uploading the assistant management ciphertext associated with the main transaction number to a block chain for storage; when the intelligent contract for the cooperation detects that the quantity of the ciphertext correlated with the main transaction number and stored in the block chain reaches the value of the number of the rounds of the cooperation, the intelligent contract for the cooperation feeds back whether the subsequent transaction amount is in the interval of the cooperation amount, and the intelligent contract for the cooperation feeds back that the subsequent transaction amount does not belong to the interval of the cooperation amount.
Preferably, the initiating bank generates a minimum percentage of the treaty according to the historical supervision reputation of the supervised subject, and the transaction amount exceeding the product of the supervised amount and the minimum percentage of the treaty is regarded as falling into a treaty amount interval.
Preferably, the method for encrypting the cooperative associated transaction information by using a time-limited encryption algorithm comprises the following steps: issuing an encrypted intelligent contract on a block chain, wherein the encrypted intelligent contract maintains a plurality of encrypted bins, the encrypted bins comprise encrypted functions and updating clocks, and the encrypted functions of the encrypted bins are updated when the updating clocks arrive; the financial institution selects an encryption bin of a corresponding updating clock according to time limit, submits the associated transaction information of the management to the encryption bin and obtains a time limit ciphertext; after associating the time-limited ciphertext with the encryption bin identifier, the financial institution uses the public key of the initiating bank for encryption to obtain a cooperative ciphertext and uploads the cooperative ciphertext to a block chain for storage; after the initiating line uses the private key to decrypt the auxiliary management ciphertext, obtaining a time-limited ciphertext and an encryption bin identifier, submitting the time-limited ciphertext and a public key to an encryption bin before an update clock of the corresponding encryption bin arrives, decrypting the encryption bin to obtain a plaintext, and feeding the plaintext back to the initiating line after encrypting the plaintext by using the public key; and the initiating line decrypts by using the private key again to obtain a complete plaintext of the cooperative management associated transaction information.
Alternatively, the method for encrypting the collaborative linked transaction information by using a time-limited encryption algorithm comprises the following steps: before submitting the cooperative associated transaction information to the encryption bin, the financial institution generates a symmetric encryption key, wherein the symmetric encryption key only consists of numbers; generating a univariate polynomial, and performing character splicing on the absolute value of the nonzero coefficient of the univariate polynomial to obtain a symmetric encryption key and obtain the number N of the univariate polynomial; submitting the times N to an encryption bin to obtain a time-limited ciphertext; generating a second univariate polynomial, wherein the degree of the second univariate polynomial is less than N, obtaining a plurality of intersection points of the two univariate polynomials, incorporating coordinates of the plurality of intersection points into an intersection point set, and recording the number of the intersection points to be more than N; encrypting the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code by using a symmetric encryption key to obtain a conventional ciphertext; packaging the conventional ciphertext, the intersection point set, the time-limited ciphertext and the encryption bin identifier, encrypting by using a public key of an initiating line, and uploading to a block chain for storage; the initiating line uses a private key to decrypt to obtain a conventional ciphertext, an intersection set, a time-limited ciphertext and an encryption bin identifier, and submits the time-limited ciphertext to a corresponding encryption bin within time limit to obtain the number N; solving the coefficient of the univariate polynomial by using the intersection point coordinates recorded by the intersection point set, and splicing to obtain a symmetric encryption key; and decrypting the conventional ciphertext by using the symmetric encryption key to obtain the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code.
Preferably, before submitting the cooperative associated transaction information to the encryption bin, the financial institution generates a symmetric encryption key; splitting the transaction amount into a reserved amount and an encrypted amount, and encrypting the account name, the transaction time, the transaction object identification information and the transaction object industry code by using a symmetric encryption key to obtain a conventional ciphertext; submitting the symmetric encryption key and the encryption amount to an encryption bin to obtain a time-limited ciphertext; packaging the conventional ciphertext, the reserved amount, the time-limited ciphertext and the encryption bin identifier, encrypting by using a public key of an initiating line, and uploading to a block chain for storage; the initiating bank uses a private key to decrypt and obtain a conventional ciphertext, a reserved amount, a time-limited ciphertext and an encryption bin identifier, and submits the time-limited ciphertext to a corresponding encryption bin within time limit to obtain an encryption key and an encryption amount; and decrypting the conventional ciphertext by using the symmetric encryption key to obtain the account name, the transaction time, the transaction object identification information and the transaction object industry code, and summing the reserved amount and the encrypted amount to obtain the transaction amount so as to obtain the complete cooperative associated transaction information.
Preferably, the method for the initiator to judge whether the regulated funds flow into the regulation limitation type field according to the cooperative associated transaction information comprises the following steps: polling the block chain in a time limit by an initiating row to obtain a plurality of pieces of assistant management associated transaction information; inquiring a third-party public data source to obtain an associated industry set of the enterprise corresponding to the transaction object identification information; and if the associated industry set comprises the supervision limitation type field, initiating a verification and punishment program.
Preferably, when the financial institution is used as a collection institution of the transaction, extracting the hash value of the collection account name, inquiring the collaborative intelligent contract on the block chain, and judging whether the identification information of the supervised subject is consistent; if yes, submitting the transaction amount or the sum of the transaction amounts received within a preset time length to a cooperative intelligent contract; if the amount of the transaction fed back by the cooperative intelligent contract is in the cooperative amount interval, the financial institution generates cooperative associated transaction information and sends alarm information to an initiating bank at the same time; the financial institution encrypts the assistant associated transaction information by using a time-limited encryption algorithm, then encrypts the assistant associated transaction information by using a public key of an initiating bank to obtain an assistant cryptograph, and uploads the assistant cryptograph to a block chain for storage.
The substantial effects of the invention are as follows: the hash value of the identification information of the supervised main body is disclosed through the block chain, downstream financial institutions related to the supervised transaction can query the correlation by themselves, whether the cooperative management correlation information needs to be issued or not is judged by means of the cooperative intelligent contract, the cooperative management correlation information only allows the initiated bank to check, the decipherable period is limited, the privacy diffusion of the transaction information is controlled from the two aspects of authority and timeliness, the privacy of the transaction data can be effectively guaranteed, the related transaction information can be shared, and a cross-institution cooperative supervision mechanism is formed.
Drawings
Fig. 1 is a schematic flow chart of an account transaction information sharing method according to an embodiment.
Fig. 2 is a flowchart illustrating a method for limiting transaction information sharing round depth according to an embodiment.
Fig. 3 is a schematic flowchart of an encryption method using a time-limited encryption algorithm according to an embodiment.
Fig. 4 is a flowchart illustrating a method for encrypting the associated transaction information with the envelope according to an embodiment.
FIG. 5 is a schematic diagram of a collection agency management method according to an embodiment.
Detailed Description
The following description will further specifically explain embodiments of the present invention by referring to the accompanying drawings.
The first embodiment is as follows:
an account transaction information sharing method based on a blockchain, referring to fig. 1, includes:
step A01), when the supervised main body uses the supervised fund to generate transaction, the initiated bank generates the main transaction information of the supervision, the main transaction information of the supervision comprises the identification information of the supervised main body, the identification information of the transaction object, the supervised amount, the interval of the cooperative amount and the supervised type code;
step A02) issuing a collaborative intelligent contract on a block chain, storing a collaborative amount interval by the collaborative intelligent contract, and disclosing a collaborative check identification code, wherein the collaborative check identification code is obtained by adding interval characters to the hash value of the identification information of the supervised main body and the identification information of the transaction object and splicing, and the collaborative intelligent contract discloses the hash value of the supervised amount and the code of the supervised type;
Step A03), when other financial institutions generate transactions, extracting the hash value of the name of the transaction account, inquiring the cooperative intelligent contract on the block chain, if the cooperative identification code is matched with the hash value of the current transaction account name, submitting the transaction amount to the cooperative intelligent contract, and feeding back whether the transaction amount is in the cooperative amount interval by the cooperative intelligent contract;
step A04) if the transaction amount belongs to the section of the cooperative amount, the financial institution generates cooperative associated transaction information and adds the hash value of the transaction object identification information into the cooperative identification code, the cooperative associated transaction information includes account name, transaction amount, transaction time, transaction object identification information and transaction object industry code, if the transaction object belongs to the type contained by the supervised type code, the financial institution sends out alarm information to the initiating bank;
step A05) the financial institution encrypts the assistant management associated transaction information by using a time-limited encryption algorithm, then encrypts the information by using the public key of the initiating bank to obtain an assistant management ciphertext, and uploads the assistant management ciphertext to a block chain for storage;
step A06) initiating a row polling block chain, decrypting the cooperative management ciphertext within a time limit, and acquiring all the cooperative management associated transaction information encrypted by using an initiating row public key;
Step A07), the initiating bank judges whether the monitored fund flows into the monitoring limit type field according to the cooperative associated transaction information, and if the fund with a preset proportion flows into the monitoring limit type field, the initiating bank initiates an off-line verification and punishment program.
For enterprises with better historical supervision credit, transaction information of which the transaction amount reaches 20% of the main transaction amount is managed and controlled. And if the payee corresponding to the plurality of transaction information with the amount reaching 20% of the main transaction amount belongs to the non-limited industry, determining that the enterprise does not use the special fund in a violation manner. When enterprise A receives a fund to be monitored, and enterprise A draws the fund, corresponding transaction is generated, and the bank completing the corresponding transaction is the initiating bank. Initiating a row generation to orchestrate a primary transaction, including regulatory subject identification information: enterprise a, amount under supervision: and 1000 ten thousand yuan, extracting the name of the enterprise A and 1000 ten thousand hash values, and uploading the two hash values to a block chain for storage. The orchestration dollar interval is set to 20% above the supervised dollar to infinity, i.e., (200 ten thousand, + ∞). And can also be set to (200 ten thousand, 2000 ten thousand). The upward monitoring is needed to avoid that the supervised subject obtains funds larger than the total amount of the supervised funds after mixing the own funds with the supervised funds, and then the transaction is carried out integrally, which can cause the occurrence of the transaction exceeding the supervised amount of the transaction of the cooperative subject. At this time, the upper limit of the collaborative interval is set to infinity, or several times of the total amount of the capital under supervision, so that the same supervision can be realized.
The supervised subject is all subjects participating in economic activities, namely, the subject includes individual industrial and commercial enterprises, institutions and the like managed and registered by the industrial and commercial enterprises, and also includes citizens who are not managed and registered by the industrial and commercial enterprises. When funds which need to be monitored appear in the personal account, the financial institution where the personal account is located actively uploads the related transaction data to the blockchain according to the scheme recorded in the embodiment, so that the funds are monitored. The supervised subject identification information is recommended as a name of a subject participating in the economic activity. If a uniform credit code is used, the regulatory body will be limited to the economic activity body that has been business registered. But for some application scenarios that only need the supervision industry and commerce to register the subject, the unified credit code can also be used as the identification information of the supervised subject. Likewise, the present embodiment may also name separate identification information specifically for entities involved in economic activities that require regulatory fund management. The regulated type code is used to indicate a limited use of the regulated funds.
The regulated type code includes a type code indicating that the regulated funds are positively allowed to flow in and a type code indicating that the flow in is not allowed from a negative perspective. The embodiment uses a special letter start, plus an integer representing the industry type, to compose the supervised type code. Each industry uses two integers, consecutive integers, such that an even number and an odd number represent the same industry. Even numbers indicate that the regulated funds are positively allowed to flow into the corresponding industry, and odd numbers indicate that the regulated funds are not allowed to flow into the corresponding industry. For example, LMIT026 and LMIT027 both represent real estate industries, and LMIT036 and LMIT037 both represent securities industries. Then the supervised type code is LMIT027 and LMIT037 indicates that the supervised funds cannot flow into the real estate industry and dealer industry, but both. Similarly, if the numbers included in the supervised type code are all even numbers, the supervised type code indicates that the supervised funds can only flow into the industry represented by the supervised type code, and the rest of industries cannot flow into the industry. The code of the industry is determined by the negotiation and the supervised type code is determined from the supervising industry for the supervised funds.
The block chain used in this embodiment is an industry alliance chain established in the financial industry, and a plurality of nodes are management nodes and operated by a plurality of trusted financial institutions. Other financial institution entries and exits require auditing by the management node. Under the condition of using the public link, the scheme of the embodiment can also achieve the effect of giving consideration to privacy and transaction information sharing, but the entering and exiting of the nodes of the public link are not limited, and the security of the public link is established on the number and the computing power of the nodes participating in the management block chain, so that higher risk is achieved. The intelligent contract is stored and executed in the form of binary machine code on the block chain, so that the feasibility is not available, and the information leakage is avoided.
When a regulated subject, such as a regulated business, is making a transaction, a portion of the funds flow into the next business's bank account. The bank where the account of the enterprise under supervision is located is the initiating bank. The account of the next enterprise and the account of the enterprise under supervision may be in the same bank or different banks, and the implementation of the embodiment is not affected. If the accounts of the two main bodies of the transaction are opened by the initiating bank, the initiating bank can directly obtain complete transaction information, so that the generation of the main transaction information of the investigation or the associated transaction information of the investigation is unnecessary. In specific implementation, the transaction with both parties initiating the bank and opening the account can be shared as appropriate. The initiating bank is responsible for supervising whether the transferred funds flow into the illegal industry for use in a certain period. And the initiating bank generates the main transaction information of the assistant management, wherein the main transaction information of the assistant management comprises. If the industry code of the next enterprise belongs to the restricted industry, the bank sends out alarm information to the initiating line, the initiating line starts to verify offline, and if the verification is true, the punishment program is started.
The enterprise A is a printing enterprise, when the capital with limited use is obtained, the enterprise A becomes a supervised main body, and the amount of the supervised capital is 1000 ten thousand yuan. The enterprise A transfers 500 ten thousand yuan in the account of the enterprise A to the enterprise B, the enterprise B is a finished paper wholesale retailer, and 500 ten thousand yuan is the payment of finished paper. Enterprise a transfers 300 ten thousand yuan in its account to individual C, which is the ink purchase principal that enterprise a contacts, and 300 ten thousand yuan is the payment for entrusting ink purchase and entrusting purchase. After several days, business B transferred 400 ten thousand dollars to paper mill D, and individual C transferred 230 thousand dollars to business E. After several days enterprise E will transfer 600 million to enterprise F. After several days, business a transfers 3 ten thousand dollars in its account to business G, and the process of funding is shown in table 1. The regulated funds remain 197 thousands of unused. Enterprise E and enterprise F are ink wholesalers and ink manufacturers, respectively. The 600 ten thousand dollars that enterprise E transferred to enterprise F was the total cost of purchasing ink from enterprise E to enterprise F throughout the season. Enterprise G is a transportation service enterprise and 3 ten thousand yuan is the transportation cost of the month. The account of enterprise a is set up for bank a, the account of enterprise B is set up for bank B, and the accounts of individual C and enterprise E are set up for bank C.
TABLE 1 regulatory funding promulgation sheet for Enterprise A
Amount of money Payment process (monetary unit: ten thousand yuan)
500 ten thousand yuan Enterprise a-
Figure DEST_PATH_IMAGE002
(500)->Enterprise B-
Figure DEST_PATH_IMAGE004
(400)->Enterprise D
300 ten thousand yuan Enterprise A-
Figure DEST_PATH_IMAGE006
(300)->Individual C-
Figure DEST_PATH_IMAGE008
(230)->Enterprise E-
Figure DEST_PATH_IMAGE010
(600)->Enterprise F
3 ten thousand yuan Enterprise A-
Figure DEST_PATH_IMAGE012
(3)->Enterprise G
197 ten thousand yuan Is not used for a while
Trading
Figure DEST_PATH_IMAGE014
Representing that the enterprise A transfers 500 ten thousand yuan to the enterprise B for trading
Figure 47634DEST_PATH_IMAGE014
When the transaction occurs, the bank A generates the information of the main transaction of the consultation. Collaborating master transaction information includes: identification information of enterprise A, identification information of enterprise B, and regulated amount of 500 ten thousand yuan, and the cooperative amount interval of 500 x 20%,80%]Ten thousand yuan and a supervised type code (LMIT027, LMIT 037). Bank A issues a cooperative intelligent contract on the block chain, and records the cooperative amount interval of 500 x [20%,80%]Ten thousand yuan. The hash value of the enterprise A identification information is as follows: FFB38F … 10E325, the hash value of the business B identification information is: 6B3A2A … 7BF8ED, the generated collaborating identification code is: (FFB38F … 10E325,6B3A2A … 7BF8 ED). "," is a separator of a setting. The identification information of the transaction main body is uniformly distributed by a host organization, or the registered name of the enterprise in the industrial and commercial management department is directly used, and the individual is the name. Trading
Figure DEST_PATH_IMAGE016
Representing that business B pays 400 ten thousand dollars to business D. At this time, the bank B of the account is set up by the enterprise B to inquire the block chain, and whether the collaborative check identification code is matched with the identification information of the enterprise B is judged. Bank B first extracts the hash value of the identifying information of Enterprise B, i.e., 6B3A2A … 7BF8 ED. Inquiry to consultation identification code (FFB38F … 10E325,6B3A2A … 7BF8ED), since it is determined that the reconciliation identifier contains the hash value of the identification information of business B, bank B can conclude that the transaction is a business
Figure 43403DEST_PATH_IMAGE016
To the administration of regulated funds. Thus will trade
Figure 665883DEST_PATH_IMAGE016
After the transaction amount of 400 ten thousand of the transaction amount is encrypted by using the public key of the intelligent contract for management, the transaction amount is written into a preset designated address of the intelligent contract for management, and after the intelligent contract for management is decrypted, the transaction amount of 400 ten thousand of the transaction amount belongs to the interval of 500 × 20% and 80% of the transaction amount]And feeding back the result to the bank B. And after receiving the feedback, the bank B generates the cooperative management associated transaction information, wherein the cooperative management associated transaction information comprises an account name, namely the name XXX paper industry limited company of the enterprise B, the transaction amount of 400 ten thousand yuan, the transaction time and the transaction object identification information, namely the identification information of the enterprise D and the transaction object industry codes LMIT126/LMIT 127. Namely, the cooperative associated transaction information is: info = (XXX paper limited, 400, 1645948743, 911M … 082B, LMIT126/LMIT127), 911M … 082B are identification information of enterprise D, Info represents a character string formed by managing associated transaction information, and the Info is encrypted by using a public key of an initiating bank, namely bank nail, and then uploaded to a block chain for storage. Due to the transaction
Figure 795513DEST_PATH_IMAGE016
Does not belong to the supervised type code (LMIT027, LMIT037), so the bank b does not send an alarm to the bank a. Meanwhile, the bank B adds the HASH value of the identification information of the enterprise D, i.e., HASH (911M … 082B) = DC4452 … E8D2CD, to the agreement identification code of the agreement intelligent contract. The post-addition consultation identity becomes (FFB38F … 10E325,6B3A2A … 7BF8ED, DC4452 … E8D2 CD).
Trading
Figure DEST_PATH_IMAGE018
Representing that the enterprise A transfers 300 ten thousand yuan to the individual C for transaction
Figure 750831DEST_PATH_IMAGE018
When this happens, the bank A again generates the information of the collaborating main transaction. Collaborating master transaction information includes: identification information of enterprise A, identification information of enterprise C, 300 ten thousand yuan of supervised amount, and 300 x 20%,80% of cooperative amount interval]Ten thousand yuan and a regulatory type code (LMIT027, LMIT 037). Bank A issues a cooperative intelligent contract on the block chain, and records the cooperative amount interval of 300 x 20%,80%]Ten thousand yuan. The hash value of the enterprise A identification information is as follows: FFB38F … 10E325, the hash value of the identification information of person C is: 2858BE … 93DF6B, the generated consultation identifier is: (FFB38F … 10E325,2858BE … 93DF 6B).
Trading
Figure DEST_PATH_IMAGE020
Representing that person C paid 230 ten thousand dollars for goods to business E. At this time, the individual C sets up a bank inquiry block chain of the account, and judges whether the assistant inquiry identification code is matched with the identification information of the individual C. Bank C first extracts the hash value of person C's identification information, i.e. 2858BE … 93DF 6B. The bank C can judge that the transaction is concluded by inquiring the cooperative identification code (FFB38F … 10E325,2858BE … 93DF6B) and judging that the cooperative identification code contains the hash value of the identification information of the individual C
Figure 212774DEST_PATH_IMAGE020
To the administration of regulated funds. Thus will trade
Figure 948649DEST_PATH_IMAGE020
After the 230 ten thousand transaction amounts are encrypted by using the public key of the intelligent contract, the transaction amounts are written into the preset designated address of the intelligent contract, and after the intelligent contract is decrypted, the 230 ten thousand transaction amounts are judged to belong to 300 x [20%,80% ] of the cooperative amount interval]And feeding back the result to the bank C. And after receiving the feedback, the bank C generates the assistant management associated transaction information, wherein the assistant management associated transaction information comprises an account name, namely the name of the individual C Zheng certain, the transaction amount is 230 ten thousand yuan, the transaction time and the transaction object identification information, namely the identification information of the enterprise E and the transaction object industry code LMIT034/LMIT 035. Namely, the cooperative associated transaction information is: info = (zheng somebody, 230, 1645951498,910X … 01MJ, LMIT034/LMIT035), 910X … 01MJ is the identifying information for enterprise E, and Info represents a string formed to orchestrate the associated transaction information. And (4) after the Info is encrypted by using a public key of an initiating bank, namely the bank A, uploading the Info to a block chain for storage. Due to the transaction
Figure 881970DEST_PATH_IMAGE020
Does not belong to the supervised type codes (LMIT027, LMIT037), so the bank does not send an alarm to bank a. Meanwhile, the bank c adds the HASH value of the identification information of the enterprise E, i.e., HASH (910X … 01MJ) =6FC6DF … B62459, to the cooperation identification code of the intelligent contract for cooperation management. The post-addition consultation identity becomes (FFB38F … 10E325,2858BE … 93DF6B,6FC6DF … B62459). Trading
Figure DEST_PATH_IMAGE022
The method comprises the steps that the enterprise E pays 600 ten thousand yuan to the enterprise F, after the bank C extracts the hash value of identification information of the enterprise E, a block chain is inquired, and a matched collaborative identification code is found to exist, so that 600 ten thousand of transaction amount is encrypted and then sent to a collaborative intelligent contract, the collaborative intelligent contract is decrypted and then judges that the transaction amount is not in a collaborative amount interval, and a result is fed back to the bank C. And after the bank receives the feedback, no cooperative associated transaction is generated. Trading
Figure DEST_PATH_IMAGE024
When the transaction occurs, the bank A judges that the transaction amount does not need to be managed and monitored, so that new main transaction information and intelligent contract management are not issued.
Within a plurality of time, recommended to be half a month or within a month, the bank A polls the blockchain and obtains all the cooperative associated transaction information, namely the transaction
Figure 426215DEST_PATH_IMAGE016
And trade
Figure 13054DEST_PATH_IMAGE020
Corresponding associated transaction information is managed in a coordinated manner, and the industries to which the transaction objects of the two transactions belong are judged not to belong to the supervision limitIndustry category of manufacture, and thus determine that enterprise a is not using regulated funds in violation.
Assume that during the transaction shown in Table 1, only Enterprise D is the real estate industry. When the bank B uploads the associated transaction information, the bank B sends alarm information to the bank A. Assume that during the transaction shown in Table 1, only Enterprise F is the real estate industry. Trading
Figure 236225DEST_PATH_IMAGE022
When the transaction amount is generated, the bank C encrypts the transaction amount of 600 ten thousand and sends the encrypted transaction amount to the cooperative intelligent contract to obtain the feedback that the transaction amount is not in the cooperative amount interval, so that the transaction amount is not processed. It is believed that the 600 ten thousand dollars of transactions occurred are not from the regulated funds of the illegal use of enterprise a, but rather the funds earned indirectly from enterprise a by enterprise E and other funds owned by itself to conduct the act of real estate investment. Meanwhile, if the supervised subject needs to avoid transferring out funds in multiple times, and the funds are gathered into a preset enterprise after a plurality of transactions, the cooperative amount interval in the embodiment is controlled to be between [20% and 80%]Change to [20%, + ∞]And (4) finishing. Or modified to [20%,500% ]]So that the transaction amount exceeds the transaction of the cooperative main transaction, can be taken as the cooperative associated transaction and is included in the supervision range. Bank armor acquisition transaction
Figure 815980DEST_PATH_IMAGE022
After the corresponding associated transaction information is managed in coordination, the transaction is completed
Figure 808206DEST_PATH_IMAGE022
In the fund transaction payment link, the fund transferred by the enterprise A is less than 600 ten thousand yuan, so that the condition that the enterprise A transfers the fund from different paths in batches and then gathers the fund into illegal use is eliminated, and the condition that the enterprise A does not use the regulated fund in an illegal way is still judged. Hypothetical transactions
Figure 97105DEST_PATH_IMAGE022
The transaction amount of the bank A is 200 tens of thousands, the possibility that the enterprise A uses the regulated funds illegally cannot be eliminated, and at the moment, the bank A initiates an offline verification and punishment program to the enterprise A.
According to the scheme, the monitoring of a large amount of monitored funds can be automatically completed through an online program, only a small amount of transactions with risks are subjected to offline verification, the workload of offline verification approaches is greatly reduced, the offline verification and disciplinary program can effectively play a role, and higher deterrence force is formed.
If the enterprise transfers the fund into the account opened by the enterprise in other banks, and then transfers the fund from the account of other banks to other enterprises, the transaction information is generated. And at the moment, the corresponding bank extracts the hash value of the name of the transaction account, inquires the intelligent contract for management on the block chain, and if the intelligent contract for management of the matched intelligent contract for management identification code exists, the transaction is judged to belong to the transaction needing management. At the moment, the bank encrypts the transaction amount by using the public key of the intelligent contract for the cooperative management and submits the encrypted transaction amount to the intelligent contract for the cooperative management. And after the intelligent contract is decrypted, judging whether the transaction amount is in the cooperative amount interval, feeding the result back to the corresponding bank, and encrypting the result by using the public key of the corresponding bank. The bank decrypts and knows whether the transaction amount is in the cooperative amount interval. If the transaction belongs to the cooperative amount interval, the cooperative associated transaction is generated. The orchestration associated transaction includes an account name, a transaction amount, a transaction time, transaction object identification information, and a transaction object industry code sufficient to initiate a line for governing the risk of use of a fund violation. In order to avoid the diffusion of sensitive information, namely transaction information, related banks encrypt the cooperative associated transaction information by using a time-limited encryption technology and then encrypt the cooperative associated transaction information by using a public key of an initiating bank. As for whether the supervised main body transfers funds from the bank account of the supervised main body to the bank account of the supervised main body in other banks, the transaction is used as a collaborative related transaction information uploading block chain without any requirement, and the expected technical effect is achieved without being influenced. However, such transactions between accounts with the subject should not be accounted for in the value of the collaborative turn.
In this embodiment, a uniform depth may be used, and if a deeper transaction needs to be tracked continuously, the initiating bank may continue to complete the tracking of the previous several deep transactions through the offline path. The special fund can be a special loan for special operation, a supervision account or special fund transfer and the like. For enterprises that were once identified as using dedicated funds for violations, the minimum proportion of associated transactions is not limited or the set proportion of monitored amounts is low.
In order to further control the hidden and diffused degree of the cross-organization transaction information and enhance the privacy protection, the embodiment further limits the transaction sharing depth, please refer to fig. 2, which includes:
step B01), when the generation of the main transaction information is initiated, generating a collaborative round value according to the historical supervision credit condition of the supervised subject, and storing the collaborative round value by the collaborative intelligent contract;
step B02) the cooperative intelligent contract generates a main transaction number for the cooperative intelligent main transaction, and the main transaction number is disclosed;
step B03), when other financial institutions upload the auxiliary management ciphertext, uploading the auxiliary management ciphertext associated with the main transaction number to a block chain for storage;
and step B04) when the intelligent contract detects that the quantity of the auxiliary cryptograph of the associated main transaction number stored on the block chain reaches the auxiliary round value, the intelligent contract feeds back whether the subsequent transaction amount is in the auxiliary amount interval, and the intelligent contract feeds back that the subsequent transaction amount does not belong to the auxiliary amount interval.
And the initiator generates the lowest percentage of the collaborative management according to the historical supervision credit condition of the supervised subject, and the transaction amount exceeding the product of the supervised amount and the lowest percentage of the collaborative management is regarded as falling into the collaborative management amount interval. For an enterprise with good historical regulatory reputation, the present embodiment does not share every transaction with its regulated funds with the initiating row, but only shares a preset number of associated transactions with the initiating row that achieves the lowest regulated amount. Because the historical supervision performance of the enterprise is good and the enterprise has good reputation, the initiating bank can check the use risk of illegal funds and reduce the supervision workload. If the requirement on the number of shared collaborative related transactions is low and the lowest percentage of collaborative related transactions is high, the amount of the related transaction information needing to be shared is low, the diffusion of the transaction information of the enterprise is effectively controlled, and the privacy of the enterprise is protected. For enterprises with illegal use of special funds, the number of shared cooperative associated transactions is large, the minimum percentage of the cooperative is low, transaction information required to be exposed to an initiating bank is large, and more privacy of the enterprises with poor reputations is sacrificed. More information is mastered by the initiating bank, and data support is provided for avoiding the fund illegal use risk of the initiating bank rule.
Referring to fig. 3, a method for encrypting the cooperative associated transaction information by using a time-limited encryption algorithm includes:
step C01) issuing an encrypted intelligent contract on the block chain, wherein the encrypted intelligent contract maintains a plurality of encryption bins, the encryption bins comprise encryption functions and updating clocks, and the encryption functions of the encryption bins are updated when the updating clocks arrive;
step C02) the financial institution selects the encryption bin of the corresponding updating clock according to the time limit, submits the cooperative associated transaction information to the encryption bin and obtains the time limit ciphertext;
step C03), the financial institution uses the public key of the initiating bank to encrypt after associating the time-limited ciphertext with the encryption bin identification, so as to obtain the assistant ciphertext, and uploads the assistant ciphertext to the block chain for storage;
step C04) after the initiation line uses the private key to decrypt the cooperative ciphertext, obtaining the time-limited ciphertext and the encryption bin identification, submitting the time-limited ciphertext and the public key to the encryption bin before the update clock of the corresponding encryption bin arrives, decrypting the encryption bin to obtain the plaintext, encrypting the plaintext by using the public key, and feeding back the plaintext to the initiation line;
step C05) the originating bank again uses the private key for decryption to obtain the complete plaintext of the associated transaction information.
The encryption function stored in the encryption bin is a symmetric encryption function, and a conventional symmetric encryption algorithm is adopted. When the encryption bin updates the encryption function, the secret key of the symmetric encryption function is updated. As shown in table 3, d represents day, 1 day later the encryption function in encryption bin GP60 will be updated, and then the update clock for encryption bin GP60 is reset to 60 d. The update clock of the encryption bin CP1 is changed to 59d, and so on. The encryption function stored in the storage bin is always kept secret, the encryption bin receives a plaintext and outputs an encrypted ciphertext, and the specific encryption function and the encryption key cannot be known outside. In order to avoid plaintext leakage caused by plaintext submission, the financial institution submits the plaintext to the encrypted intelligent contract after encrypting the plaintext by using the public key of the encrypted intelligent contract, namely, writes the encrypted intelligent contract into a receiving column. The written content includes a public key of the financial institution, an encryption bin identification, a string, a pattern, and a timestamp. The public key is used to encrypt the processed string. The mode is encryption/decryption. When the mode is encryption, the encryption bin carries out encryption operation on the character string, and when the mode is decryption, the encryption bin carries out decryption operation on the character string. The output of the encryption bin is encrypted by using a public key and then written into a result column. The time stamp is the time stamp written into the receiving column, and after the content is written into the receiving column, the written time stamp is used as a starting point, and the encryption intelligent contract does not receive new written content within a preset time length. The time stamp of the current write-in content of the receiving column is more than the preset time length from the current time. Within a preset time, the encryption bin needs to complete encryption and decryption operation, and the financial institution needs to read the content of the result column in time.
Table 2 encrypted intelligent contract schematic table
Encrypted intelligent contract ID 6545708912
Encryption bin 1 GP1
Encryption bin 2 GP2
Encryption bin n GPn
Receiving column NULL
Result column NULL
Table 3 schematic diagram of encryption bin
Encrypted bin numbering Updating clock Encryption function
GP1 60d 3DES(Key:R0SH…jKrl)
GP2 59d 3DES(Key:eQkh…NAZv)
GP3 58d AES-128(Key:Ujlt…GPko)
GP60 1d AES-128(Key:rW1U…6S0R)
It should be noted that, in the decryption process, after the private key is used for decryption, a concierge plaintext is obtained, and the concierge plaintext includes an encryption bin number identifier, clock information and a time-limited ciphertext of the encryption bin, and the corresponding encryption bin is quickly obtained according to the encryption bin number identifier, and meanwhile, the encryption function is used for decryption within a specified time, and decryption cannot be performed when the time-limited clock is exceeded, so that the information security is improved.
The beneficial technical effects of this embodiment are: the hash value of the identification information of the supervised subject is disclosed through the block chain, downstream financial institutions involved in supervised transactions can automatically inquire the association, whether the cooperative management associated information needs to be issued or not is judged by means of a cooperative management intelligent contract, the cooperative management associated information is only allowed to be checked by an initiating bank, the decipherable deadline is limited, the privacy diffusion of the transaction information is controlled from the two aspects of authority and timeliness, the privacy of transaction data can be effectively guaranteed, related transaction information can be shared, and a cross-institution cooperative supervision mechanism is formed.
The second embodiment:
the embodiment specifically improves an implementation scheme of time-limited encryption on the basis of the first embodiment. When the technical solution described in the first embodiment is adopted, when the traffic volume on the block chain increases, traffic congestion on the block chain may be caused. The embodiment further provides a new envelope encryption scheme on the basis of envelope encryption in the prior art. Referring to fig. 4, a new envelope encryption scheme, a method for encrypting associated transaction information includes:
step D01) before the financial institution submits the associated transaction information to the encryption bin, a symmetric encryption key is generated;
step D02) dividing the transaction amount into a reserved amount and an encrypted amount, and encrypting the account name, the transaction time, the transaction object identification information and the transaction object industry code by using a symmetric encryption secret key to obtain a conventional ciphertext;
step D03) the symmetric encryption key and the encryption amount are submitted to an encryption bin to obtain a time-limited ciphertext;
step D04) packing the conventional ciphertext, the reserved amount, the time-limited ciphertext and the encryption bin identification, encrypting by using the public key of the initiating line, and uploading to a block chain for storage;
step D05) initiates the use private key to decrypt and obtain the normal ciphertext, the reserve amount, the time-limited ciphertext and the encryption bin mark, submits the time-limited ciphertext to the corresponding encryption bin within the time limit, and obtains the symmetric encryption private key and the encryption amount;
Step D06) using the symmetric encryption key to decrypt the conventional ciphertext to obtain the account name, the transaction time, the transaction object identification information and the transaction object industry code, and summing the reserved amount and the encrypted amount to obtain the transaction amount, thereby obtaining the complete cooperative associated transaction information. As shown in Table 4, trade
Figure 807572DEST_PATH_IMAGE016
When the corresponding associated transaction information of the bureau is encrypted by using the envelope encryption algorithm provided by the embodiment, the bank B divides the transaction amount into the reserved amount of 35 ten thousand yuan and the encrypted amount of 365 ten thousand yuan. The encryption key used to generate the AES encryption algorithm is KeyAES = mTu3 … ZSt7, and the key length is 512-bit characters.
Table 4 new envelope encryption scheme encryption collaborative associated transaction process table
Step (ii) of To content
D01) Info = (XXX Co., 400,164 … 43,911M … 082B, LMIT126/LMIT127)
D02) Conventional ciphertext = AES (XXX corporation, 164 … 43,911M … 082B, LMIT126/LMIT127)
D03) Time-limited ciphertext =3DES (365, mTu3 … ZSt7)
D04) Info' = PubKey _ A (regular ciphertext, 35, time limited ciphertext, GP1)
And encrypting the account name, the transaction time, the transaction object identification information and the transaction object industry code by using an AES algorithm to obtain a conventional ciphertext. The time-limited ciphertext is obtained by encrypting 365 and the symmetric key mTu3 … ZSt7 using an encryption bin GP 1. After the conventional ciphertext, the time-limited ciphertext, the reserved amount and the encryption bin identifier are spliced, the common key of the initiating bank A is used for encryption, and the common key is uploaded to the block chain. PubKey _ a denotes encryption using the public key of bank a. The bank A uses the private key to decrypt and obtain the conventional ciphertext, the time-limited ciphertext, the reserved amount and the encrypted bin identifier. And sending the time-limited ciphertext and the encryption bin identifier to an encryption intelligent contract to obtain an encryption amount of 365 ten thousand yuan and a symmetric encryption key KeyAES = mTu3 … ZSt 7. And then, decrypting the conventional ciphertext by using the KeyAES to obtain the account name, the transaction time, the transaction object identification information and the transaction object industry code, and adding 365 ten thousand yuan of encrypted amount and 35 ten thousand yuan of reserved amount to obtain 400 ten thousand yuan of total transaction amount. In the envelope encryption process, the transaction amount is never completely and correctly reproduced in the blockchain and the intelligent contract, so that the security is higher. The block chain is prevented from being used as a malicious node to monitor the intermediate data in the execution process of the encrypted intelligent contract and obtain complete transaction information.
The embodiment also provides an alternative to the scheme described in step D01) to step D06) to further relieve the encryption and decryption pressure of the encrypted bins. The method specifically comprises the following steps:
step D' 01) before the financial institution submits the associated transaction information of the assistant management to the encryption bin, generating a symmetrical encryption key, wherein the symmetrical encryption key only consists of numbers;
step D' 02) generating a univariate polynomial, and performing character splicing on the absolute value of the nonzero coefficient of the univariate polynomial to obtain a symmetric encryption key and obtain the number N of the univariate polynomial;
step D' 03) submitting the times N to an encryption bin to obtain a time-limited ciphertext;
step D' 04) generating a second univariate polynomial, wherein the degree of the second univariate polynomial is less than N, obtaining a plurality of intersection points of the two univariate polynomials, the coordinates of the plurality of intersection points are brought into an intersection point set, and the number of the recorded intersection points is more than N;
step D' 05) encrypting the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code by using a symmetric encryption key to obtain a conventional ciphertext;
step D' 06) packing the conventional ciphertext, the intersection point set, the time-limited ciphertext and the encryption bin identifier, encrypting by using a public key of an initiating line, and uploading to a block chain for storage;
Step D' 07) initiating a decryption process by using a private key to obtain a conventional ciphertext, an intersection set, a time-limited ciphertext and an encryption bin identifier, submitting the time-limited ciphertext to a corresponding encryption bin within time limitation, and obtaining a number N;
step D' 08) solving coefficients of the univariate polynomial by using intersection point coordinates recorded by the intersection point set, and splicing to obtain a symmetric encryption key;
and D' 09) decrypting the conventional ciphertext by using the symmetric encryption key to obtain the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code.
Bank's second-party transaction
Figure 426904DEST_PATH_IMAGE016
When the corresponding associated transaction information is uploaded to the block chain, a symmetric encryption Key is generated, wherein the Key _ AES =091980 … 278189, and the length of the agreed Key is 512 bits. The univariate polynomial f (x) =0919 x ^22-8 x ^21+ … -27 x +8189 is generated, the degree of the univariate polynomial is 22, namely N =22, and 23 coordinate points are needed for calculation. More than 22 intersection point coordinates, namely not less than 23 intersection points, are recorded in the intersection point set. Generating a second univariate polynomial having two univariate polynomialsThe number of intersections of formula (II) is more than 22. If f' (x) =0.0000012 x 2+8189, at least 23 of the intersection points are selected from the intersection points and are included in the intersection point set. Such as including 25 intersection coordinates within the set of intersections. And encrypting the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code by using the symmetric encryption Key Key _ AES =091980 … 278189 to obtain a conventional ciphertext. Only the N =22 number is submitted to the encryption of the encrypted bins of the encrypted smart contract. Therefore, the encryption intelligent contract only needs little time to complete the encryption and decryption process, and can support the sharing of a large amount of transaction information on the block chain.
And uploading the conventional ciphertext, the intersection set, the time-limited ciphertext and the encrypted bin identifier to a block chain for storage after being encrypted by using a public key of a bank B. And after the second bank downloads and decrypts the encrypted data, the conventional ciphertext, the intersection set, the time-limited ciphertext and the encrypted bin identifier are obtained. The time-limited ciphertext is submitted to the encryption bin within the time limit to obtain a value 22 for N. Bank B constructs a unitary polynomial g (x) = a22 x ^22+ a21 x ^21+ … + a2 x ^2+ a1 x + a0, and the values from a0 to a22 can be obtained by arbitrarily selecting 23 intersection points from 26 intersection points recorded in the intersection point set. Wherein a22=919, a21= -8, …, a1= -27, a0=8189, and a22 to a0 are directly spliced to obtain 511-digit numbers. Since the agreed Key length is 512 bits, 1 0 is added to the first bit to obtain the complete symmetric encryption Key keyaes =091980 … 278189. And decrypting the conventional ciphertext by using the symmetric encryption Key Key _ AES =091980 … 278189 to obtain the account name, the transaction amount, the transaction time, the transaction object identification information and the transaction object industry code.
If the bank B does not decrypt the time-limited ciphertext within the time limit, the correct times N cannot be obtained. When the specific value of N is not determined, there will be an unary solution when the coefficients of the univariate polynomial are back-extrapolated from the 25 intersection coordinates. Therefore, the bank B can not decrypt the conventional ciphertext, and the time-limited sharing of the cooperative associated transaction information is realized. And after the time limit is exceeded, no financial institution can correctly decrypt the cooperative associated transaction information, so that the privacy of the bank transaction data is protected. In the process, related transaction information never exists on the blockchain in the clear, and the method has high privacy and safety.
The method for judging whether the supervised funds flow into the supervision limitation type field by the initiating bank according to the cooperative associated transaction information comprises the following steps: polling a block chain in a time limit by an initiating row to obtain a plurality of pieces of collaborative management associated transaction information; inquiring a third-party public data source to obtain an associated industry set of enterprises corresponding to the transaction object identification information; and if the supervision limitation type field is contained in the association industry set, launching a verification and punishment program. And initiating a management and control task which can automatically make a more detailed judgment logic and complete the illegal use risk of the special fund.
The method for obtaining the associated industry set comprises the following steps: according to a third-party public data source, acquiring the shareholders and industries of the enterprise corresponding to the transaction object identification information, and adding the shareholders and industries into an associated industry set; inquiring a third-party public data source to obtain all the participating enterprises of each participating shareholder with the participating ratio higher than a preset threshold value; and encrypting the related industry set of the industries of the participating enterprises to obtain a final related industry set.
In order to monitor that the illegal enterprise transfers funds to a plurality of compliant accounts and then transfers the funds back to the illegal enterprise account, the supervision is avoided. The embodiment provides a technical scheme for managing the identification of the transaction from the financial institution where the collection account is located. Referring to fig. 5, the method includes:
Step E01) when the financial institution is used as a collection institution of the transaction, extracting the hash value of the collection account name, inquiring the collaborative intelligent contract on the block chain, and judging whether the identification information of the subject to be monitored is consistent;
step E02), if the sum exists, submitting the sum of the transaction amount or the sum of a plurality of transaction amounts received within a preset duration to a cooperative intelligent contract;
step E03) if the coordinated intelligent contract feedback transaction amount is in the coordinated amount interval, the financial institution generates coordinated associated transaction information and simultaneously sends out alarm information to the initiating bank;
step E04) the financial institution encrypts the cooperative related transaction information by using a time-limited encryption algorithm, then encrypts the information by using the public key of the initiating bank to obtain a cooperative ciphertext, and uploads the cooperative ciphertext to a block chain for storage.
In step E01), only the hash value of the first subject identification information recorded in the collaboration identification code is matched, that is, the identification information of the supervised subject. When the enterprise transfers the funds through a plurality of paths and then gathers the funds into an account of a certain bank, the bank extracts the hash value of the identification information of the account opening main body, compares the hash value with the collaborative search identification code of the collaborative intelligent contract on the block chain, and finds out the matched collaborative search identification code. Therefore, the establishment process of the cooperative management associated transaction is carried out, and the comprehensive supervision of the related funds is realized.
Compared with the first embodiment, the encrypted intelligent contract in the present embodiment only needs to encrypt the encryption key and the symmetric encryption key, and thus has a faster execution speed. By adopting the encryption mode provided by the embodiment, the encryption and decryption efficiency can be accelerated, more cooperative associated transaction information can be hidden, and the diffusion range of the transaction information of enterprises can be better controlled.
The above-described embodiment is a preferred embodiment of the present invention, and is not intended to limit the present invention in any way, and other variations and modifications may be made without departing from the spirit and scope of the invention as defined in the appended claims.

Claims (7)

1. An account transaction information sharing method based on a block chain is characterized by comprising the following steps:
when the supervised main body uses the supervised fund to generate a transaction, the initiating bank generates cooperative main transaction information, wherein the cooperative main transaction information comprises the identification information of the supervised main body, the identification information of a transaction object, the supervised amount, the cooperative amount interval and the supervised type code;
issuing a collaborative intelligent contract on a block chain by an initiating bank, wherein the collaborative intelligent contract stores a collaborative amount interval and discloses a collaborative check identification code, the collaborative check identification code is obtained by splicing the hash value of the identification information of the supervised subject and the hash value of the identification information of the transaction object with interval characters, and the collaborative intelligent contract discloses the hash value of the supervised amount and the supervised type code;
When other financial institutions generate transactions, extracting the hash value of the name of the transaction account, inquiring the collaborative intelligent contract on the block chain, if the collaborative identification code is matched with the hash value of the current transaction account name, submitting the transaction amount to the collaborative intelligent contract, and feeding back whether the transaction amount is in a collaborative amount interval or not by the collaborative intelligent contract;
if the transaction amount belongs to the cooperative amount interval, the financial institution generates cooperative associated transaction information and adds the hash value of the transaction object identification information into a cooperative identification code, wherein the cooperative associated transaction information comprises an account name, the transaction amount, transaction time, transaction object identification information and a transaction object industry code, and if the transaction object belongs to the type contained by the supervised type code, the financial institution sends alarm information to an initiating bank;
the financial institution encrypts the assistant associated transaction information by using a time-limited encryption algorithm, then encrypts the assistant associated transaction information by using a public key of an initiating bank to obtain an assistant cryptograph, and uploads the assistant cryptograph to a block chain for storage;
initiating a row polling block chain, decrypting the collaborative management ciphertext within a time limit, and acquiring all collaborative management associated transaction information encrypted by using an initiating row public key;
And the initiating bank judges whether the monitored fund flows into the monitoring limit type field or not according to the assistant management associated transaction information, and if the fund with a preset proportion flows into the monitoring limit type field, an offline verification and punishment program is initiated.
2. The method for sharing account transaction information based on block chain as claimed in claim 1,
when the initiating row generates the assistant management main transaction information, generating an assistant management turn value according to the historical supervision credit condition of the supervised subject, and storing the assistant management turn value by the assistant management intelligent contract;
the auxiliary management intelligent contract generates a main transaction number for the auxiliary management intelligent main transaction, and the main transaction number is disclosed;
when other financial institutions upload the assistant management ciphertext, uploading the assistant management ciphertext associated with the main transaction number to a block chain for storage;
when the cooperative intelligent contracts detect that the quantity of the cooperative ciphertext which is stored in the block chain and is associated with the main transaction number reaches the cooperative round value, the cooperative intelligent contracts feed back whether the subsequent transaction amount is in a cooperative amount interval or not, and the cooperative intelligent contracts feed back that the subsequent transaction amount does not belong to the cooperative amount interval.
3. The method for sharing account transaction information based on block chain as claimed in claim 1 or 2,
And the initiating bank generates a collaborative minimum percentage according to the historical supervision credit condition of the supervised subject, and the transaction amount exceeding the product of the supervised amount and the collaborative minimum percentage is regarded as falling into a collaborative amount interval.
4. The method for sharing account transaction information based on block chain as claimed in claim 1 or 2,
the method for encrypting the cooperative associated transaction information by using the time-limited encryption algorithm comprises the following steps:
issuing an encrypted intelligent contract on a block chain, wherein the encrypted intelligent contract maintains a plurality of encrypted bins, the encrypted bins comprise encrypted functions and updating clocks, and the encrypted functions of the encrypted bins are updated when the updating clocks arrive;
the financial institution selects an encryption bin of a corresponding updating clock according to time limit, submits the cooperative associated transaction information to the encryption bin and obtains a time limit ciphertext;
after associating the time-limited ciphertext with the encryption bin identifier, the financial institution encrypts the time-limited ciphertext by using a public key of an initiating bank to obtain a cooperative ciphertext and uploads the cooperative ciphertext to a block chain for storage;
after the initiating line uses the private key to decrypt the auxiliary management ciphertext, obtaining a time-limited ciphertext and an encryption bin identifier, submitting the time-limited ciphertext and a public key to an encryption bin before an update clock of the corresponding encryption bin arrives, decrypting the encryption bin to obtain a plaintext, and feeding the plaintext back to the initiating line after encrypting the plaintext by using the public key;
And the initiating line decrypts by using the private key again to obtain a complete plaintext of the cooperative management associated transaction information.
5. The method for sharing account transaction information based on block chain as claimed in claim 4,
before submitting the cooperative associated transaction information to the encryption bin, the financial institution generates a symmetric encryption key;
splitting the transaction amount into a reserved amount and an encrypted amount, and encrypting the account name, the transaction time, the transaction object identification information and the transaction object industry code by using a symmetric encryption key to obtain a conventional ciphertext;
submitting the symmetric encryption key and the encryption amount to an encryption bin to obtain a time-limited ciphertext;
packaging the conventional ciphertext, the reserved amount, the time-limited ciphertext and the encryption bin identifier, encrypting by using a public key of an initiating line, and uploading to a block chain for storage;
the initiating bank uses a private key to decrypt and obtain a conventional ciphertext, a reserved amount, a time-limited ciphertext and an encryption bin identifier, and submits the time-limited ciphertext to a corresponding encryption bin within time limit to obtain an encryption key and an encryption amount;
and decrypting the conventional ciphertext by using the symmetric encryption key to obtain the account name, the transaction time, the transaction object identification information and the transaction object industry code, and summing the reserved amount and the encrypted amount to obtain the transaction amount so as to obtain the complete cooperative associated transaction information.
6. The method for sharing account transaction information based on block chain as claimed in claim 1 or 2,
the method for judging whether the supervised funds flow into the supervision limitation type field by the initiating bank according to the cooperative associated transaction information comprises the following steps:
polling a block chain in a time limit by an initiating row to obtain a plurality of pieces of collaborative management associated transaction information;
inquiring a third-party public data source to obtain an association type field set of a main body corresponding to the transaction object identification information;
and if the associated industry set comprises the supervision limitation type field, initiating a verification and punishment program.
7. The method for sharing account transaction information based on block chain as claimed in claim 1 or 2,
when the financial institution is used as a gathering institution of transaction, extracting the hash value of the name of a gathering account, inquiring the collaborative intelligent contract on the block chain, and judging whether the identification information of the supervised subject is consistent;
if yes, submitting the transaction amount or the sum of the transaction amounts received within a preset time length to a cooperative intelligent contract;
if the transaction amount fed back by the intelligent contract for the cooperative management is in the cooperative management amount interval, the financial institution generates cooperative management associated transaction information and sends alarm information to an initiating bank;
The financial institution encrypts the assistant associated transaction information by using a time-limited encryption algorithm, then encrypts the assistant associated transaction information by using a public key of an initiating bank to obtain an assistant cryptograph, and uploads the assistant cryptograph to a block chain for storage.
CN202210234544.9A 2022-03-11 2022-03-11 Account transaction information sharing method based on block chain Active CN114357494B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210234544.9A CN114357494B (en) 2022-03-11 2022-03-11 Account transaction information sharing method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210234544.9A CN114357494B (en) 2022-03-11 2022-03-11 Account transaction information sharing method based on block chain

Publications (2)

Publication Number Publication Date
CN114357494A CN114357494A (en) 2022-04-15
CN114357494B true CN114357494B (en) 2022-06-28

Family

ID=81094654

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210234544.9A Active CN114357494B (en) 2022-03-11 2022-03-11 Account transaction information sharing method based on block chain

Country Status (1)

Country Link
CN (1) CN114357494B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114510737B (en) * 2022-04-21 2022-07-15 浙江数秦科技有限公司 Operation data time-limited open system based on block chain
CN114757766B (en) * 2022-06-07 2022-09-23 浙江数秦科技有限公司 Poverty relief loan approval system based on block chain
CN114722362B (en) * 2022-06-07 2022-09-16 浙江数秦科技有限公司 Post-loan supervision method based on privacy calculation
CN114820175B (en) * 2022-06-27 2022-09-23 浙江数秦科技有限公司 Loan purpose supervision method based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
JP2020078081A (en) * 2020-01-14 2020-05-21 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Regulating blockchain confidential transactions
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption
CN114077948A (en) * 2020-08-14 2022-02-22 北京金山云网络技术有限公司 Transaction supervision method and device on blockchain and electronic equipment

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108596622A (en) * 2018-05-02 2018-09-28 北京链链信息技术有限公司 The shared system and method for Transaction Information
CN113300850B (en) * 2021-04-30 2022-10-21 深圳市东恒尚科信息技术有限公司 Electronic transaction system based on block chain
CN113965329A (en) * 2021-10-25 2022-01-21 浙江师范大学 Cross-chain interoperation system, method, medium and data processing terminal

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845960A (en) * 2017-01-24 2017-06-13 上海亿账通区块链科技有限公司 Method for secure transactions and system based on block chain
EP3576033A1 (en) * 2017-01-24 2019-12-04 One Connect Smart Technology Co., Ltd. (Shenzhen) Secure transaction method based on block chain, electronic device, system, and storage medium
JP2020078081A (en) * 2020-01-14 2020-05-21 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Regulating blockchain confidential transactions
CN114077948A (en) * 2020-08-14 2022-02-22 北京金山云网络技术有限公司 Transaction supervision method and device on blockchain and electronic equipment
CN113570458A (en) * 2021-07-16 2021-10-29 东北大学秦皇岛分校 Block chain payment channel supervision method based on proxy re-encryption

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
基于区块链的可监管数字货币模型;张健毅等;《计算机研究与发展》;20181015(第10期);第127-140页 *

Also Published As

Publication number Publication date
CN114357494A (en) 2022-04-15

Similar Documents

Publication Publication Date Title
CN114357494B (en) Account transaction information sharing method based on block chain
CN109544160B (en) Transaction authenticity verification method and system based on block chain and intelligent contract
US11687924B2 (en) Cryptocurrency infrastructure system
US20220156738A1 (en) Methods and systems of using a cryptocurrency system to manage payments and payment alternatives
CN109544331B (en) Supply chain financial application method and device based on block chain, terminal equipment and storage medium
TWI724460B (en) Block chain-based event processing method and device, and electronic equipment
CN107358424A (en) A kind of method of commerce and device based on digital cash
US20200151682A1 (en) Digital fiat currency
WO2018137316A1 (en) Secure transaction method based on block chain, electronic device, system, and storage medium
CN107392603B (en) Transaction method and apparatus using digital money
CN108352008A (en) The numerical data operation of safety
CN109906584A (en) Block chain based method and system for designating recipients of electronic communications
CN103918219A (en) Electronic content distribution based on secret sharing
WO2021114922A1 (en) Method and apparatus for multi-party joint training of risk assessment model for iot machine
WO2018154794A1 (en) Virtual currency management device, virtual currency management method, and program
CN114638697A (en) Small loan management system based on block chain
CN111639938A (en) Data processing method, device, equipment and medium
CN110689348A (en) Income verification method, device, terminal and medium based on alliance chain
CN114741734B (en) Drug anti-counterfeiting traceability cloud chain data multi-party safe computing method
CN111008900A (en) Data distribution method and device based on intelligent contract
WO2021060340A1 (en) Transaction information processing system
CN111131227B (en) Data processing method and device
US20200311818A1 (en) Mitigating malicious use of public data for trading portfolios
CN113269649A (en) System and method for tracking digital currency
US11367148B2 (en) Distributed ledger based mass balancing via secret sharing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant