CN116910775A - Verification method, device, equipment and storage medium for inquiring letters - Google Patents

Verification method, device, equipment and storage medium for inquiring letters Download PDF

Info

Publication number
CN116910775A
CN116910775A CN202310704613.2A CN202310704613A CN116910775A CN 116910775 A CN116910775 A CN 116910775A CN 202310704613 A CN202310704613 A CN 202310704613A CN 116910775 A CN116910775 A CN 116910775A
Authority
CN
China
Prior art keywords
inquiry
checked
auditing
letter
function
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310704613.2A
Other languages
Chinese (zh)
Inventor
李洋
武仪佳
王晓红
王博
杜园园
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202310704613.2A priority Critical patent/CN116910775A/en
Publication of CN116910775A publication Critical patent/CN116910775A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting

Abstract

The application relates to a verification method, device, equipment and storage medium for a verification letter. Relates to the technical field of block chains. Firstly, responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited; checking the check letter to be checked; if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate; and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party. Obviously, the security of the checked and verified check is ensured by encrypting the checked and verified check, and the check of the checked and verified check is carried out on line, so that the labor cost and the check time can be reduced, and the check efficiency is improved. In addition, the inquiry function ciphertext and the to-be-checked inquiry function are stored in a correlated and uplink mode, tracing can be conveniently conducted, tampering is prevented, and safety of the inquiry function ciphertext and the to-be-checked inquiry function is guaranteed.

Description

Verification method, device, equipment and storage medium for inquiring letters
Technical Field
The application relates to the technical field of blockchains, in particular to a verification method, device, equipment and storage medium for a verification letter.
Background
The inquiry function refers to a written document which is sent to an auditing party (such as a financial institution) by an auditing requiring party (such as an auditor) in the process of auditing, and is used for verifying whether the content to be audited is real, legal and complete. The content to be checked contained in the inquiry letter can comprise funds, credit card and the like.
At present, a mode of mailing the enquiry letter or a parent letter mode is generally adopted to transfer the enquiry letter to an auditing party for checking the enquiry letter, wherein the mode of mailing the enquiry letter can reduce the consumption of manpower and resources, but the security of the enquiry letter cannot be ensured, and the time for waiting for the auditing party to return the letter is longer, and the auditing efficiency is lower. The security of the enquiry letter can be ensured by the parent letter mode, but the consumption of manpower and resources is larger, and the enquiry letter needs to be transferred to the auditing party by the auditing demand party in person, so that the integral auditing time of the enquiry letter is longer, and the auditing efficiency is lower.
Therefore, how to improve the auditing efficiency is a technical problem to be solved under the premise of ensuring the security of the enquiry letter.
Disclosure of Invention
Based on the above, it is necessary to provide a verification method, device, equipment and storage medium for verifying the Inquiry function, which can improve verification efficiency of the Inquiry function on the premise of ensuring safety of the Inquiry function.
In a first aspect, the application provides a method for auditing a certificate inquiry function, which comprises the following steps:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In one embodiment, auditing the inquiry function to be audited includes:
and calling the intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
In one embodiment, adding the auditor information to the to-be-audited inquiry certificate to obtain the audited inquiry certificate includes:
signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as auditing party information into the to-be-audited inquiry function to obtain the audited inquiry function.
In one embodiment, the encrypting process for the checked inquiry letter to obtain the inquiry letter ciphertext comprises the following steps:
Searching a public key of an audit requiring party from a blockchain network;
and encrypting the checked verification function based on the public key of the checking demand party to obtain a verification function ciphertext.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
responding to an inquiry function inquiry request sent by an auditing requiring party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party for the auditing requirement party to decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter secret corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
In a second aspect, the present application also provides a device for auditing an inquiry letter, where the device includes:
The acquisition module is used for responding to the inquiry letter checking request sent by the checking demand party to acquire the inquiry letters to be checked;
the auditing module is used for auditing the inquiry function to be audited;
the adding module is used for adding the information of the auditor to the to-be-audited verification function if the audit is passed, so as to obtain an audited verification function;
the encryption module is used for carrying out encryption processing on the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be used for checking and inquiring by a demander.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory and a processor, the memory stores a computer program, and the processor executes the computer program to realize the following steps:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In a fourth aspect, the present application also provides a computer-readable storage medium. The computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In a fifth aspect, the present application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
The verification method, the device, the equipment and the storage medium of the verification function firstly respond to the verification request of the verification function sent by the verification demand party to acquire the verification function to be verified; checking the check letter to be checked; if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate; and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party. Obviously, the security of the checked and verified check is ensured by encrypting the checked and verified check, and the check of the checked and verified check is carried out on line, so that the check process of the check is carried out in a mode of manually mailing the check or a parent check mode, the labor cost and the audit time can be reduced, and the audit efficiency is improved. In addition, the application carries out the associated uplink storage of the query ciphertext and the query to be checked, can facilitate the subsequent tracing, can prevent the query ciphertext and the query to be checked from being tampered, and ensures the security of the query ciphertext and the query to be checked.
Drawings
FIG. 1 is an application environment diagram of an inspection method of a license inquiry function provided in this embodiment;
FIG. 2 is a flow chart of a first verification method for a license inquiry provided in this embodiment;
FIG. 3 is a schematic flow chart of obtaining an approved license provided in this embodiment;
FIG. 4 is a schematic flow chart of obtaining a check ciphertext according to the present embodiment;
FIG. 5 is a schematic flow chart of obtaining an approved license corresponding to a to-be-inquired license provided in this embodiment;
FIG. 6 is a flow chart of a second method for auditing a license inquiry provided in this embodiment;
FIG. 7 is a block diagram of an audit device for a license inquiry provided in this embodiment;
fig. 8 is an internal structural diagram of the computer device provided in the present embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The embodiment of the application provides a computer device, which can be an auditor device, wherein the auditor device can be the device where an auditor for checking an inquiry letter is located, for example, the auditor device can be a terminal device of a financial institution, and the internal structure diagram can be shown in fig. 1. The auditor device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the auditor device is configured to provide computing and control capabilities. The memory of the auditor device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the auditor device is used to exchange information between the processor and the external device. The communication interface of the auditor device is used for conducting wired or Wireless communication with an external terminal, and the Wireless communication can be realized through Wireless-Fidelity (WIFI), a mobile cellular network, near field communication (Near Field Communication, NFC) or other technologies. The computer program, when executed by the processor, implements a method for auditing an inquiry function. The display unit of the auditor device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the auditing party equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the housing of the auditing party equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
In one embodiment, as shown in fig. 2, there is provided a method for auditing a license, which may be performed by an auditor device in fig. 1, where the auditor device may be a terminal of an auditor corresponding to a node accessing a blockchain network, and the method specifically includes the following steps:
and S201, responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited.
The inquiry function is written files which are filled in by the auditing requirement party according to the standard format required by the auditing party and are used for verifying whether the content to be audited is real, legal and complete. The inquiry letter comprises various types of certificates, audit contents and the like, wherein the various types of certificates can comprise official certificates, financial certificates, legal certificates and the like, and the audit contents can comprise contents related to assets and the like. The auditing party refers to a party auditing the inquiry function to be audited. For example, the auditor may be a financial institution. The auditing requirement party can be a party which sends a check-to-be-verified license to a node in the auditing party access blockchain network and needs to inquire and receive the checked license when the auditing requirement party has the requirement of inquiring the audited object (unit). For example, the auditing demander may be an auditing entity.
The check-up letter to be checked refers to a check-up letter which needs to be checked by an auditing party. The inquiry function auditing request refers to a request of auditing the inquiry function sent to a node in the access blockchain network of the auditor when the auditing requirement party has the requirement of inquiring the audited unit.
In an alternative embodiment, the inquiry function auditing request includes an inquiry function to be audited, and when the terminal of the auditor receives the inquiry function auditing request sent by the auditing requirement party, the inquiry function to be audited can be directly obtained from the inquiry function auditing request.
In another optional implementation manner, the query verification request includes an acquisition mode of a query to be verified, specifically, the query verification request may include an identifier and an acquisition address of the query to be verified, where the identifier of the query to be verified is a unique identifier corresponding to information of the query to be verified, and optionally, the identifier of the query to be verified may be generated based on the information of the query to be verified. Optionally, when receiving the inquiry verification request sent by the verification demand party, the terminal of the verification party can acquire the identifier and the acquisition address of the to-be-verified inquiry, and the to-be-verified inquiry can be acquired according to the identifier and the acquisition address.
S202, checking the inquiry function to be checked.
Optionally, the intelligent contract may be invoked to perform at least one of verification and verification, format verification, and content verification on the to-be-verified license.
The intelligent contract in the embodiment refers to a computer program agreed between the auditing requirement party and the auditing party, and the computer program refers to content in the inquiry function, format of the inquiry function, related documents such as various types of chapters and the like.
Verification and verification refers to verifying whether various types of chapters in the inquiry letter are correct. For example, check if official seal, financial seal, legal seal, etc. in the inquiry letter are correct. Format auditing refers to auditing that whether the format of the Inquiry meets the standard format required by an auditing party, and content auditing refers to auditing that whether the content in the Inquiry is correct, for example, whether the content related to the asset is correct.
In order to ensure the accuracy of the to-be-checked and verified certificate, after the to-be-checked and verified certificate is acquired, programs, such as content in the certificate, format of the certificate, various types of chapters and the like, related certificates in the intelligent contract are called, and at least one of the content, format and various types of chapters in the to-be-checked and verified certificate is subjected to checking processing, so that whether the content, format and various types of chapters in the to-be-checked and verified certificate are correct or not is confirmed.
And S203, if the verification passes, adding the information of the auditor to the to-be-verified inquiry function to obtain the verified inquiry function.
The auditing party information refers to information of an auditing party added to the to-be-audited inquiry function in the process of auditing the to-be-audited inquiry function, for example, the auditing party information can comprise a official seal of the auditing party (for example, a official seal of a financial institution), a signature, time for the auditing party to pass the auditing of the to-be-audited inquiry function, and the like.
In this embodiment, after confirming that the content, format and various types of chapters in the to-be-verified and polled license are correct, the terminal of the auditor may add information of the auditor to the to-be-verified and polled license, for example, add a official chapter of the auditor (for example, a official chapter of a financial institution), a signature, a time for the auditor to pass the audit of the to-be-verified and polled license, and so on, thereby obtaining the verified and polled license.
Optionally, if the terminal of the auditor confirms that the content, the format and at least one of the various types of chapters in the to-be-audited inquiry function have errors, the terminal of the auditor can directly link and broadcast the message which is not audited by the to-be-audited inquiry function without adding information of the auditor to the to-be-audited inquiry function.
S204, encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
The check ciphertext is ciphertext obtained after the checked check is encrypted.
Optionally, in order to ensure the security of the checked and verified license stored on the blockchain, in this embodiment, the terminal of the checking party may encrypt the checked and verified license, and the obtained encrypted and corresponding check ciphertext of the checked and verified license. Optionally, the verified verification letter can be encrypted by adopting a privacy certification method, and the obtained verification letter ciphertext corresponding to the encrypted verified verification letter can be obtained.
In order to facilitate the subsequent search of the block comprising the check ciphertext in the blockchain network, in this real-time example, an association relationship between the check ciphertext and the check to be verified can be established, the check ciphertext, the check to be verified and the association relationship between the check ciphertext and the check to be verified are stored together in the blockchain network, so that the subsequent verification demander can conveniently search the check ciphertext in the blockchain network based on the check to be verified.
Optionally, an association relation between the query function ciphertext and the identification of the to-be-checked query function can be established, the query function ciphertext, the identification of the to-be-checked query function and the association relation are stored in the blockchain network together, and a follow-up checking demander can conveniently search the query function ciphertext in the blockchain network based on the identification of the to-be-checked query function.
According to the verification method of the verification function, firstly, the verification request of the verification function sent by the verification demand party is responded to, and the verification function to be verified is obtained; checking the check letter to be checked; if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate; and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party. Obviously, the security of the checked and verified check is ensured by encrypting the checked and verified check, and the check of the checked and verified check is carried out on line, so that the check process of the check is carried out in a mode of manually mailing the check or a parent check mode, the labor cost and the audit time can be reduced, and the audit efficiency is improved. In addition, the application carries out the associated uplink storage of the query ciphertext and the query to be checked, can facilitate the subsequent tracing, can prevent the query ciphertext and the query to be checked from being tampered, and ensures the security of the query ciphertext and the query to be checked.
Based on the above embodiment, this embodiment provides an alternative implementation manner of obtaining the checked and verified certificate, specifically as shown in fig. 3, including the following steps:
And S301, signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor.
The digital signature is a section of digital string which is obtained by encrypting information data by an auditor and cannot be forged by other people, the section of digital string is an effective proof for the authenticity of information sent by the auditor, and the digital signature is similar to a common physical signature of a paper version.
Alternatively, a private key refers to a key that is owned by itself, which is typically used to encrypt a session key, verify a digital signature, or encrypt data that can be decrypted with a corresponding public key.
In this embodiment, a private key of an auditing party may be used to encrypt specific content or all content in a to-be-audited certificate, so as to obtain a digital string related to the content, and the digital string is used as a digital signature of the auditing party, where the specific content may include a official seal and an asset of an audited object.
S302, the digital signature and the verification passing time of the auditor are used as auditor information to be added into the to-be-verified verification function, and the verified verification function is obtained.
The auditing passing time refers to the time when an auditing party audits and passes the inquiry function to be audited.
In the embodiment, after confirming that the verification of the to-be-verified and inquired letter passes, the terminal of the auditor adds a corresponding time stamp and a corresponding digital signature for the to-be-verified and inquired letter based on the verification passing time and the digital signature, and further obtains the checked and inquired letter.
Obviously, in the embodiment, the private key of the auditing party is adopted to encrypt the to-be-audited inquiry certificate, so as to obtain the digital signature of the auditing party, and the corresponding time stamp and the digital signature are added for the to-be-audited inquiry certificate to pass the auditing, so that the checked inquiry certificate is obtained. The digital signature of the auditor is added to the checked and verified certificate and the corresponding time stamp is passed, so that the security and the non-tamper property of the checked and verified certificate are ensured.
Based on the above embodiment, as shown in fig. 4, this embodiment provides an alternative implementation manner for obtaining the check text, which specifically includes the following steps:
s401, searching a public key of the auditing requirement party from the blockchain network.
The public key of the auditing requirement party corresponds to the private key of the auditing party, and is used for decrypting the data encrypted by the private key of the auditing party.
Alternatively, the public key of the auditing demander may be queried from the blockchain network. Specifically, the auditing requirement party can broadcast its own public key to the blockchain in advance for uplink storage. Optionally, an association storage relationship between the identification information of the auditing requirement party and the public key of the auditing requirement party may be pre-established, and the association storage relationship between the identification information of the auditing requirement party and the public key of the auditing requirement party is broadcasted to the blockchain for uplink storage, where the identification information of the auditing requirement party may be the number, the ID, etc. of the auditing requirement party, and the identification information of the auditing requirement party and the public key of the auditing requirement party are in one-to-one correspondence in the association storage relationship.
In this embodiment, since the terminal of the auditing party belongs to the blockchain node, the terminal of the auditing party may query the public key of the auditing party corresponding to the identification information of the auditing party from the blockchain network based on the relationship between the identification information of the auditing party and the public key of the auditing party.
S402, encrypting the checked check-up letter based on the public key of the checking-up demand party to obtain a check-up letter ciphertext.
Optionally, after the terminal of the auditing party obtains the public key of the auditing party, the public key of the auditing party can encrypt the verified and inquired letter, thereby obtaining the inquired letter ciphertext corresponding to the verified and inquired letter.
In this embodiment, a public key of the auditing requirement party is obtained, and the authenticated inquiry function is encrypted based on the public key of the auditing requirement party, so as to obtain an inquiry function ciphertext. The public key of the auditing requirement party is used for encrypting the audited inquiry function, so that the safety of the audited inquiry function is ensured, and the subsequent auditing requirement party can conveniently decrypt the audited inquiry function from the inquiry function ciphertext based on the private key of the follow-up auditing requirement party.
On the basis of the embodiment, after the related uplink storage of the query ciphertext and the to-be-checked query, the method further comprises: and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
The state information of the check-up letter refers to the check state of the check-up letter, and optionally, the state information of the check-up letter comprises the state of the check-up letter received, the state of failed verification and the state of passed verification. The inquiry function to be inquired refers to a request for inquiring the inquiry function to be inquired, which is sent to a terminal of an auditor when the auditor has the requirement for inquiring the inquiry function to be inquired. The inquiry request of the inquiry function refers to a request for inquiring the inquiry function to be inquired, which is sent by an auditing party in the direction of auditing the demand, wherein the request can comprise the inquiry function to be inquired or the identification of the inquiry function to be inquired. The to-be-queried query function can be a to-be-checked query function, and the to-be-queried query function identifier can be a to-be-checked query function identifier.
In this embodiment, after the query ciphertext and the query to be checked are stored in a linked manner, the terminal of the auditor changes the state information of the query to be checked into a verification passing state, so that after the subsequent audit requirement party determines that the state information of the query to be checked is the verification passing state, the audit requirement party can use the query to be checked as the query to be queried (i.e. the query to be queried), and sends a request for querying the query to the auditor.
Obviously, in the embodiment, after the terminal of the auditing party changes the state information of the to-be-audited inquiry function into the verification passing state, the auditing party can send a request for inquiring the to-be-inquired inquiry function to the auditing party without waiting for manually mailing the audited inquiry function, so that the labor cost and auditing time can be reduced, and the auditing efficiency is improved.
On the basis of carrying out associated uplink storage on the ciphertext of the query and the query to be checked, the embodiment provides an alternative implementation mode for obtaining the checked query corresponding to the query to be checked, and specifically as shown in fig. 5, the method comprises the following steps:
s501, responding to a query request of the query function sent by the auditing requirement party, and determining the query function to be queried.
The inquiry function to be inquired can be the same as or different from the inquiry function to be checked.
In this embodiment, after detecting that the state information of the to-be-checked and verified letters is a verified state, the checking requiring party uses the to-be-checked and verified letters as the letters to be queried (i.e. the to-be-queried letters to be queried), sends a request for querying the to-be-queried letters to the checking party, and the terminal of the checking party receives the request for querying the to-be-queried letters sent by the checking requiring party, and determines the to-be-queried letters to be queried based on the query request of the letters to be queried. Optionally, if the query request includes the query to be performed (i.e., the query to be checked), the query to be performed (i.e., the query to be checked) may be directly obtained from the query request.
S502, searching a query function ciphertext corresponding to the query function to be queried from the blockchain network.
Optionally, the to-be-checked query function is taken as the to-be-checked query function, and the association relationship between the query function ciphertext and the to-be-checked query function is established before the terminal of the auditor, so that the query function ciphertext corresponding to the to-be-checked query function (i.e. the to-be-checked query function) can be determined according to the association relationship and the to-be-checked query function.
Or, because the terminal of the auditor has previously established the association between the query ciphertext and the identification of the query to be audited, the query ciphertext corresponding to the identification of the query to be audited can be determined based on the association between the query ciphertext established before the terminal of the auditor and the identification of the query to be audited.
And S503, feeding back the query cipher text corresponding to the query to the auditing requirement party for the auditing requirement party to decrypt the checked query corresponding to the query from the query cipher text corresponding to the query to be queried based on the private key of the auditing requirement party.
Optionally, after obtaining the query cipher text corresponding to the query to be queried, sending the query cipher text corresponding to the query to the auditing requirement party so as to facilitate the auditing requirement party to decrypt the query cipher text corresponding to the query to be queried based on the private key of the auditing requirement party, and further decrypting the verified query corresponding to the query from the query cipher text.
Optionally, if the auditing requirement party needs to query the auditing party information added in the checked and verified license, the auditing party information added in the checked and verified license can be decrypted based on the auditing party public key published in the blockchain in advance by the auditing party, so as to obtain the auditing party information added in the checked and verified license.
Obviously, in this embodiment, when receiving the inquiry request of the inquiry function sent by the checking requirement party, the inquiry function ciphertext corresponding to the inquiry function to be checked can be searched from the blockchain network, and the inquiry function ciphertext is fed back to the checking requirement party, so that the checking requirement party can conveniently obtain the checked inquiry function corresponding to the inquiry function to be checked. Obviously, in the embodiment, after receiving the inquiry function query request, the terminal of the auditing party can send the inquiry function ciphertext corresponding to the inquiry function to be queried to the auditing demand party, so that the mode of waiting for manually mailing the audited inquiry function is not needed, the labor cost and the auditing time can be reduced, and the auditing efficiency is improved. And the terminal of the auditing party sends the inquiring function ciphertext corresponding to the inquiring function to the auditing party, and only the private key of the auditing party can decrypt the inquiring function ciphertext to obtain the checked inquiring function corresponding to the inquiring function ciphertext, thereby ensuring the authenticity and the security of the checked inquiring function.
On the basis of the embodiment, as shown in fig. 6, the application also provides another verification method of the inquiry function, which comprises the following steps:
s601, responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited.
S602, invoking an intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
And S603, if the auditing is passed, signing the inquiry function to be audited according to the private key of the auditing party, and obtaining the digital signature of the auditing party.
S604, adding the digital signature of the auditor and the auditing passing time as auditor information into the to-be-audited inquiry function to obtain the audited inquiry function.
S605, searching the public key of the auditing requirement party from the blockchain network.
S606, encrypting the checked and verified check-up letter based on the public key of the checking and requiring party to obtain a check-up letter ciphertext, and carrying out associated uplink storage on the check-up letter ciphertext and the check-up letter to be checked for the checking and requiring party to inquire.
S607, adjusting the state information of the to-be-checked and inquired letters to pass verification, so that the checking requirement party can send the inquiry request of the to-be-checked and inquired letters as the to-be-inquired and inquired letters after detecting that the state information of the to-be-checked and inquired letters pass verification.
And S608, responding to the inquiry function inquiry request sent by the auditing requirement party, and determining the inquiry function to be inquired.
S609, searching a query function ciphertext corresponding to the query function to be queried from the blockchain network.
And S610, feeding back the query cipher text corresponding to the query to the auditing requirement party for the auditing requirement party to decrypt the checked query corresponding to the query from the query cipher text corresponding to the query to be queried based on the private key of the auditing requirement party.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an inspection device for the inquiry function, which is used for realizing the inspection method of the inquiry function. The implementation scheme of the solution to the problem provided by the device is similar to the implementation scheme and beneficial effects described in the above method, so the specific limitation in the embodiment of the audit device for one or more Inquiries provided below can be referred to the limitation of the audit method for one Inquiry, and is not repeated here.
In one embodiment, as shown in fig. 7, there is provided an audit device for a license, including:
the obtaining module 701 is configured to obtain a to-be-checked license in response to a license checking request sent by a checking requirement party;
the auditing module 702 is used for auditing the inquiry function to be audited;
the adding module 703 is configured to add the information of the auditor to the to-be-audited verification function if the audit passes, so as to obtain an audited verification function;
and the encryption module 704 is used for carrying out encryption processing on the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters for inquiry by a check demander.
In one embodiment, the auditing module 702 is specifically configured to:
And calling the intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
In one embodiment, the adding module 703 is specifically configured to:
signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as auditing party information into the to-be-audited inquiry function to obtain the audited inquiry function.
In one embodiment, the encryption module 704 is specifically configured to:
searching a public key of an audit requiring party from a blockchain network;
and encrypting the checked verification function based on the public key of the checking demand party to obtain a verification function ciphertext.
In one embodiment, the apparatus further comprises a feedback module, the feedback module being specifically configured to:
responding to an inquiry function inquiry request sent by an auditing requiring party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party for the auditing requirement party to decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter secret corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
In one embodiment, the apparatus further comprises an adjustment module, the adjustment module being specifically configured to:
and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
All or part of the modules in the checking device of the check letter can be realized by software, hardware and a combination thereof. The above modules can be embedded in hardware or independent from a processor in the auditor device of the auditor device, or can be stored in software in a memory in the auditor device of the auditor device, so that the processor can call and execute the operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be an auditor device, the internal structure of which may be as shown in FIG. 8. The auditor device comprises a processor, a memory, a communication interface, a display screen and an input device which are connected through a system bus. Wherein the processor of the auditor device is configured to provide computing and control capabilities. The memory of the auditor device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the auditing party device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by the processor, enables auditing of the polled letter. The display screen of the auditing party equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the auditing party equipment can be a touch layer covered on the display screen, can also be keys, a track ball or a touch pad arranged on the shell of the auditing party equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the architecture shown in fig. 8 is merely a block diagram of some of the architecture associated with the inventive arrangements and is not limiting of the auditor apparatus to which the inventive arrangements are applied, and that a particular auditor apparatus may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
The application also provides a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited; checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In one embodiment, auditing the inquiry function to be audited includes:
and calling the intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
In one embodiment, adding the auditor information to the to-be-audited inquiry certificate to obtain the audited inquiry certificate includes:
signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as auditing party information into the to-be-audited inquiry function to obtain the audited inquiry function.
In one embodiment, the encrypting process for the checked inquiry letter to obtain the inquiry letter ciphertext comprises the following steps:
searching a public key of an audit requiring party from a blockchain network;
and encrypting the checked verification function based on the public key of the checking demand party to obtain a verification function ciphertext.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
responding to an inquiry function inquiry request sent by an auditing requiring party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party for the auditing requirement party to decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter secret corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
The present application also provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of: responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In one embodiment, auditing the inquiry function to be audited includes:
and calling the intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
In one embodiment, adding the auditor information to the to-be-audited inquiry certificate to obtain the audited inquiry certificate includes:
signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as auditing party information into the to-be-audited inquiry function to obtain the audited inquiry function.
In one embodiment, the encrypting process for the checked inquiry letter to obtain the inquiry letter ciphertext comprises the following steps:
searching a public key of an audit requiring party from a blockchain network;
and encrypting the checked verification function based on the public key of the checking demand party to obtain a verification function ciphertext.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
responding to an inquiry function inquiry request sent by an auditing requiring party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party for the auditing requirement party to decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter secret corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
The application also provides a computer program product. The computer program product comprising a computer program which, when executed by a processor, performs the steps of:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified and verified certificate, and obtaining the verified and verified certificate;
and encrypting the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification letters to be checked for inquiry by a check and requirement party.
In one embodiment, auditing the inquiry function to be audited includes:
and calling the intelligent contract to perform at least one of verification and verification, format verification and content verification on the verification and verification letter to be verified.
In one embodiment, adding the auditor information to the to-be-audited inquiry certificate to obtain the audited inquiry certificate includes:
signing the inquiry function to be audited according to the private key of the auditor to obtain the digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as auditing party information into the to-be-audited inquiry function to obtain the audited inquiry function.
In one embodiment, the encrypting process for the checked inquiry letter to obtain the inquiry letter ciphertext comprises the following steps:
searching a public key of an audit requiring party from a blockchain network;
and encrypting the checked verification function based on the public key of the checking demand party to obtain a verification function ciphertext.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
responding to an inquiry function inquiry request sent by an auditing requiring party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party for the auditing requirement party to decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter secret corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
In one embodiment, after the inquiring function ciphertext and the to-be-checked inquiring function are stored in a linked mode, the method further comprises the steps of:
and adjusting the state information of the to-be-checked evidence inquiry function to pass verification so that the checking requirement party can send an inquiry function inquiry request to the checking party by taking the to-be-checked evidence inquiry function as the to-be-checked evidence inquiry function after detecting that the state information of the to-be-checked evidence inquiry function passes verification.
The data (including, but not limited to, data for analysis, data stored, data displayed, etc.) related to the present application are all data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above-described methods in accordance with the embodiments may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application, which are described in detail and are not to be construed as limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.

Claims (10)

1. An audit method of an inquiry letter, which is characterized by comprising the following steps:
responding to an inquiry function auditing request sent by an auditing demand party, and acquiring an inquiry function to be audited;
checking the check-up letter to be checked;
if the verification passes, adding the information of the auditor to the to-be-verified inquiry certificate to obtain a verified inquiry certificate;
and encrypting the checked inquiry function to obtain an inquiry function ciphertext, and carrying out association uplink storage on the inquiry function ciphertext and the check inquiry function to be checked for inquiry by the check demander.
2. The method of claim 1, wherein auditing the to-be-audited certificate comprises:
and calling an intelligent contract to carry out at least one checking process of checking and checking the seal, checking the format and checking the content on the check and check license.
3. The method of claim 1, wherein adding auditor information to the to-be-audited polled letter to obtain an audited polled letter, comprising:
signing the to-be-verified certificate according to a private key of the auditor to obtain a digital signature of the auditor;
and adding the digital signature of the auditing party and the auditing passing time as the auditing party information into the check-up letter to be checked to obtain the checked check-up letter.
4. The method of claim 1, wherein the encrypting the verified license to obtain the license ciphertext comprises:
searching a public key of the auditing requirement party from a blockchain network;
and encrypting the checked verification letter based on the public key of the checking requiring party to obtain a verification letter ciphertext.
5. The method of claim 4, wherein after said correlating said query ciphertext with said pending query for storage in a chain, further comprising:
Responding to the inquiry function inquiry request sent by the auditing requirement party, and determining an inquiry function to be inquired;
searching a query function ciphertext corresponding to the query function to be queried from the blockchain network;
and feeding back the inquiry letter ciphertext corresponding to the inquiry letter to the auditing requirement party so that the auditing requirement party can decrypt the checked inquiry letter corresponding to the inquiry letter to be inquired from the inquiry letter ciphertext corresponding to the inquiry letter to be inquired based on the private key of the auditing requirement party.
6. The method of claim 5, wherein after said correlating said query ciphertext with said pending query for storage in a chain, further comprising:
and adjusting the state information of the to-be-checked inquiry function to pass verification so that the checking requirement party can send an inquiry function query request to the checking party by taking the to-be-checked inquiry function as the to-be-checked inquiry function after detecting that the state information of the to-be-checked inquiry function passes verification.
7. An audit device for an inquiry letter, said device comprising:
the acquisition module is used for responding to the inquiry letter checking request sent by the checking demand party to acquire the inquiry letters to be checked;
The auditing module is used for auditing the check-up letter to be audited;
the adding module is used for adding the information of the auditor to the to-be-audited verification function if the audit is passed, so as to obtain an audited verification function;
and the encryption module is used for carrying out encryption processing on the checked and verified inquiry letters to obtain inquiry letter ciphertext, and carrying out associated uplink storage on the inquiry letter ciphertext and the check and verification inquiry letters so as to be inquired by the check and verification demander.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
CN202310704613.2A 2023-06-14 2023-06-14 Verification method, device, equipment and storage medium for inquiring letters Pending CN116910775A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310704613.2A CN116910775A (en) 2023-06-14 2023-06-14 Verification method, device, equipment and storage medium for inquiring letters

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310704613.2A CN116910775A (en) 2023-06-14 2023-06-14 Verification method, device, equipment and storage medium for inquiring letters

Publications (1)

Publication Number Publication Date
CN116910775A true CN116910775A (en) 2023-10-20

Family

ID=88365762

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310704613.2A Pending CN116910775A (en) 2023-06-14 2023-06-14 Verification method, device, equipment and storage medium for inquiring letters

Country Status (1)

Country Link
CN (1) CN116910775A (en)

Similar Documents

Publication Publication Date Title
CN109034924B (en) Electronic bill generating method, electronic bill generating device, storage medium and computer equipment
CN110428293B (en) Data processing method, device, storage medium and equipment for electronic bill
CN109255084B (en) Electronic bill query method, device, storage medium and computer equipment
WO2019214312A1 (en) Blockchain-based logistics information transmission method, system and device
US10402784B2 (en) Dynamic notary system
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
WO2019200755A1 (en) Data obtaining method and apparatus, and computer device and storage medium
CN112106324A (en) Methods, computer program products and devices for creating, registering and verifying digitally stamped assets
CN110543510B (en) Bill data processing method, device, storage medium and computer equipment
US20190245693A1 (en) Systems and Methods for Use in Managing Digital Identities
CN111798209A (en) Engineering project management method based on block chain, electronic equipment and storage medium
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
CN111260488B (en) Data processing method and device and readable storage medium
CN111651794A (en) Alliance chain-based electronic data management method and device and storage medium
CN111460525A (en) Data processing method and device based on block chain and storage medium
CN110569672A (en) efficient credible electronic signature system and method based on mobile equipment
TWI734729B (en) Method and device for realizing electronic signature and signature server
CN111311259A (en) Bill processing method, device, terminal and computer readable storage medium
CN116962021A (en) Method, device, equipment and medium for user real name authentication in financial cooperative institution
CN109818965B (en) Personal identity verification device and method
CN116015846A (en) Identity authentication method, identity authentication device, computer equipment and storage medium
CN112948894A (en) Block chain-based anti-counterfeiting method, device, equipment and medium for tally inspection report
CN116318826A (en) Power safety control method based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination