CN117118632A - Function certificate management all-in-one equipment based on blockchain - Google Patents

Function certificate management all-in-one equipment based on blockchain Download PDF

Info

Publication number
CN117118632A
CN117118632A CN202311088007.9A CN202311088007A CN117118632A CN 117118632 A CN117118632 A CN 117118632A CN 202311088007 A CN202311088007 A CN 202311088007A CN 117118632 A CN117118632 A CN 117118632A
Authority
CN
China
Prior art keywords
letter
party
data
block data
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311088007.9A
Other languages
Chinese (zh)
Inventor
张立文
邱望洁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Caizhi Sharing Beijing Technology Service Co ltd
Original Assignee
Caizhi Sharing Beijing Technology Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Caizhi Sharing Beijing Technology Service Co ltd filed Critical Caizhi Sharing Beijing Technology Service Co ltd
Priority to CN202311088007.9A priority Critical patent/CN117118632A/en
Publication of CN117118632A publication Critical patent/CN117118632A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0209Architectural arrangements, e.g. perimeter networks or demilitarized zones
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • H04L63/1458Denial of Service
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/40Network security protocols
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application provides a block chain-based function management all-in-one machine device, which comprises: the anti-DDOS service unit is used for providing a cloud firewall; the VPC application unit comprises a front-end server and a back-end server, wherein the front-end server is connected with the terminal user through the cloud firewall and is used for providing public network access service; the back-end server is respectively connected with the blockchain system and the DSC data security center, and comprises: the system comprises an issue function making unit, an inquiry unit and a report generating unit; the DSC data security center is used for storing the function certificate data generated by the VPC application unit. In the function management, the device combines the first block data, the second block data, the identification of the sender and the identification of the checked party, encrypts the combined first block data and the second block data to generate an encryption block, and stores the encryption block in a block chain system, so that the safety of the data is greatly improved.

Description

Function certificate management all-in-one equipment based on blockchain
Technical Field
The application relates to the technical field of electronic letter and information processing, in particular to a block chain-based letter management integrated machine device.
Background
Introduction to the prior art:
electronic letter certificate: with the rapid development of information technology, electronic letter is an important way to replace traditional paper letter. The electronic letter technology enables creation, transmission and storage of letters to be more efficient, convenient and environment-friendly.
Blockchain techniques: the distributed ledger and non-tamper-ability of blockchains make it an ideal choice to ensure the security, integrity and trustworthiness of the underlying data. By means of the blockchain technology, the letter can achieve decentralised storage and verification, trust problems are eliminated, and traceability and transparency are provided.
Data encryption and security techniques: the letter management system needs to protect the security and privacy of sensitive data. The application of security technologies such as data encryption technology, identity authentication mechanism and access control can effectively prevent data leakage and unauthorized access.
The paper letter has the defects that: the traditional paper letter management has some disadvantages such as easy loss, large tampering risk, inconvenient storage and retrieval and the like. These problems have prompted the need for more efficient, secure and traceable letter management solutions, which has led to the development of third party letter management systems.
However, in the prior art, after the common operation of each node in the blockchain system, the blockchain uploading system is generated, so that redundant blocks of the blockchain system are more, the subsequent access efficiency is affected, and the common operation is that all nodes participate, so that the communication efficiency between the nodes is lower, and the secret key of the encryption algorithm adopted in the blockchain system is generally in a fixed or random generation mode, so that the security of the encrypted data is low.
Disclosure of Invention
The present application proposes the following technical solution to one or more of the above technical drawbacks of the prior art.
A blockchain-based letter management all-in-one device, the device comprising: a DDOS resistant service unit, a VPC application unit and a DSC data security center,
the DDOS resistant service unit is used for providing a cloud firewall;
the VPC application unit comprises a front-end server and a back-end server,
the front-end server is connected with the terminal user through the cloud firewall and is used for providing public network access service;
the back-end server is respectively connected with the blockchain system and the DSC data security center,
the backend server includes: the system comprises an issue function making unit, an inquiry unit and a report generating unit;
the DSC data security center is used for storing the function certificate data generated by the VPC application unit.
Still further, the letter making unit is configured to make a letter: after the sender completes the electronic letter in the blockchain system, the sender sends the generated identification of the electronic letter and the identification of the sender to the blockchain system, the blockchain system acquires the identification of the checked party based on the identification of the electronic letter and the identification of the sender, and the blockchain system acquires the letter authorization information of the checked party on the electronic letter based on the identification of the checked party;
the inquiry unit is used for inquiring: the method comprises the steps that a letter issuing party obtains and analyzes letter authorization information through a block chain system, if the analyzed letter authorization information is authorized to pass, the letter issuing party calls a first intelligent contract for common identification operation, the first intelligent contract is issued by a management node of the block chain system, first block data are generated after the electronic letter common identification operation passes, the first block data are sent to a checked party, the checked party generates return data based on the first block data, signs the first block data, and sends the return data and the signed first block data to the letter issuing party;
the report generation unit is used for generating a report: and after receiving the signed first block data, the sender calls a second intelligent contract to verify the signed first block data, after the verification is passed, calls a third intelligent contract to carry out consensus operation on the reply data, the reply consensus operation is passed, generates second block data based on the reply data, combines the first block data, the second block data, the identification of the sender and the identification of the checked party, then encrypts the first block data, the second block data, the identification of the checked party and the identification of the checked party, generates an encryption block, and stores the encryption block in the block chain system, wherein the second intelligent contract is issued by a management node of the block chain system, and the third intelligent contract is generated by the checked party.
Still further, the function certificate authority is an electronic signature or an electronic signature.
Still further, the blockchain system provides an electronic letter template and a reply template, the letter party obtains the examination data characteristics of the examined party based on the identification of the examined party, the letter party loads the corresponding electronic letter template through a first relation table based on the examination data characteristics of the examined party after logging in the blockchain system, the examined party loads the corresponding reply template through the electronic letter template based on a second relation table, and the blockchain system is provided with a first relation table of the examination data characteristics and the electronic letter template and a second relation table of the reply template and the letter template.
Still further, the number of nodes participating in the consensus operation defined in the first smart contract is smaller than the number of nodes participating in the consensus operation defined in the second smart contract.
Further, the operations of encrypting the first block data, the second block data, the identity of the letter party and the identity of the inspected party after merging are as follows:
acquiring a time stamp T1 of the first block data and a time stamp T2 of the second block data;
judging whether the value of T2-T1 is smaller than a first threshold value, if so, merging the first block data, the second block data, the identification of the sender and the identification of the audited party to obtain merged block data, if not, discarding the first block data and the second block data, and returning to the inquiry step;
processing the value of the T2-T1, the identification SID of the sender and the identification BID of the audited party to obtain a preprocessing key Prekey as an initial value to be input into a graph neural network to obtain an encryption key, encrypting the merging block data by using the encryption key, and storing the encrypted merging block data in the blockchain system;
wherein, representing an exclusive or operation;
the graph of the graph neural network is formed by the following modes: the nodes in the blockchain system are nodes in the graph, the edges in the graph are communication relationships between the nodes in the blockchain system,
the characteristic values of the nodes in the graph are as follows:
ΔT i representing node N i Timestamp T of last two participation consensus calculations i And T is i-1 Difference of C i,k Represents the N < th k The characteristic values of the individual nodes, i represents the number of the block, sigma represents the influence coefficient of the characteristic value of the previous period of the node on the characteristic value of the current period, n represents the number of adjacent nodes of the current node, and k and l represent integers which are larger than or equal to 1;
the weights of the edges in the graph are:
wherein i and j are natural numbers greater than 1.
Still further, the blockchain system is communicatively coupled to the backend server via a plurality of blockchain service nodes.
Further, the cloud firewall provided by the DDOS-resistant service unit is used for intercepting malicious HTTP requests and preventing DDOS attacks.
Still further, the all-in-one device further comprises a processor, a memory, a hard disk, a network system and a power supply system.
The application has the technical effects that: the method comprises the steps that a letter sender calls a first intelligent contract to conduct consensus operation on the electronic letter authorized by the letter, first block data are generated after the electronic letter consensus operation is passed, the first block data are sent to a checked party, at the moment, the first block data are not written into a blockchain system, after the letter sender receives the reply data and signed first block data, a second intelligent contract is called to verify the reply data and signed first block data, after verification is passed, a third intelligent contract is called to conduct consensus operation on the reply data, second block data are generated after the letter data consensus operation is passed, the first block data, the second block data, the identification of the letter sender and the identification of the checked party are combined and encrypted, and then an encrypted block is generated and stored in the blockchain system, so that the data access efficiency in a blockchain is greatly improved, the corresponding operation relation of a first block chain is set, the corresponding operation is convenient and fast, and the operation efficiency of a template is improved; in the application, the encryption key generation mode of an encryption algorithm in a block chain system is improved, the encryption key is generated by using a graph neural network after a preprocessing key Prekey is obtained based on the time stamps of two blocks, the identification SID of an originating party and the identification BID of a checked party, and the specific calculation mode of the preprocessing key Prekey is provided, so that the safety of data is improved.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings.
FIG. 1 is a schematic diagram of a blockchain-based letter management all-in-one machine in accordance with an embodiment of the application.
Detailed Description
The application is described in further detail below with reference to the drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the application and are not limiting of the application. It should be noted that, for convenience of description, only the portions related to the present application are shown in the drawings.
It should be noted that, without conflict, the embodiments of the present application and features of the embodiments may be combined with each other. The application will be described in detail below with reference to the drawings in connection with embodiments.
FIG. 1 illustrates a blockchain-based letter management all-in-one of the present application, the all-in-one comprising: a DDOS resistant service unit 1, a VPC application unit 2 and a DSC data security centre 3,
the VPC application unit adopts a VPC network environment, the VPC (Virtual Private Cloud, private network) is an isolated network environment constructed based on a cloud server, a VPC user can customize network topology, the network topology comprises selecting own IP address range, dividing network segments, configuring a routing table, a gateway and the like, the VPC application unit is connected with an original data center through a private line or VPN, resources on and under the cloud use the same network address planning, and smooth migration and cloud-up of the application are realized. A network with strict security access control is constructed through a VPC network, and security isolation of core data and effective access from public network access are simultaneously considered. The user may deploy a core server or database system that handles core data and services in a first subnet that is inaccessible to the public network, and deploy a web server that is accessible to the public network in a second subnet environment, and connect the second subnet with the public network. In the VPC network, a user can realize access control to core data and a service server through access control among sub-networks, and the access requirement of a public network is met while ensuring the security and the controllability of the core data.
The VPC application unit further includes a front end server 21 and a back end server 22, the back end server 22 is connected with the blockchain system, and when the back end server works, the back end server includes an letter making unit 221, an inquiry unit 222 and a report generating unit 223, which respectively implement the following functions: letter making, inquiring and production reporting, wherein:
the letter making unit 221 is configured to make a letter: after the sender completes the electronic letter in the blockchain system, the sender sends the generated identification of the electronic letter and the identification of the sender to the blockchain system, the blockchain system acquires the identification of the checked party based on the identification of the electronic letter and the identification of the sender, and the blockchain system acquires the letter authorization information of the checked party on the electronic letter based on the identification of the checked party;
the inquiry unit 222 is configured to inquire: the method comprises the steps that a letter issuing party obtains and analyzes letter authorization information through a block chain system, if the analyzed letter authorization information is authorized to pass, the letter issuing party calls a first intelligent contract for common identification operation, the first intelligent contract is issued by a management node of the block chain system, first block data are generated after the electronic letter common identification operation passes, the first block data are sent to a checked party, the checked party generates return data based on the first block data, signs the first block data, and sends the return data and the signed first block data to the letter issuing party;
the report generating unit 223 is configured to generate a report: and after receiving the signed first block data, the sender calls a second intelligent contract to verify the signed first block data, after the verification is passed, calls a third intelligent contract to carry out consensus operation on the reply data, the reply consensus operation is passed, generates second block data based on the reply data, combines the first block data, the second block data, the identification of the sender and the identification of the checked party, then encrypts the first block data, the second block data, the identification of the checked party and the identification of the checked party, generates an encryption block, and stores the encryption block in the block chain system, wherein the second intelligent contract is issued by a management node of the block chain system, and the third intelligent contract is generated by the checked party.
In the application, the sender calls the first intelligent contract to carry out consensus operation on the electronic letter authorized by the letter, the first block data is generated after the electronic letter consensus operation passes, the first block data is sent to the checked party, at the moment, the first block data is not written into a block chain system, but after the sender receives the reply data and the signed first block data, the second intelligent contract is called to verify the reply data and the signed first block data, after the verification passes, the third intelligent contract is called to carry out consensus operation on the reply data, the second block data is generated after the reply data consensus operation passes, the first block data, the second block data, the identification of the sender and the identification of the checked party are combined and then encrypted, and an encryption block is generated and stored in the block chain system, so that the generation of a large number of redundant blocks in the block chain system is avoided, and the data access efficiency in the block chain is greatly improved.
In the application, the letter certificate authority is an electronic signature or an electronic signature, namely, the sender can send out the letter only after being authorized by the auditor.
In one embodiment, the blockchain system provides an electronic letter template and a reply template, the letter party obtains the censored data characteristics of the censored party based on the identity of the censored party, the censored party loads the corresponding electronic letter template through a first relation table based on the censored data characteristics of the censored party after logging in the blockchain system, the censored party loads the corresponding reply template through the electronic letter template based on a second relation table, the blockchain system sets a first relation table of the censored data characteristics and the electronic letter template, and a second relation table of the reply template and the letter template, for example, the templates can be audit templates, tax templates, bank reconciliation templates and corresponding reply templates and the like. The application can conveniently and rapidly acquire the corresponding templates by arranging the first relation corresponding table and the second relation corresponding table, and improves the operation efficiency of the block chain, which is the object of the application.
In one embodiment, the number of nodes participating in the consensus operation defined in the second smart contract is less than the number of nodes participating in the consensus operation defined in the third smart contract. In order to improve the efficiency of consensus, the application is based on that the reply data corresponds to the data in the electronic letter, so that fewer block chain nodes are used for consensus on the sent electronic letter, but more block chain nodes are used for consensus on the reply, thereby improving the generation efficiency of the block data and ensuring the reliability of the generated block data, which is another important application point of the application.
In one embodiment of the present application, in one embodiment,
the operation of encrypting the first block data, the second block data, the identity of the sender and the identity of the to-be-inspected party after merging is as follows:
acquiring a time stamp T1 of the first block data and a time stamp T2 of the second block data;
judging whether the value of T2-T1 is smaller than a first threshold value, if so, merging the first block data, the second block data, the identification of the sender and the identification of the audited party to obtain merged block data, if not, discarding the first block data and the second block data, and returning to the inquiry step;
processing the value of the T2-T1, the identification SID of the sender and the identification BID of the audited party to obtain a preprocessing key Prekey as an initial value to be input into a graph neural network to obtain an encryption key, encrypting the merging block data by using the encryption key, and storing the encrypted merging block data in the blockchain system;
wherein, representing an exclusive or operation;
and processing the T2-T1, the identification SID of the sender and the identification BID of the checked party to obtain a preprocessing key Prekey as initial values, inputting the preprocessing key Prekey into a graph neural network to obtain an encryption key, encrypting the combined block data by using the encryption key, storing the encrypted combined block data in the block chain system, acquiring a relation between nodes by an information transmission mode among nodes in the graph, representing the relation by a characteristic value of the nodes, setting an early warning threshold M more closely when the value is larger, and representing risk when the characteristic value of the node is larger than M.
The graph of the graph neural network is formed by the following modes: the nodes in the blockchain system are nodes in the graph, and the edges of the graph are communication relations among the nodes in the blockchain system.
In order to improve the security of data, a secret key adopted by the encryption algorithm of the blockchain is generated based on a graph neural network, namely, a time stamp T1 of first block data and a time stamp T2 of second block data are obtained; judging whether the value of the T2-T1 is smaller than a first threshold value, if so, combining the first block data and the second block data to obtain combined block data, if not, discarding the first block data and the second block data, and returning to the inquiry step; and processing the value of the T2-T1, the identification SID of the letter party and the identification BID of the checked party to obtain a preprocessing key Prekey as an initial value to be input into a graph neural network to obtain an encryption key, and encrypting the merged block data by using the encryption key. In the application, the encryption key generation mode of an encryption algorithm in a block chain system is improved, the encryption key is generated by using a graph neural network after a preprocessing key Prekey is obtained based on the time stamps of two blocks, the identification SID of an originating party and the identification BID of a checked party, and the specific calculation mode of the preprocessing key Prekey is provided, so that the data security is improved, which is an important application point of the application.
In one embodiment of the present application, in one embodiment,
the characteristic values of the nodes in the graph are as follows:
ΔT i representing node N i Last two participations in consensus computationTime stamp T of (2) i And T is i-1 Difference of C i,k Represents the N < th k The characteristic values of the individual nodes, i represents the number of the block, sigma represents the influence coefficient of the characteristic value of the previous period of the node on the characteristic value of the current period, n represents the number of adjacent nodes of the current node, and k and l represent integers which are larger than or equal to 1; the weights of the edges in the graph are:
wherein i and j are natural numbers greater than 1.
The graph neural network is only used for generating the encryption key, so the neural network is not required to be set too complex, and the characteristic value of the node and the timestamp T of the node which participates in consensus calculation twice recently i And T is i-1 The difference value of the two sides is calculated by directly selecting 1 or 0, because the communication bandwidth between the nodes and the processing capacity of the nodes are large enough, and the weight of 1 or 0 is selected according to whether the two sides are directly connected, so that the operation efficiency of the graph neural network is improved, which is one of the important application points of the application. The neural network needs to be trained before use, and is not described in detail herein.
The technology of the application can generate a third party function and evidence platform, and is independent of the checked units, the reply units and the offices, so that the associated risks are avoided. The method has the following technical effects:
the identities of all the parties are true: and obtaining CFCA personal identity real-name authentication and authority digital certificates.
The operation is safe: and checking the mobile phone short message through the signing password to confirm the real signing behavior.
Transmission safety: through digital signature of block chain, time stamp technology and key data uplink, the evidence file can not be tampered or tampered can be found in time.
And (3) process monitoring: the operation log can check information such as operators, operation time, operation ip addresses and the like in each link of the letter service.
High efficiency and low cost: the whole process of letter is intensive and efficient, and cost reduction and efficiency enhancement are realized.
The letter issuing platform is internally provided with a financial part standard template, so that batch letter making operation can be realized; batch auditing is carried out on the online check letter templates, basic information and letter contents; one-key batch stamping authorization function; on-line one-key letter sending; the routing information is automatically acquired, and the letter receiving condition can be checked at any time; the functions of automatically acquiring the letter and the return electronic bill and the like can practically improve the working efficiency. The letter issuing platform integrates a plurality of article companies, flexibly scans codes and pays fees, optimizes the traditional letter flow, improves the working efficiency, and greatly reduces the time, labor and logistics cost.
The manuscript is formed by one key: the platform automatically generates a work manuscript to replace auditors to manufacture a letter control table and sort the manuscript, and operates to leave marks so that letter work can be tracked.
And (5) improving the reply rate: the platform applies automation, intelligent high and new technologies such as OCR, RPA and the like to independently develop the reply robot so as to promote the enthusiasm of enterprise reply.
Checking the rule of the embedded bank letter: and checking and filling data normalization according to different banks through an Excel macro.
The electronic letter issuing mode can synchronously issue paper letter certificates, and the main flow is as follows:
step 1, finishing a verification stage that the manufactured paper letter first enters in the system, ensuring compliance of a receiving address of a subsequent commodity flow bill by confirming a valid letter sending address in the stage, and then checking information of a polled party in the step, wherein the verification stage is required to check true information of the polled party, and entering a preparation stage after the verification is finished.
Step 2, the letter for which the information verification of the inquired party is completed in the system enters a preparation stage, a user is required to download the letter document in the stage, after the action of authorized stamping of the checked unit is completed on line, the physical letter paper document is subjected to physical flow ordering through the system, the user can use the unique identification two-dimensional code on the letter, the state change of the current letter in the system and the binding of letter logistics information are completed in the ordering process, and the inquiring letter for which the ordering operation is completed enters the inquiring stage.
Step 3, the paper letter after the completion of the bill under the object flow in the system enters an inquiry stage, and the stage is used for users to inquire the routing information of the letter in real time and manage the abnormal flow of the letter according to actual conditions, and comprises the following steps: original resending, secondary letter sending and replacing program. And (3) normally completing the letter of the reply, and after the reply is processed in the system (namely binding the letter and the reply logistics information), entering an acceptance stage by the letter.
And 4, entering an acceptance stage of the paper letter after the reply processing in the system, wherein the acceptance stage is required to accept the letter, the acceptance is required to judge the consistency of the letter, and the system is used for supporting the formation of follow-up result report data according to the result after the judgment is completed.
And provides a set of data association management functions of the paper letter related entity information, wherein the related OCR image recognition, interface information acquisition and entity image acquisition technology through hardware equipment are involved. The process is used for binding entity information with the letters in the system so as to keep manuscript data of the inquiry business. The specific using steps are as follows:
step 1, collecting a return logistics list number and a logistics surface list entity image: after receiving the reply file, business personnel complete the binding of information through the reply processing functional module, firstly, the reply logistics list bar code is required to be scanned through a code scanning gun device, the reply logistics list number is input into the system, then the reply logistics list image is photographed and uploaded through a high-speed image photographing device, and meanwhile, the system can acquire and identify logistics information of the logistics according to the list number and the image content.
Step 2, binding a system letter: and (3) a business person scans the two-dimensional code on the inquiry letter through the code scanning gun to obtain a corresponding letter in the system, and the corresponding letter is used for binding the logistics related information recorded in the step (1) and the letter image information acquired subsequently.
Step 3, uploading the letter image: business personnel collect and upload the image of the letter to the system through a high-speed scanner or a high-speed scanner. The procedure of the reply processing of the paper letter is completed.
The method and the device can integrate the paper letter mode together so as to be compatible with the paper letter mode.
For convenience of description, the above devices are described as being functionally divided into various units, respectively. Of course, the functions of each element may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
From the above description of embodiments, it will be apparent to those skilled in the art that the present application may be implemented in software plus a necessary general hardware platform. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute the embodiments of the present application or some parts of the described embodiments of the present application.
Finally, what should be said is: the above embodiments are merely for illustrating the technical aspects of the present application, and it should be understood by those skilled in the art that although the present application has been described in detail with reference to the above embodiments: modifications and equivalents may be made thereto without departing from the spirit and scope of the application, which is intended to be encompassed by the claims.

Claims (9)

1. A blockchain-based letter management all-in-one device, the device comprising: a DDOS resistant service unit, a VPC application unit and a DSC data security center,
the DDOS resistant service unit is used for providing a cloud firewall;
the VPC application unit comprises a front-end server and a back-end server,
the front-end server is connected with the terminal user through the cloud firewall and is used for providing public network access service;
the back-end server is respectively connected with the blockchain system and the DSC data security center,
the backend server includes: the system comprises an issue function making unit, an inquiry unit and a report generating unit;
the DSC data security center is used for storing the function certificate data generated by the VPC application unit.
2. The all-in-one machine apparatus according to claim 1, wherein,
the hair letter making unit is used for making hair letters: after the sender completes the electronic letter in the blockchain system, the sender sends the generated identification of the electronic letter and the identification of the sender to the blockchain system, the blockchain system acquires the identification of the checked party based on the identification of the electronic letter and the identification of the sender, and the blockchain system acquires the letter authorization information of the checked party on the electronic letter based on the identification of the checked party;
the inquiry unit is used for inquiring: the method comprises the steps that a letter issuing party obtains and analyzes letter authorization information through a block chain system, if the analyzed letter authorization information is authorized to pass, the letter issuing party calls a first intelligent contract for common identification operation, the first intelligent contract is issued by a management node of the block chain system, first block data are generated after the electronic letter common identification operation passes, the first block data are sent to a checked party, the checked party generates return data based on the first block data, signs the first block data, and sends the return data and the signed first block data to the letter issuing party;
the report generation unit is used for generating a report: and after receiving the signed first block data, the sender calls a second intelligent contract to verify the signed first block data, after the verification is passed, calls a third intelligent contract to carry out consensus operation on the reply data, the reply consensus operation is passed, generates second block data based on the reply data, combines the first block data, the second block data, the identification of the sender and the identification of the checked party, then encrypts the first block data, the second block data, the identification of the checked party and the identification of the checked party, generates an encryption block, and stores the encryption block in the block chain system, wherein the second intelligent contract is issued by a management node of the block chain system, and the third intelligent contract is generated by the checked party.
3. The all-in-one device of claim 2, wherein the function certificate authority is an electronic signature or an electronic signature.
4. The all-in-one machine according to claim 2, wherein the blockchain system provides an electronic letter template and a reply template, the letter party obtains the censored data characteristics of the censored party based on the identity of the censored party, the censored party loads the corresponding electronic letter template through a first relation table based on the censored data characteristics of the censored party after logging in the blockchain system, the censored party loads the corresponding reply template through the electronic letter template based on a second relation table, and the blockchain system sets a first relation table of censored data characteristics and the electronic letter template and a second relation table of reply templates and letter templates.
5. The all-in-one device of claim 2, wherein a number of nodes in the first smart contract that participate in the consensus operation is less than a number of nodes in the second smart contract that participate in the consensus operation.
6. The all-in-one device according to claim 2, wherein the operations of encrypting the first block data, the second block data, the identity of the letter party, and the identity of the inspected party after merging are:
acquiring a time stamp T1 of the first block data and a time stamp T2 of the second block data;
judging whether the value of T2-T1 is smaller than a first threshold value, if so, merging the first block data, the second block data, the identification of the sender and the identification of the audited party to obtain merged block data, if not, discarding the first block data and the second block data, and returning to the inquiry step;
processing the value of the T2-T1, the identification SID of the sender and the identification BID of the audited party to obtain a preprocessing key Prekey as an initial value to be input into a graph neural network to obtain an encryption key, encrypting the merging block data by using the encryption key, and storing the encrypted merging block data in the blockchain system;
wherein, prekey= (T2-T1), -SID @ BID, @ indicates exclusive or operation;
the graph of the graph neural network is formed by the following modes: the nodes in the blockchain system are nodes in the graph, the edges in the graph are communication relationships between the nodes in the blockchain system,
the characteristic values of the nodes in the graph are as follows:
ΔT i representing node N i Timestamp T of last two participation consensus calculations i And T is i-1 Difference of C i,k Represents the N < th k The characteristic values of the individual nodes, i represents the number of the block, sigma represents the influence coefficient of the characteristic value of the previous period of the node on the characteristic value of the current period, n represents the number of adjacent nodes of the current node, and k and l represent integers which are larger than or equal to 1;
the weights of the edges in the graph are:
wherein i and j are natural numbers greater than 1.
7. The all-in-one device of claim 1, wherein the blockchain system is communicatively coupled to the backend server via a number of blockchain service nodes.
8. The all-in-one device of claim 1, wherein the cloud firewall provided by the DDOS resistant service unit is configured to intercept malicious HTTP requests and prevent DDOS attacks.
9. The all-in-one device of claim 1, further comprising a processor, a memory, a hard disk, a network system, and a power supply system.
CN202311088007.9A 2023-08-28 2023-08-28 Function certificate management all-in-one equipment based on blockchain Pending CN117118632A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311088007.9A CN117118632A (en) 2023-08-28 2023-08-28 Function certificate management all-in-one equipment based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311088007.9A CN117118632A (en) 2023-08-28 2023-08-28 Function certificate management all-in-one equipment based on blockchain

Publications (1)

Publication Number Publication Date
CN117118632A true CN117118632A (en) 2023-11-24

Family

ID=88794394

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311088007.9A Pending CN117118632A (en) 2023-08-28 2023-08-28 Function certificate management all-in-one equipment based on blockchain

Country Status (1)

Country Link
CN (1) CN117118632A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200087327A (en) * 2018-12-28 2020-07-21 달리웍스 주식회사 System and method for providing data reliability based on blockchain for iot services
CN113744036A (en) * 2021-08-04 2021-12-03 三峡大学 Quantum check transaction method based on block chain digital signature
CN114881757A (en) * 2022-04-18 2022-08-09 远光软件股份有限公司 Letter method, system and electronic equipment
CN114897596A (en) * 2022-04-18 2022-08-12 远光软件股份有限公司 Letter service platform and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20200087327A (en) * 2018-12-28 2020-07-21 달리웍스 주식회사 System and method for providing data reliability based on blockchain for iot services
CN113744036A (en) * 2021-08-04 2021-12-03 三峡大学 Quantum check transaction method based on block chain digital signature
CN114881757A (en) * 2022-04-18 2022-08-09 远光软件股份有限公司 Letter method, system and electronic equipment
CN114897596A (en) * 2022-04-18 2022-08-12 远光软件股份有限公司 Letter service platform and electronic equipment

Similar Documents

Publication Publication Date Title
CN110769035B (en) Block chain asset issuing method, platform, service node and storage medium
CN109729168A (en) A kind of data share exchange system and method based on block chain
CN110633963B (en) Electronic bill processing method, electronic bill processing device, computer readable storage medium and computer readable storage device
CN110519297B (en) Data processing method and device based on block chain private key
CN109657486A (en) A kind of financial institution&#39;s user data sharing method and system based on block chain technology
CN111598436A (en) Voucher management system, method and medium
CN108898495A (en) A kind of finance and money management confirmation of responsibility method based on block chain
CN111866042B (en) Method and device for synchronizing telecommunication account number change
CN104125230A (en) Short message authentication service system and authentication method
CN111385751B (en) Information sending method, device, terminal and readable storage medium
CN110321730A (en) A kind of method, block chain node and the storage medium of operation data processing
CN110689348B (en) Revenue verification method, device, terminal and medium based on alliance chain
CN114266069A (en) House transaction electronic data sharing system and method based on block chain technology
Zhang et al. Ques-chain: an ethereum based e-voting system
CN111556148B (en) Data sharing method, data sharing platform and device
EP4179487A1 (en) Method, participating unit, transaction register, and payment system for managing transaction data sets
CN112256799A (en) Data processing method and device based on block chain, server and storage medium
CN111881479A (en) Anti-money laundering list sharing system and method based on block chain
CN111931230A (en) Data authorization method and device, storage medium and electronic device
Guo et al. Antitampering scheme of evidence transfer information in judicial system based on blockchain
CN117118632A (en) Function certificate management all-in-one equipment based on blockchain
CN116842553B (en) Function certificate management method and device based on blockchain and storage medium
CN115456619A (en) Virtual prepaid card issuing system and method based on block chain technology
CN111934881B (en) Data right determining method and device, storage medium and electronic device
KR102498336B1 (en) Method and system for managing user reputation based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination