TWI694350B - Information supervision method and device based on blockchain - Google Patents

Information supervision method and device based on blockchain Download PDF

Info

Publication number
TWI694350B
TWI694350B TW108105404A TW108105404A TWI694350B TW I694350 B TWI694350 B TW I694350B TW 108105404 A TW108105404 A TW 108105404A TW 108105404 A TW108105404 A TW 108105404A TW I694350 B TWI694350 B TW I694350B
Authority
TW
Taiwan
Prior art keywords
information
supervision
key
record
supervisor
Prior art date
Application number
TW108105404A
Other languages
Chinese (zh)
Other versions
TW201947446A (en
Inventor
于君澤
周揚
唐強
Original Assignee
香港商阿里巴巴集團服務有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority to CN201810446957.7A priority Critical patent/CN108681966B/en
Priority to CN201810446957.7 priority
Application filed by 香港商阿里巴巴集團服務有限公司 filed Critical 香港商阿里巴巴集團服務有限公司
Publication of TW201947446A publication Critical patent/TW201947446A/en
Application granted granted Critical
Publication of TWI694350B publication Critical patent/TWI694350B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Abstract

本說明書提供了一種資訊監管方法和裝置,用於資訊監管方監管資訊提供方提供的資訊,設置所述資訊監管方和所述資訊提供方為一區塊鏈的節點;所述資訊監管方獲取所述資訊提供方發佈的加密資訊記錄;其中,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密;使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄;基於預配置的監管規則對所述原始資訊記錄執行風險監管處理。This specification provides an information supervision method and device for the information supervision party to supervise the information provided by the information provider, setting the information supervision party and the information provider as a blockchain node; the information supervision party obtains An encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key related to the public key of the information supervisor; using a key related to the private key of the information supervisor, Decrypt the encrypted information record to obtain the original information record; perform risk supervision processing on the original information record based on pre-configured supervision rules.

Description

基於區塊鏈的資訊監管方法及裝置Information supervision method and device based on blockchain

本說明書係關於資料處理技術領域,尤其關於一種基於區塊鏈的資訊監管方法及裝置。 This specification relates to the field of data processing technology, in particular to a blockchain-based information supervision method and device.

現有的資訊監管通常採用線下現場監管的方式,監管機構根據投訴線索、輿情、進行主動埋點或暗地訪查,參考監管條例來檢查被監管機構的業務法令遵循情況。現場檢查的問題在於成本比較高,需要到被監管機構集中辦公一段時間,而且不排除被監管機構突擊準備應付監管的情況出現,這也增加了被監管機構的成本。 隨著業務多元化發展,隨時隨地掌握被監管機構的情況成為監管機構的剛性業務需求。因此極需建構一套基礎監管方法及設施,便於被監管機構動態低成本加入、同時監管機構不用親赴現場也可以遠端地掌握被監管機構在對應條例下的法令遵循情況。Existing information supervision usually adopts offline on-site supervision. The supervisory agency will take the initiative to bury the site or secretly visit according to the complaint clues, public opinion, and refer to the supervisory regulations to check the compliance of the business regulations of the supervised agency. The problem with on-site inspections is that the cost is relatively high. It takes a while for the regulated agency to work together for a period of time, and it does not rule out the situation where the regulated agency prepares to cope with supervision, which also increases the cost of the regulated agency. With the diversified development of business, it is a rigid business requirement for regulators to grasp the situation of regulated agencies at any time and anywhere. Therefore, it is extremely necessary to construct a set of basic supervision methods and facilities to facilitate the dynamic and low-cost joining of the supervised organization. At the same time, the supervising organization can remotely grasp the compliance of the supervised organization under the corresponding regulations without going to the site.

針對以上提出的資訊監管的現狀,本說明書提供了一種基於區塊鏈的資訊監管方法,所述區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,所述監管方法包括: 所述資訊監管方獲取所述資訊提供方發佈的加密資訊記錄;其中,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密; 使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄; 基於預配置的監管規則對所述原始資訊記錄執行風險監管處理。 更佳的,所述基於預配置的監管規則對所述原始資訊記錄執行風險監管處理,包括: 調用發佈在所述區塊鏈上的風險監管智能合約,執行所述智能合約中聲明的與監管規則對應的執行程式,對所述原始資訊記錄執行風險監管處理。 更佳的,所述智能合約由所述資訊監管方發佈至所述區塊鏈。 更佳的,所述區塊鏈為聯盟鏈。 更佳的,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密,包括: 基於與所述資訊監管方的公鑰相關的密鑰對所述原始資訊記錄進行加密,得到所述加密資訊記錄,再對所述加密資訊記錄進行數位簽章得到第一簽名資訊; 所述使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄,包括: 所述資訊監管方對所述第一簽名資訊進行驗簽,驗簽通過後再使用與所述資訊監管方的私鑰相關的密鑰對所述加密資訊記錄進行解密,得到所述原始資訊記錄。 更佳的,所述資訊監管方的公鑰相關的密鑰為:所述資訊監管方的公鑰,所述資訊監管方的私鑰相關的密鑰為:所述資訊監管方的私鑰。 更佳的,所述資訊監管方的公鑰相關的密鑰為:所述資訊監管方的公鑰與所述資訊提供方的私鑰的乘積,所述資訊監管方的私鑰相關的密鑰為:所述資訊監管方的私鑰與所述資訊提供方的公鑰的乘積。 更佳的,所述基於預配置的監管規則對所述原始資訊記錄執行風險監管處理,包括: 識別所述原始資訊記錄中的監管因數,將所述監管因數的取值與預設的監管閾值的閾值作比較,根據比較結果執行風險監管處理。 更佳的,所述資訊監管方預設的監管指標,包括針對監管規則轉換產生的可執行SQL語句和對應的監管閾值; 識別所述原始資訊記錄中的監管因數,將所述監管因數的取值與預設的監管閾值的閾值作比較,包括 識別所述原始資訊記錄中的監管因數, 在所述監管指標的可執行SQL語句中輸入監管因數進行查詢, 將查詢所得的所述監管因數的取值與所述監管指標的監管閾值作比較。 更佳的,所述資訊監管方還配置了監管指標池; 所述方法還包括: 將監管規則轉換為可執行的SQL語句; 產生監管指標名稱,並建立所述監管指標的名稱與所述SQL語句的映射關係,並將所述映射關係存入監管指標池。 更佳的,所述監管指標池中的監管指標為多叉樹儲存結構,所述監管指標為所述多叉樹上的節點。 更佳的,所述監管指標還關聯了對應的監管處理方案; 所述根據所述比較結果執行風險監管處理,包括, 確定所述監管因數的取值是否達到所述監管指標中的監管閾值: 如果否,不作出回應; 如果是,執行與所述監管指標關聯的監管處理方案。 本說明書還提供了一種基於區塊鏈的資訊監管裝置,所述區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,所述資訊監管裝置包括: 資訊獲取單元,用於所述資訊監管方獲取所述資訊提供方發佈的加密資訊記錄;其中,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密; 資訊解密單元,用於使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄; 風險監管處理單元,用於基於預配置的監管規則對所述原始資訊記錄執行風險監管處理。 本說明書還提供了一種電腦設備,包括:記憶體和處理器;所述記憶體上儲存有可由處理器運行的電腦程式;所述處理器運行所述電腦程式時,執行上述資訊監管業務的實現方法所述的步驟。 本說明書還提供了一種電腦可讀儲存媒體,其上儲存有電腦程式,所述電腦程式被處理器運行時,執行上述資訊監管業務的實現方法所述的步驟。 由以上技術方案可見,本說明書提供的資訊監管方法及裝置,將資訊監管方與資訊提供方均設置為區塊鏈的節點,為資訊提供方動態、低成本加入該區塊鏈接收監管、資訊監管方即時從該區塊鏈獲取監管資訊提供了線上通道,從而免除了雙方在線下勘察監管中付出的成本;而且,資訊提供方將資訊加密發佈於該區塊鏈,處於該區塊鏈的其他任意節點無法將其正確解密,從而保證了每個資訊提供方提供資訊的安全性;進一步地,區塊鏈的架構,確保每個資訊提供方即時提供的資訊不會在提供後被篡改,從而保證了資訊監管的真實有效性;更佳的是,資訊監管方將監管要求數位化成監管指標,並採用對比監管指標和監管因數的對應的值的方式,可以即時地對資訊提供方進行數位化監管,及時輸出風險監管處理方案,保證監管行為的時效性;而且本說明書所提供的基於區塊鏈的資訊監管方法和裝置可同時對多節點多機構進行即時監管,可有效防止跨機構跨地區的違規現象。In response to the current status of information supervision proposed above, this specification provides a method of information supervision based on a blockchain. The blockchain includes at least one information supervision node and several information provider nodes. The supervision method includes: The information supervisor obtains the encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key related to the public key of the information supervisor; Use the key related to the private key of the information supervisor to decrypt the encrypted information record to obtain the original information record; Perform risk supervision processing on the original information records based on pre-configured supervision rules. More preferably, the pre-configured supervision rules perform risk supervision processing on the original information records, including: Invoke a risk supervision smart contract published on the blockchain, execute the execution program corresponding to the supervision rules declared in the smart contract, and perform risk supervision processing on the original information record. More preferably, the smart contract is issued to the blockchain by the information regulator. More preferably, the blockchain is an alliance chain. More preferably, the encrypted information record is encrypted based on a key related to the public key of the information supervisor, including: Encrypt the original information record based on a key related to the public key of the information regulator to obtain the encrypted information record, and then digitally sign the encrypted information record to obtain the first signature information; The use of a key related to the private key of the information regulator to decrypt the encrypted information record to obtain the original information record includes: The information supervising party verifies the first signature information, and after passing the verification, decrypts the encrypted information record using a key related to the information supervising party's private key to obtain the original information record . More preferably, the key related to the public key of the information supervisor is: the public key of the information supervisor, and the key related to the private key of the information supervisor is: the private key of the information supervisor. Preferably, the key related to the public key of the information supervisor is: the product of the public key of the information supervisor and the private key of the information provider, the key related to the private key of the information supervisor Is: the product of the private key of the information supervisor and the public key of the information provider. More preferably, the pre-configured supervision rules perform risk supervision processing on the original information records, including: Identify the supervision factor in the original information record, compare the value of the supervision factor with a preset threshold of the supervision threshold, and perform risk supervision processing according to the comparison result. More preferably, the regulatory indicators preset by the information regulator include executable SQL statements and corresponding regulatory thresholds generated for the conversion of regulatory rules; Identify the supervision factor in the original information record, and compare the value of the supervision factor with the threshold of the preset supervision threshold, including Identify the regulatory factors in the original information record, Enter the supervision factor in the executable SQL statement of the supervision index to query, Compare the value of the supervision factor obtained from the query with the supervision threshold of the supervision index. More preferably, the information regulator also has a pool of regulatory indicators; The method also includes: Convert regulatory rules into executable SQL statements; Generate the name of the regulatory index, and establish the mapping relationship between the name of the regulatory index and the SQL statement, and store the mapping relationship in the regulatory index pool. More preferably, the supervision index in the supervision index pool is a multi-fork tree storage structure, and the supervision index is a node on the multi-fork tree. More preferably, the regulatory indicators are also associated with corresponding regulatory processing solutions; The execution of risk supervision processing according to the comparison result includes: Determine whether the value of the supervision factor reaches the supervision threshold in the supervision index: If not, do not respond; If yes, implement the regulatory treatment plan associated with the regulatory indicators. This specification also provides a blockchain-based information supervision device, the blockchain includes at least one information supervision node and several information provider nodes, and the information supervision device includes: An information acquisition unit for the information regulator to obtain encrypted information records issued by the information provider; wherein the encrypted information records are encrypted based on a key related to the public key of the information regulator; An information decryption unit for decrypting the encrypted information record to obtain the original information record using a key related to the private key of the information regulator; The risk supervision processing unit is configured to perform risk supervision processing on the original information record based on pre-configured supervision rules. This specification also provides a computer device, including: a memory and a processor; a computer program that can be executed by the processor is stored on the memory; when the processor runs the computer program, the implementation of the above information supervision service is performed The steps described in the method. This specification also provides a computer-readable storage medium on which a computer program is stored. When the computer program is run by a processor, the steps described in the method for implementing the information supervision service described above are performed. It can be seen from the above technical solutions that the information supervision method and device provided in this manual set both the information supervisor and the information provider as nodes of the blockchain, so that the information provider can dynamically and cost-effectively join the blockchain to receive supervision and information. The supervisor obtains the supervisory information from the blockchain in real time and provides an online channel, thereby eliminating the cost of both parties in the offline survey and supervision; moreover, the information provider encrypts the information and publishes the information on the blockchain. Any other node cannot decrypt it correctly, thereby ensuring the security of the information provided by each information provider; further, the structure of the blockchain ensures that the information provided by each information provider in real time will not be tampered with after being provided, This guarantees the authenticity and effectiveness of information regulation; better, the information regulator digitizes the regulatory requirements into regulatory indicators, and adopts a method of comparing the corresponding values of the regulatory indicators and the regulatory factors, which can be used to digitize the information providers in real time. Monitoring, and timely output of risk supervision and treatment solutions to ensure the timeliness of regulatory actions; and the blockchain-based information supervision methods and devices provided in this manual can simultaneously monitor multiple nodes and multiple institutions in real time, which can effectively prevent cross-institutional Regional violations.

如圖1所示,本說明書提供的實施例示意了一種基於區塊鏈的資訊監管方法,所述區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,該監管方法包括: 步驟102,所述資訊監管方獲取所述資訊提供方發佈的加密資訊記錄;其中,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密; 步驟104,使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄; 步驟106,基於預配置的監管規則對所述原始資訊記錄執行風險監管處理。 本說明書提供的實施例所述的“資訊監管方”為資訊監管中履行監管職責的機構所在的伺服器或終端,本說明書提供的實施例所述的“資訊提供方”具體可以為資訊監管中的被監管方終端,也可為與被監管方發生資料連接的其他伺服器或終端,其提供的“資訊”即為被監管的對象資訊資料,如貸款資料、交易資料等。在本說明書所述的實施例中,任意的資訊監管方與資訊提供方可透過遵循相應節點協議、運行節點協議程式的安裝來加入該區塊鏈,作為該區塊鏈的節點。因此相比於監管機構線下一一查看被監管機構的業務現狀,本說明書的實施例提供的線上加入該區塊鏈成為其節點以參與監管或被監管的方法有著更加優越的便捷性和經濟性,可隨時加入或撤出。 本說明書提供的實施例可以運行在任何具有計算和儲存能力的設備上,如手機、平板電腦、PC(Personal Computer,個人電腦)、筆記型電腦、伺服器等設備;還可以由運行在兩個或兩個以上設備的邏輯節點來實現本說明書實施例中的各項功能。 本說明書提供的實施例所述的“區塊鏈”,具體可指一個各節點透過共識機制達成的、具有分散式資料儲存結構的P2P網路系統,該區塊鏈內的資料分佈在時間上相連的一個個“區塊(block)”之內,後一區塊包含前一區塊的資料摘要,且根據具體的共識機制(如POW、POS、DPOS或PBFT等)的不同,達成全部或部分節點的資料全備份。本領域的技術人員熟知,由於區塊鏈系統在相應共識機制下運行,已收錄至區塊鏈資料庫內的資料很難被任意的節點篡改,例如採用Pow共識的區塊鏈,至少需要全網51%算力的攻擊才有可能篡改已有資料,因此區塊鏈系統有著其他中心化資料庫系統所無法比擬的保證資料安全、防攻擊篡改的特性。由此可知,在本說明書所提供的實施例中,由資訊提供方提供的、被該區塊鏈收錄的“資訊”不會被攻擊或篡改,從而保證了監管的真實與公正性。 為了進一步保證監管的隱私性,本說明書提供的實施例中,資訊提供方提供的資訊以與所述資訊監管方的公鑰相關的密鑰進行加密;該加密資訊僅能被所述資訊監管方的私鑰相關的密鑰進行解密以獲取原始資訊記錄,防止共處於同一區塊鏈的其他節點獲知該資訊的明文(即原始資訊記錄)。相應的資訊監管方可解密的加密方式有很多,如ECDSA、RSA,在本說明書提供的實施例中可根據需求而具體設定加密方式。 本說明書實施例所提供的基於區塊鏈的資訊監管方法,資訊監管方基於預配置的監管規則對所述原始資訊記錄執行風險監管處理,具體的風險監管處理方案有很多,例如將監管規則數位化為相應的監管指標,將監管指標的閾值與從區塊鏈網路上獲取的原始資訊記錄中監管因數的取值做比對,進而根據是否違規、違規程度直接有效輸出監管結果;或者是從區塊鏈網路上獲取的原始資訊記錄中識別違規因數,一旦識別出違規因數,即執行預設的風險監管處理,如預警、報警、執行封鎖等。所述基於預配置的監管規則對所述原始資訊記錄執行風險監管處理的方案,根據具體的監管要求具體設定,在本說明書中不作限定,從而最終完成了從監管資訊的收集到對被監管行為的處理的一體化的數位監管方法,提高了監管行為的便捷性、經濟性、真實性與高效性。 下面以金融監管機構監管同一借款人在同一網貸機構及不同網貸機構的借款情況為例,闡述本說明書所提供的具體實施方式。 在本實施例中,金融監管機構為資訊監管方,各個網貸機構為不同的資訊提供方,自然借款人用戶為被監管的對象。為降低交易或資料的確認時間、提高交易傳輸量、滿足對安全和性能的需求,金融機構通常選用聯盟鏈架構來建構該區塊鏈。信用較高的機構,如大型銀行、巨頭企業、一些監管機構可作為該聯盟鏈的預選的節點,參與區塊的記帳。聯盟鏈的共識過程也由該預選的節點控制,當網路上有超過設定比例(如2/3)的節點確認一個區塊,該區塊記錄的交易或資料將得到全網確認。聯盟鏈可以根據應用場景來決定對公眾的開放程度,對可開放的機構給予接入該聯盟鏈的權限,例如在本實施例中,作為資訊監管方的金融監管機構可為預選的節點參與記帳,各個資訊提供方如網貸機構可為具有接入聯盟鏈權限的一般節點;當然,金融監管機構也可為具有接入聯盟鏈權限的一般節點,在本說明書中不作限定。 聯盟鏈通常多採用權益證明或PBFT、RAFT等共識演算法。圖2示意了簡化的PBFT演算法的達到共識的一致性過程,其中C為客戶端,N0 ~N3 表示服務節點,特別的,N0 為主節點,N3 為故障節點。PBFT系統通常假設故障節點數為m個,而整個服務節點數為3m+1個。簡單而言,整個通信過程如下: 1)客戶端向主節點發送請求調用服務操作; 2)當主節點接收請求後,啟動三階段的協議以向各從節點廣播請求; [2.1]序號分配階段(又稱pre-prepare階段),主節點給請求賦值一個序列號n,廣播序號分配訊息和客戶端的請求訊息m,並將構造PRE-PREPARE訊息給各從節點; [2.2]交互階段(又稱prepare階段),從節點接收PRE-PREPARE訊息,向其他伺服器節點廣播PRE-PREPARE訊息; [2.3]序號確認階段(又稱commit階段),各節點對視圖內的請求和次序進行驗證後,廣播COMMIT訊息,執行收到的客戶端的請求並給客戶端以相應。 3)客戶端等待來自不同節點的回應,若有m+1個回應相同,則該回應即為共識的結果。 同所有的狀態機副本複製技術一樣,PBFT對每個副本節點提出了兩個限定條件: 1)所有節點必須是確定性的。也就是說,在給定狀態和參數相同的情況下,操作執行的結果必須相同; 2)所有節點必須從相同的狀態開始執行。 在這兩個限定條件下,即使失效的副本節點存在,PBFT演算法對所有非失效副本節點的請求執行總順序達成一致,從而保證安全性。 根據圖2所示的共識通信過程一批記錄產生一個區塊,最終形成鏈。PBFT演算法作為本說明書所提供的一種較佳的實施方式,是由於採用該種演算法共識的效率高,可滿足高頻交易量的需求,例如在本實施例中頻繁的借貸交易;且共識的時延很低,基本達到即時處理的要求,能快速即時地對監管資訊輸出監管結果;可信節點作為預選的記帳節點,兼顧了安全性與穩定性;另外,採用PBFT演算法不會消耗過多的電腦算力資源,也不一定需要代幣流通,因此具有良好的可使用性。 更佳地,在本說明書所提供的實施例中,各個網貸機構作為資訊提供方,其提供的與個人借貸相關的資訊通常涉及身份等隱私資訊,如表1所示,為保證涉及自身機構或借貸人隱私的資訊明文只被相應的具有監管權限的金融監管機構獲知,而不被處在同一區塊鏈的其他節點獲知或非法使用,各個網貸機構應加密處理其提供的監管資訊。具體的加密方式有很多種,例如網貸機構可提前與金融監管機構約定對稱密鑰來進行加密和解密;網貸機構也可使用與金融監管機構的公鑰相關的密鑰來進行非對稱加密,則金融監管機構可使用與其私鑰相關的密鑰來進行解密得到網貸機構所提供的借貸資訊的明文(如表1所示),從而防止其他節點獲悉該監管資訊。

Figure 108105404-A0304-0001
表1 網貸機構A平台上發生的個人C向個人B借貸的資訊表例如,如圖3所示,作為資訊提供方的網貸機構首先使用對應的金融監管機構的公鑰對其提供的借貸資訊的明文(如表1所示)進行加密得到借貸資訊的密文,接著為保證所述密文不被篡改和偽造,網貸機構對該密文進行數位簽章,並將該對密文的數位簽章和密文一起上傳至網貸機構節點所在的區塊鏈資料庫快取中;該區塊鏈的記帳工,如聯盟鏈中的預選的具有記帳權限的節點,需對可收錄至區塊鏈的資料記錄進行驗證,該驗證過程必然包含對上述數位簽章的驗簽,驗簽過程是為了防止資料被篡改或者該資訊是其他參與者偽造,驗簽通過後記帳工將該對密文的數位簽章和密文收錄至上述區塊鏈的區塊中。 Table 1 Information table of individual C borrowing from individual B on the online lending institution A platform. For example, as shown in Figure 3, the online lending institution as the information provider first uses the public key of the corresponding financial regulatory agency to provide loans to it The plaintext of the information (shown in Table 1) is encrypted to obtain the ciphertext of the loan information, and then to ensure that the ciphertext is not tampered with or forged, the online lending institution digitally signs the ciphertext and then sends the pair of ciphertexts The digital signature and ciphertext of the ciphertext are uploaded to the cache of the blockchain database where the network lending institution node is located; the accounting work of the blockchain, such as the pre-selected node with accounting authority in the alliance chain, needs to be recorded To verify the data record of the blockchain, the verification process must include the verification of the above-mentioned digital signature. The verification process is to prevent the data from being tampered with or the information is forged by other participants. The digital signature of the ciphertext and the ciphertext are included in the blocks of the above-mentioned blockchain. 在該對密文的數位簽章和密文被如聯盟鏈中的預選節點收錄至所述區塊鏈中後,作為該區塊鏈的節點,該金融監管機構可從區塊鏈中獲取上述對密文的數位簽章和密文,相應地,該金融監管機構可透過使用與上述公鑰對應的私鑰對密文進行解密,從而得到具體的借貸資訊的明文。 After the digital signature and ciphertext of the pair of ciphertexts are included in the blockchain by a preselected node in the alliance chain, as a node of the blockchain, the financial regulatory agency can obtain the above from the blockchain For the digital signature and ciphertext of the ciphertext, correspondingly, the financial regulatory agency can decrypt the ciphertext by using the private key corresponding to the above-mentioned public key to obtain the plaintext of specific loan information. 在本實施例中,作為資訊監管方的金融監管機構可以是具有記帳權限的預選節點,也可為普通的節點,在本說明書中不作具體限定,只要其對上述對密文的數位簽章和密文具有訪問查看權限。 In this embodiment, the financial regulatory agency as the information supervisor can be a pre-selected node with accounting authority, or an ordinary node, which is not specifically limited in this specification, as long as it has the digital signature and signature of the ciphertext mentioned above. The ciphertext has access and view permissions. 本說明書實施例對關於數位簽章及驗簽演算法、金融監管機構自身的公鑰-私鑰對的演算法不作具體限定,可選用橢圓曲線演算法、RSA演算法等完成,相關的hash演算法可選用MD5、SHA256等完成。 The embodiments of this specification do not specifically limit the algorithms of digital signatures and signature verification algorithms, and financial regulatory agencies’ own public key-private key pairs. Elliptic curve algorithms, RSA algorithms, etc. can be used to complete the related hash calculations. The method can be completed with MD5, SHA256, etc. 關於上述對借貸資訊進行加密以得到密文的過程,可以採用雙方約定對稱密鑰的方式實現。 Regarding the above-mentioned process of encrypting the loan information to obtain the ciphertext, it can be realized by the way that both parties agree on a symmetric key. 例如,如圖4所示,作為資訊提供方的網貸機構對借貸資訊的明文進行加密可採用ECDH交換密鑰的方式。 For example, as shown in Figure 4, an online lending institution as an information provider can use ECDH to exchange keys to encrypt the plaintext of lending information. 本領域的技術人員應知,在使用同一橢圓曲線演算法(即選用同一直線或基點)獲取機構的身份相關的公鑰-私鑰對的區塊鏈系統中,機構A的私鑰AS與機構B的公鑰BP的乘積等於機構A的公鑰AP與機構B的私鑰BS的乘積。 Those skilled in the art should know that in a blockchain system that uses the same elliptic curve algorithm (that is, the same straight line or base point) to obtain the public key-private key pair related to the identity of the organization, the private key AS of the organization A and the organization The product of B's ​​public key BP is equal to the product of organization A's public key AP and organization B's private key BS. 即:AS Namely: AS
Figure 02_image001
, 在本說明書所述的實施例中:金融監管機構的公鑰JP , In the embodiment described in this specification: the public key JP of the financial regulatory agency
Figure 02_image003
. 因此,網貸機構可使用對應的金融監管機構的公鑰JP與自身的私鑰DS乘積所得的密鑰對借貸資訊的明文進行加密得到借貸資訊的密文,類似的,接著為保證所述密文不被篡改和偽造,網貸機構對該密文進行數位簽章,並將該對密文的數位簽章、密文和與上述對借貸資訊加密所使用的自身的私鑰DS相對應的公鑰DP、金融監管機構的公鑰JP一起上傳至網貸機構節點所在的區塊鏈資料庫快取中;該區塊鏈的記帳工,如聯盟鏈中的預選的具有記帳權限的節點,首先對該數位簽章進行驗簽,驗簽過程是為了防止資料被篡改或者該資訊是其他參與者偽造,驗簽通過後記帳工將該對密文的數位簽章、密文、和上述對借貸資訊加密所使用的自身的私鑰DS相對應的公鑰DP、金融監管機構的公鑰JP一起收錄至上述區塊鏈的區塊中。 Therefore, the online lending institution can use the key obtained by multiplying the public key JP of the corresponding financial regulatory agency and its private key DS to encrypt the plaintext of the lending information to obtain the ciphertext of the lending information, and similarly, to ensure the secret The document shall not be tampered with or forged, and the online lending institution shall digitally sign the ciphertext, and the digital signature of the pair of ciphertext, the ciphertext and the corresponding private key DS used to encrypt the loan information The public key DP and the public key JP of the financial regulatory agency are uploaded to the cache of the blockchain database where the network lending institution node is located; the accounting work of the blockchain, such as the pre-selected node with accounting authority in the alliance chain, First, the digital signature is verified. The verification process is to prevent the data from being tampered with or the information is forged by other participants. After the verification is passed, the accountant will verify the digital signature, ciphertext, and the above-mentioned pair of ciphertext. The public key DP corresponding to the private key DS and the public key JP of the financial regulatory agency used for encryption of loan information are included in the block of the above-mentioned blockchain together. 在該對密文的數位簽章、密文和上述對借貸資訊加密所使用的自身的私鑰相對應的公鑰被如聯盟鏈中的預選節點收錄至所述區塊鏈中後,該金融監管機構可從區塊鏈中獲取上述對密文的數位簽章和密文,相應地,該金融監管機構可透過使用與上述從網路上獲取的公鑰JP對應的私鑰JS與從網路上獲取的DP相乘而得的密鑰對密文進行解密,從而得到具體的借貸資訊的明文。 After the digital signature of the pair of ciphertexts, the ciphertext, and the public key corresponding to the private key used to encrypt the loan information are included in the blockchain such as the preselected node in the alliance chain, the financial The supervisory authority can obtain the digital signature and ciphertext of the ciphertext from the blockchain. Accordingly, the financial supervisory authority can use the private key JS corresponding to the public key JP obtained from the Internet to communicate with The key obtained by multiplying the acquired DP decrypts the ciphertext, thereby obtaining the plaintext of the specific loan information. 其他任意節點,由於不能獲知該金融監管機構的私鑰JS而無法將上述密文解密。 Any other node cannot decrypt the above ciphertext because it cannot know the private key JS of the financial regulatory agency. 值得注意的是,由於同一機構在一個區塊鏈中可具有多組公鑰-私鑰對,上述對信貸資訊加密所用的網貸機構的公鑰DP、私鑰DS不一定與上述數位簽章過程及驗簽所使用的私鑰、公鑰相同,但這並不影響本技術方案的實施,反而由於增加了系統的複雜性而降低了被攻擊的可能性。 It is worth noting that since the same institution can have multiple sets of public key-private key pairs in a blockchain, the public key DP and private key DS of the online lending institution used to encrypt the credit information may not necessarily be signed with the aforementioned digital signatures. The private key and public key used in the process and verification are the same, but this does not affect the implementation of the technical solution, but instead reduces the possibility of being attacked due to increased system complexity. 雖然該區塊鏈的記帳節點在收錄資料時已經驗證過密文的數位簽章,為了進一步地保證監管資訊來源的正確性,防止資料被篡改或者惡意節點偽造資料,上述對本說明書所提供的實施例的描述中,金融監管機構在從上述區塊鏈中獲取到借貸資訊的密文、網貸機構對該借貸資訊的數位簽章等資料後,首先可再次對獲取到的數位簽章進行驗證,驗證通過後再解密上述密文,從而進一步防止其他機構或個人偽造借貸資訊,加強該金融監管行為的真實可靠權威性。 Although the billing node of the blockchain has verified the digital signature of the ciphertext when collecting the data, in order to further ensure the correctness of the source of the supervision information and prevent the data from being tampered with or malicious nodes forging the data, the above-mentioned examples provided in this specification In the description, after obtaining the ciphertext of the loan information from the above-mentioned blockchain, the digital signature of the online lending institution of the loan information, etc., the financial regulatory agency can first verify the obtained digital signature again. After the verification is passed, the above-mentioned ciphertext is decrypted, so as to further prevent other institutions or individuals from forging lending information and strengthen the authenticity and reliability of the financial supervision behavior. 在本說明書所提供的實施例中,作為資訊監管方的金融監管機構可建立監管風險引擎來模組化處理各個網貸機構提供的借貸資訊。 In the embodiments provided in this specification, the financial regulatory agency as the information supervisor can establish a regulatory risk engine to modularly process the loan information provided by various online lending agencies. 如圖5所示,該監管風險引擎具體可包括:資料輸入模組M1、監管指標產生模組M2、風險決策模組M3、風險處置模組M4等。 As shown in Figure 5, the regulatory risk engine may specifically include: a data input module M1, a regulatory indicator generation module M2, a risk decision module M3, a risk disposal module M4, and so on. 值得注意的是,上述風險監管引擎僅僅是風險監管處理的程式的具象化名稱,且該風險監管引擎的各個模組之間並無特定的分界,僅僅為了闡釋上述風險引擎的功能的方便,人為將其劃分為多個模組。 It is worth noting that the above-mentioned risk supervision engine is only a concrete name for the procedure of risk supervision processing, and there is no specific boundary between the various modules of the risk supervision engine. It is only for the convenience of explaining the functions of the above-mentioned risk engine. Divide it into multiple modules. 資料輸入模組M1用以處理該金融監管機構從上述區塊鏈獲取到的資料,包括借貸資訊的密文、網貸機構對該借貸資訊的數位簽章等資料,根據相關的解密演算法將上述借貸資訊的密文解密、或對上述數位簽章驗簽通過後再將上述借貸資訊的密文解密,按風險決策模組M3所需的資料格式將該借貸資訊的明文所包含的資料資訊解析。 The data input module M1 is used to process the data obtained by the financial regulatory agency from the above-mentioned blockchain, including the ciphertext of the loan information, the digital signature of the loan information by the online lending institution, and other data, according to the relevant decryption algorithm Decrypt the ciphertext of the above-mentioned loan information, or decrypt the ciphertext of the above-mentioned loan information after passing the verification of the above-mentioned digital signature, and then decrypt the ciphertext of the above-mentioned loan information according to the data format required by the risk decision module M3. Resolve. 由於現有的分散式共享網路系統或區塊鏈系統承載的資料結構通常為文本格式,不具有良好的可操作性,因此資料輸入模組M1可將上述解密的借貸資訊的明文進行資料表格化解析,將風險決策模組M3中需用到的重要資料資訊建立成表格形式,例如還原為上文表1所述的資料表格,輸入至風險決策模組M3。 Since the data structure carried by the existing distributed shared network system or blockchain system is usually in text format and does not have good operability, the data input module M1 can form the data in the plaintext of the decrypted loan information Analyze, create the important data information needed in the risk decision module M3 into a table form, for example, restore it to the data table described in Table 1 above, and input it into the risk decision module M3. 監管指標產生模組M2用於根據監管法規或準則產生監管行為對應的監管指標。 The supervisory indicator generation module M2 is used to generate supervisory indicators corresponding to supervisory behaviors according to supervisory regulations or standards. 如本實施例中,為監管“同一借款人在同一網貸機構的借款餘額上限”行為,根據“單一的個體、單一的自然人在一個平台上的借款上限是20萬”這一金融法條,訓練建立對應的指標。 For example, in this embodiment, in order to supervise the behavior of "the upper limit of the loan balance of the same borrower in the same online lending institution", according to the financial law that "the upper limit of the loan of a single individual and a single natural person on one platform is 200,000", Training to establish corresponding indicators. 該訓練過程如下, 1)如圖6所示,透過命名實體識別、語法分析、依存分析等自動分析技術,依存分析句子的主謂賓結構特徵,獲取到動作元組(單一、自然人or個體、借款、上線、20萬),進一步透過預定義的映射結構關係將該監管法規遵循法條轉換為一段電腦程式可執行的SQL語句。 The training process is as follows: 1) As shown in Figure 6, through automatic analysis techniques such as named entity recognition, grammatical analysis, and dependency analysis, the subject-predicate-object structure characteristics of the sentence are analyzed to obtain the action tuple (single, natural person or individual, Borrowing, going online, 200,000), and further transforming the regulatory compliance laws into a SQL statement executable by a computer program through a predefined mapping structure relationship. 2)產生一個指標Z1′,並和第1步產生的SQL語句映射關聯,將其一起存入監管指標池候選; 3)人工審核上述SQL語句,在修訂並確認上述SQL語句的正確性後,將其正式存入監管指標池,命名為Z1指標;Z1指標包括上述可執行的SQL語句,及其閾值——20W。 2) Generate an indicator Z1' and associate it with the SQL statement generated in step 1, and store it in the supervisory indicator pool candidate; 3) Manually review the above SQL statement, and after revising and confirming the correctness of the above SQL statement It is formally stored in the regulatory indicator pool and named as the Z1 indicator; the Z1 indicator includes the above executable SQL statement and its threshold-20W. 類似地,根據“單一的個體、單一的自然人在多個平台上的借款上限是100萬”這一金融法條,可訓練出Z2指標;Z2指標包括一段可執行的SQL語句,及其閾值——100W。 Similarly, according to the financial law "The upper limit of a single individual, a single natural person's borrowing on multiple platforms is 1 million", the Z2 indicator can be trained; the Z2 indicator includes an executable SQL statement and its threshold— —100W. 在本說明書所述的實施例中,為便於管理多個監管指標,可在監管指標池內設立的監管指標多叉樹儲存結構,將多個監管指標,如Z1、Z2,分別儲存在該多叉樹的節點上。 In the embodiment described in this specification, in order to facilitate the management of multiple regulatory indicators, a multi-tree storage structure of regulatory indicators can be set up in the regulatory indicator pool, and multiple regulatory indicators, such as Z1 and Z2, are stored in the multiple On the node of the fork tree. 進一步地,為便於對相似種類的行為進行統一監管,可以在監管指標池內設立多個不同種類的多叉樹,對應儲存相應類別的監管指標,例如監管指標池中設立有“自然人à借款報警”類指標的儲存多叉樹,其上可儲存如上述Z1、Z2及其他與自然人用戶在網貸平台上借款行為相關的指標;應“同一法人或其他組織在同一網路借貸資訊中介機構平台的借款餘額上限不超過人民幣100萬元”等其他相關監管辦法條款,監管指標池中還可設立有“企業à借款報警”類監管指標多叉樹,其上儲存有與企業用戶在網貸平台上借款的法定限額相關的監管指標。 Further, in order to facilitate the unified supervision of similar types of behaviors, multiple different types of polytrees can be set up in the supervision indicator pool to store corresponding types of supervision indicators. For example, there is a "natural person à loan alarm" in the supervision indicator pool. The storage polytree of "type of indicators" can be stored on the above-mentioned Z1, Z2 and other indicators related to the borrowing behavior of natural person users on the online lending platform; it should be "the same legal person or other organization on the same online lending information intermediary platform The upper limit of the loan balance does not exceed RMB 1 million" and other relevant regulatory provisions. The regulatory indicator pool can also set up a "Enterprise à Borrowing Alarm" type of regulatory indicator multi-tree, on which is stored the online loan platform with corporate users Regulatory indicators related to the statutory limit of borrowing. 而且,為了便於多層次監管,更好地達到提前警示預防違法的監管效果,可對一些指標設置相應的預警指標(預警指標對應的閾值可設定為全指標閾值的95%或其他值),例如為“單一的個體、單一的自然人在一個平台上的借款不超過19w”預警監管語句,按照上述1)--3)的過程產生預警指標Z1Y,Z1Y包括由上述預警監管語句訓練出的可執行的SQL語句及其對應的閾值19W,將其存入上述監管指標池。 Moreover, in order to facilitate multi-level supervision and better achieve the supervision effect of early warning and prevention of illegality, corresponding early warning indicators can be set for some indicators (the threshold corresponding to the early warning indicator can be set to 95% of the full indicator threshold or other values), such as For "a single individual, a single natural person's loan on a platform does not exceed 19w" early warning supervision statement, follow the above 1)-3) process to generate the early warning indicator Z1Y, Z1Y includes the executable trained by the above early warning supervision statement The SQL statement and its corresponding threshold 19W are stored in the above-mentioned regulatory indicator pool. 類似地,可以在監管指標池內建立一個“自然人à借款預警”類指標的儲存多叉樹,並將Z1Y儲存在該多叉樹的節點上。 Similarly, a storage polytree of "natural person à loan warning" type indicators can be established in the supervision indicator pool, and Z1Y can be stored on the node of the polytree. 該“自然人à借款預警”類指標多叉樹上還可儲存與同一自然人在多個網貸平台上借款行為的預警監管相關的Z2Y指標,在此不再贅述。 The "natural person à loan early warning" type indicator polytree can also store Z2Y indicators related to the early warning supervision of the same natural person's borrowing behavior on multiple online lending platforms, which will not be repeated here. 至此,監管指標產生模組M2透過以上資料訓練、審核、指標建立或指標多叉樹建立過程,將監管指標與可執行的SQL語句映射關聯,為監管自然人用戶在網貸機構上借款情況建立了可執行的監管範本,具體的風險監管及處置過程在風險決策模組M3中進行。 So far, the regulatory indicator generation module M2 uses the above data training, review, indicator establishment or indicator multi-tree establishment process to map and associate the regulatory indicators with executable SQL statements, and establishes a way to monitor the borrowing of natural person users on online lending institutions. The executable supervision template, the specific risk supervision and disposal process are carried out in the risk decision module M3. 值得注意的是,在本說明書中僅僅為了闡釋上述風險引擎的各個功能的方便,將其劃分為多個模組,各模組之間並無特定的界限,例如上述監管指標池可以歸屬於監管產生模組M2,也可歸屬於風險決策模組M3。 It is worth noting that in this manual, only for the convenience of explaining the various functions of the above risk engine, it is divided into multiple modules, and there is no specific boundary between each module. For example, the above-mentioned regulatory indicator pool can be attributed to regulatory The generating module M2 can also be attributed to the risk decision module M3. 如圖7所示,上述的監管指標池(圖中所示的監管指標資料集市)被儲存於風險決策模組M3內,該監管指標池內可包含若干個監管指標。 As shown in Figure 7, the above-mentioned regulatory indicator pool (the regulatory indicator data mart shown in the figure) is stored in the risk decision module M3, and the regulatory indicator pool may include several regulatory indicators. 在風險決策模組M3接收到對“單一的個體、單一的自然人在一個平台上的借款是否需預警”的監管指令後,首先在其監管指標池中搜索是否有對應的監管指標Z1Y存在,如存在,風險決策模組M3進入風險因素識別階段。 After the risk decision-making module M3 receives the regulatory instruction "whether a single individual or a single natural person needs an early warning for borrowing on a platform", it first searches its regulatory indicator pool for the existence of a corresponding regulatory indicator Z1Y, such as Yes, the risk decision module M3 enters the risk factor identification stage. 該風險決策模組M3讀取從資料輸入模組M1輸入的資料資訊,針對該監管指令從上述資料資訊中識別監管因數,在本例中監管對象為單個借款自然人,由於可唯一性確定自然人是否為單個的因素為自然人的身份證號碼(或其他唯一性用戶ID),因此本例中的監管因數為自然人的身份證號碼,接著風險決策模組M3在監管指標Z1Y對應的SQL語句輸入該用戶的身份證號碼,運行該SQL語句對該身份證號碼進行查詢,即可得到該單一自然人在該單平台的實際借款數(餘額),對比該監管因數的取值--實際借款數與指標Z1Y的閾值19W,該風險引擎的風險處置模組M4輸出相應的監管處理方案:當單一自然人實際借款數低於19W時,風險處置模組M4可不將其視為風險事件,不作回應;當單一自然人實際借款數高於19W時,根據預設的風險監管處理邏輯,風險處置模組M4可向相應的網貸平台節點發出預警提示訊息,如“已大額借款,即將達到監管限制上限”,從而阻止該網貸機構單平台對該用戶超過可放款餘額的新放款,減少某業務可能發生的損失。 The risk decision module M3 reads the data information input from the data input module M1, and identifies the supervisory factor from the aforementioned data information for the supervisory instruction. In this example, the supervisory object is a single natural person with borrowing, because it can be uniquely determined whether the natural person The single factor is the natural person's ID number (or other unique user ID), so the supervision factor in this example is the natural person's ID number, and then the risk decision module M3 enters the user in the SQL statement corresponding to the supervision indicator Z1Y If you run the SQL statement to query the ID number, you can get the actual loan amount (balance) of the single natural person on the single platform, and compare the value of the supervision factor--the actual loan amount and indicator Z1Y The risk management module M4 of the risk engine outputs the corresponding regulatory treatment plan: When the actual loan amount of a single natural person is less than 19W, the risk management module M4 may not treat it as a risk event and make no response; When the actual loan amount is higher than 19W, according to the preset risk supervision processing logic, the risk disposal module M4 can send an early warning message to the corresponding online loan platform node, such as "a large amount of borrowed money is about to reach the upper limit of the supervision limit", thus Prevent the online lending institution's single platform from making new loans to users that exceed the available loan balance, reducing possible losses in a certain business. 上述具體的風險處置方案可與監管指標關聯,以方便風險處置模組M4的處置方案輸出。 The above-mentioned specific risk treatment plan may be associated with the supervision index to facilitate the output of the treatment plan of the risk treatment module M4. 如上述金融監管機構發現某自然人在單平台的借款已經超出預警的閾值,可預案關聯而進一步對其進行報警指標監管:首先在其監管指標池中搜索是否有對應的監管指標Z1存在,如存在,風險決策模組M3進入風險因素識別階段。 If the above-mentioned financial regulatory agency finds that a natural person's borrowing on a single platform has exceeded the warning threshold, it can be related to the plan to further monitor the alarm indicator: first search for the corresponding regulatory indicator Z1 in its regulatory indicator pool, if so , The risk decision module M3 enters the stage of risk factor identification. 類似地,該風險決策模組M3讀取從資料輸入模組M1輸入的資料資訊,針對該監管指令從上述資料資訊中識別監管因數——該自然人的身份證號碼,接著風險決策模組M3在指標Z1對應的SQL語句中輸入該身份證號碼,並運行查詢,即可得到該單一自然人在該單平台的實際借款數,對比該監管因數的取值--實際借款數與指標Z1的閾值20W,該風險引擎的風險處置模組M4輸出相應的監管處理方案:當單一自然人實際借款數低於20W時,風險處置模組M4可不作輸出;當單一自然人實際借款數高於20W時,風險處置模組M4可向相應的網貸平台節點發出強力報警訊息,或再向本監管機構或上級監管部門呈報。 Similarly, the risk decision module M3 reads the data information input from the data input module M1, identifies the supervision factor-the ID number of the natural person from the above data information for the supervision instruction, and then the risk decision module M3 Enter the ID number in the SQL statement corresponding to indicator Z1 and run the query to get the actual number of borrowings of the single natural person on the single platform, and compare the value of the supervision factor-the actual number of borrowings and the threshold of indicator Z1 20W , The risk treatment module M4 of the risk engine outputs the corresponding regulatory treatment plan: when the actual loan amount of a single natural person is less than 20W, the risk treatment module M4 may not output; when the actual loan amount of a single natural person is higher than 20W, risk treatment The module M4 can send a powerful alarm message to the corresponding online loan platform node, or report it to the supervisory authority or superior supervisory authority. 同樣,上述具體的風險處置方案可與具體的監管指標管理,以方便風險處置模組M4的處置方案輸出。 Similarly, the above specific risk treatment plan can be managed with specific regulatory indicators to facilitate the output of the treatment plan of the risk treatment module M4. 當然,根據監管的具體需求,可以省去對預警指標的監管而直接對報警指標進行監管,在本說明書中不作限定。 Of course, according to the specific needs of supervision, the supervision of early warning indicators can be omitted and the alarm indicators can be directly supervised, which is not limited in this manual. 當監管指標池中的多個監管指標以多叉樹的形式被儲存時,由於多叉樹資料結構便於提高遍歷查找的效率,因此在面對“篩查所有的監管指標,監測是否有違規行為”或類似的普遍性監管指令時,更能提高監管的效率。 When multiple regulatory indicators in the regulatory indicator pool are stored in the form of a multi-tree, because the data structure of the multi-tree is convenient to improve the efficiency of traversal and search, when faced with "screening all regulatory indicators, monitoring whether there are violations "Or similar general regulatory directives can improve the efficiency of supervision. 在普遍性監察是否有預警或違規行為發生時,金融監管機構可遍歷其監管指標池中儲存的監管指標多叉樹,對每個已經設立好的監管指標進行對應的風險決策,該風險決策的具體過程與上述對監管指標Z1、或預警監管指標Z1Y的過程類似,在此不作贅述。 When there is an early warning or irregularity in the general supervision, the financial supervisory institution can traverse the multi-tree of supervisory indicators stored in its supervisory indicator pool, and make corresponding risk decisions for each established supervisory indicator. The specific process is similar to the above-mentioned process for the supervision indicator Z1 or the early warning supervision indicator Z1Y, and will not be repeated here. 值得注意的是,上述的風險處置模組M4針對具體的監管指標(如Z1Y或Z1)輸出的監管處理方案,也可關聯在該監管指標所在的、監管指標多叉樹的節點上,例如在監管指標Z1Y的節點上關聯兩種處理方案:當監管因數的取值小於監管指標Z1Y的閾值時,不作出回應;當監管因數的取值大於或等於監管指標Z1Y的閾值時,向相應的網貸平台節點發出預警提示訊息。 It is worth noting that the above-mentioned risk treatment module M4 outputs a supervision solution for a specific supervision indicator (such as Z1Y or Z1), and can also be associated with the node of the supervision indicator polytree where the supervision indicator is located, for example, Two solutions are associated with the node of the regulatory indicator Z1Y: when the value of the regulatory factor is less than the threshold of the regulatory indicator Z1Y, no response is made; when the value of the regulatory factor is greater than or equal to the threshold of the regulatory indicator Z1Y, the corresponding network The loan platform node sends out an early warning message. 這樣在對“自然人à借款報警”類指標的儲存多叉樹的遍歷監管程式運行到所述監管指標Z1Y時,將具體自然人的身份證號碼輸入指標Z1Y的可執行SQL語句並在所監管的每個平台所提供的資料中查詢,得到該自然人在每個平台上的實際貸款取值,根據該取值於Z1Y閾值的對比關係,從Z1Y節點上輸出執行相應的處理方案。 In this way, when the traversal supervision program for the storage multi-tree of indicators of the "natural person à loan alarm" runs to the supervision indicator Z1Y, the ID number of the specific natural person is entered into the executable SQL statement of the indicator Z1Y and is displayed in each of the monitored indicators. Query the data provided by each platform to obtain the actual loan value of the natural person on each platform. According to the comparison relationship between the value and the Z1Y threshold, the corresponding processing plan is output from the Z1Y node and executed. 上述將監管處理方案關聯於監管多叉樹的相應節點上的技術方案,方便風險處理程式或風險處理引擎更快地作出風險處理,從而提升監管的效率。 The above-mentioned technical solution of associating the supervisory processing solution with the corresponding node of the supervisory multi-branch tree facilitates the risk processing program or the risk processing engine to perform risk processing faster, thereby improving the efficiency of supervision. 金融監管機構透過建立上述風險引擎或執行上述風險監管處理程式,完成了從監管資訊中提取監管查詢因數,並將所述監管查詢因數的取值與所述監管指標的閾值作對比,且根據所述比較結果執行風險監管處理方案的過程,尤其是透過同時監管多平台上發生提供的監管資訊,不僅僅識別單個平台的風險,穿透式集中監管多個網貸平台,極大降低了對多平台線下監管的時間和經濟成本,可有效防止跨機構跨地區違規行為。 The financial regulatory agency has completed the extraction of regulatory query factors from regulatory information by establishing the above-mentioned risk engine or executing the above-mentioned risk regulatory processing program, and compared the value of the regulatory query factor with the threshold value of the regulatory indicator, and based on Describes the process of implementing risk supervision and handling plans based on the comparison results, especially by simultaneously supervising the supervision information that occurs on multiple platforms. It not only identifies the risks of a single platform, but also centrally supervises multiple online lending platforms, which greatly reduces the need for multiple platforms. The time and economic cost of offline supervision can effectively prevent cross-organization and cross-regional violations. 在本說明書所提供的實施例中,上述基於預配置的監管規則對所述原始資訊記錄執行風險監管處理的實施,既可以由資訊監管方如金融監管機構的中心化伺服器來程式化運行實現,也可調用發佈在該監管區塊鏈上的風險監管智能合約,執行該智能合約中聲明的與監管規則對應的執行程式,對所述原始資訊記錄執行風險監管處理。 In the embodiments provided in this specification, the above-mentioned implementation of the risk monitoring process based on the pre-configured regulatory rules on the original information records can be implemented programmatically by the information regulator such as the centralized server of the financial regulatory agency. , You can also call the risk supervision smart contract published on the supervision blockchain, execute the execution program corresponding to the supervision rules declared in the smart contract, and perform risk supervision processing on the original information record. 該智能合約的發佈方,既可以是該金融監管機構,又可以是該金融監管機構的上級監管機構——上級監管機構為了監管方便,可發佈多個下級監管機構通用的智能合約程式,供各個下級監管機構使用。 The issuer of the smart contract can be either the financial regulatory agency or the upper-level regulatory agency of the financial regulatory agency. For the convenience of supervision, the upper-level regulatory agency can issue smart contract programs common to multiple lower-level regulatory agencies for each Used by lower-level regulatory agencies. 本領域的技術人員應知,相比於中心化的伺服器運行方式,智能合約在任何時候應相應用戶的請求而調用,大大提升監管的效率;且智能合約執行有著較低的人為干預、去中心化權威的優勢,更加增加了監管行為的公平性。 Those skilled in the art should know that, compared to the centralized server operation mode, smart contracts are called at any time in response to user requests, which greatly improves the efficiency of supervision; and the execution of smart contracts has lower human intervention and deprivation. The advantages of centralized authority have increased the fairness of regulatory actions. 與上述流程實現對應,本說明書的實施例還提供了一種分散式資訊監管裝置。 Corresponding to the implementation of the above process, the embodiment of this specification also provides a decentralized information monitoring device. 該裝置可以透過軟體實現,也可以透過硬體或者軟硬體結合的方式實現。 The device can be implemented through software, or through hardware or a combination of software and hardware. 以軟體實現為例,作為邏輯意義上的裝置,是透過所在設備的CPU(Central Process Unit,中央處理器)將對應的電腦程式指令讀取到記憶體中運行形成的。 Take software implementation as an example. As a logical device, it is formed by reading the corresponding computer program instructions into the memory through the CPU (Central Process Unit) of the device where it is located. 從硬體層面而言,除了圖9所示的CPU、內部記憶體以及記憶體之外,網路風險業務的實現裝置所在的設備通常還包括用於進行無線信號收發的晶片等其他硬體,和/或用於實現網路通信功能的板卡等其他硬體。 From the perspective of hardware, in addition to the CPU, internal memory, and memory shown in Figure 9, the equipment where the network risk business is implemented usually also includes other hardware such as chips for wireless signal transmission and reception. And/or other hardware such as boards used to implement network communication functions. 圖8所示為本說明書所提供一種基於區塊鏈的資訊監管裝置,所述區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,所述資訊監管裝置包括資訊獲取單元802,用於所述資訊監管方獲取所述資訊提供方發佈的加密資訊記錄;其中,所述加密資訊記錄基於與所述資訊監管方的公鑰相關的密鑰進行加密; 資訊解密單元804,用於使用與所述資訊監管方的私鑰相關的密鑰,對所述加密資訊記錄進行解密獲取原始資訊記錄; 風險監管處理單元806,用於基於預配置的監管規則對所述原始資訊記錄執行風險監管處理。 Figure 8 shows a block chain-based information supervision device provided in this specification. The block chain includes at least one information supervisor node and a number of information provider nodes. The information supervision device includes an information acquisition unit 802. Obtain the encrypted information record issued by the information provider from the information supervisor; wherein the encrypted information record is encrypted based on a key related to the public key of the information supervisor; an information decryption unit 804 for use The key related to the private key of the information supervisory party decrypts the encrypted information record to obtain the original information record; the risk supervision processing unit 806 is configured to perform risk supervision on the original information record based on pre-configured supervision rules deal with. 上述裝置中各個模組的功能和作用的實現過程具體詳見上述方法中對應步驟的實現過程,在此不再贅述。 For the implementation process of the functions and roles of each module in the above-mentioned device, refer to the implementation process of the corresponding steps in the above-mentioned method for details, which will not be repeated here. 對於裝置實施例而言,由於其基本對應於方法實施例,所以相關之處參見方法實施例的部分說明即可。 For the device embodiment, since it basically corresponds to the method embodiment, the relevant part can refer to the part of the description of the method embodiment. 以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的模組可以是或者也可以不是物理上分開的,作為模組顯示的部件可以是或者也可以不是物理模組,即可以位於一個地方,或者也可以分佈到多個網路模組上。 The device embodiments described above are merely illustrative. The modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules. It can be located in one place, or it can be distributed to multiple network modules. 可以根據實際的需要選擇其中的部分或者全部模組來實現本說明書方案的目的。 Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. 本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。 Those of ordinary skill in the art can understand and implement it without creative work. 上述實施例闡明的系統、裝置、模組或模組,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。 The system, device, module, or module set forth in the above embodiments can be implemented by a computer chip or entity, or implemented by a product with a certain function. 一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、行動電話、相機電話、智慧型電話、個人數位助理、媒體播放機、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。 A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game control A console, a tablet, a wearable device, or a combination of any of these devices. 與上述方法實施例相對應,本說明書的實施例提供了一種電腦設備,該電腦設備包括記憶體和處理器。 Corresponding to the foregoing method embodiments, the embodiments of this specification provide a computer device, which includes a memory and a processor. 其中,記憶體上儲存有能夠由處理器運行的電腦程式;處理器在運行儲存的電腦程式時,執行本說明書實施例中基於區塊鏈的資訊監管的實現方法的各個步驟。 Wherein, a computer program that can be run by the processor is stored in the memory; when the processor runs the stored computer program, each step of the implementation method of information supervision based on the blockchain in the embodiment of this specification is executed. 對上述資訊監管的實現方法的各個步驟的詳細描述請參見之前的內容,不再重複。 Please refer to the previous content for a detailed description of the various steps of the above-mentioned information supervision implementation method, and will not be repeated. 與上述方法實施例相對應,本說明書的實施例提供了一種電腦可讀儲存媒體,該儲存媒體上儲存有電腦程式,這些電腦程式在被處理器運行時,執行本說明書實施例中基於區塊鏈的資訊監管的實現方法的各個步驟。 Corresponding to the above method embodiments, the embodiments of this specification provide a computer-readable storage medium on which computer programs are stored. These computer programs, when run by a processor, execute the block-based The various steps of the realization method of chain information supervision. 對上述資訊監管的實現方法的各個步驟的詳細描述請參見之前的內容,不再重複。 Please refer to the previous content for a detailed description of each step of the above-mentioned information supervision implementation method, and will not be repeated. 以上所述僅為本說明書的較佳實施例而已,並不用以限制本說明書,凡在本說明書的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本說明書保護的範圍之內。 The above descriptions are only preferred embodiments of this specification, and are not intended to limit this specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification shall be included in this specification Within the scope of protection. 在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。 In a typical configuration, the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory. 記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。 Memory may include non-permanent memory in computer-readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory ( flash RAM). 記憶體是電腦可讀媒體的示例。 Memory is an example of computer-readable media. 電腦可讀媒體包括永久性和非永久性、可移動和非可移動媒體可以由任何方法或技術來實現資訊儲存。 Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. 資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。 Information can be computer-readable instructions, data structures, program modules, or other data. 電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存、磁盒式磁帶,磁帶磁片儲存或其他磁性存放裝置或任何其他非傳輸媒體,可用於儲存可以被計算設備訪問的資訊。 Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital multi-function optical disc (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. 按照本文中的界定,電腦可讀媒體不包括暫存電腦可讀媒體(transitory media),如調製的資料信號和載波。 According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves. 還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。 It should also be noted that the terms "include", "include" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or include elements inherent to the process, method, commodity, or equipment. 在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。 If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity or equipment that includes the element. 本領域技術人員應明白,本說明書的實施例可提供為方法、系統或電腦程式產品。 Those skilled in the art should understand that the embodiments of this specification can be provided as methods, systems, or computer program products. 因此,本說明書的實施例可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體方面的實施例的形式。 Therefore, the embodiments of this specification may adopt the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware. 而且,本說明書的實施例可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。 Moreover, the embodiments of this specification can adopt computer programs implemented on one or more computer-usable storage media (including but not limited to magnetic disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. The form of the product. As shown in FIG. 1, the embodiment provided in this specification illustrates a method for information supervision based on a blockchain. The blockchain includes at least one information supervisor node and several information provider nodes. The supervision method includes: Step 102 , The information supervisor obtains the encrypted information record issued by the information provider; wherein, the encrypted information record is encrypted based on a key related to the public key of the information supervisor; step 104, using the information The key related to the private key of the supervisory party decrypts the encrypted information record to obtain the original information record; Step 106, performs risk supervision processing on the original information record based on the pre-configured supervision rules. The "information supervisor" described in the embodiments provided in this specification is the server or terminal where the institution performing the supervisory duties in in As shown in FIG. 1, the embodiment provided in this specification illustrates a method for information supervision based on a blockchain. The blockchain includes at least one information supervisor node and several information provider nodes. The supervision method includes: Step 102, The information supervisor obtains the encrypted information record issued by the information provider; wherein, the encrypted information record is encrypted based on a key related to the public key of the information supervisor; step 104, using the information The key related to the private key of the supervisory party decrypts the encrypted information record to obtain the original information record; Step 106, performs risk supervision processing on the original information record based on the pre-configured supervision rules. The "information supervisor" described in the embodiments provided in this specification is the server or terminal where the institution performing the supervisory duties in in formation supervision is located. The "information provider" described in the embodiments provided in this specification may specifically be the information supervision The terminal of the supervised party may also be another server or terminal that has data connection with the supervised party, and the "information" provided by it is the supervised object information data, such as loan data, transaction data, etc. In the embodiments described in this specification, any information regulator and information provider can join the blockchain as a node of the blockchain by following the installation of the corresponding node protocol and running the node protocol program. Therefore, compared with the current status of the regulatory agency's online review of the business status of the regulated agency, the method provided by the embodiment of this specification to join the blockchain online to become its node to participate in the supervision or supervision method has more superior conven formation supervision is located. The "information provider" described in the embodiments provided in this specification may specifically be the information supervision The terminal of the supervised party may also be another server or terminal that has data connection with the supervised party, and the "information "provided by it is the supervised object information data, such as loan data, transaction data, etc. In the embodiments described in this specification, any information regulator and information provider can join the blockchain as a node of the blockchain by following the installation of the corresponding node protocol and running the node protocol program. Therefore, compared with the current status of the regulatory agency's online review of the business status of the regulated agency, the method provided by the embodiment of this specification to join the blockchain online to become its node to participate in the supervision or supervision method has more superior conven ience and economy Sex, you can join or withdraw at any time. The embodiments provided in this specification can run on any device with computing and storage capabilities, such as mobile phones, tablet computers, PCs (Personal Computers), notebook computers, servers, etc.; it can also be run on two Or logical nodes of more than two devices to implement various functions in the embodiments of this specification. The “blockchain” described in the embodiments provided in this specification can specifically refer to a P2P network system with distributed data storage structure achieved by each node through a consensus mechanism, and the data in the blockchain is distributed in time Within the connected "blocks", the latter block contains the data summary of the previous block, and according to the specific consensus mechanism (such as POW, POS, DPOS or PBFT, etc.), all or The data of some nodes are fully backed up. Those skilled in the art are familiar with the fact that since the blockchain ience and economy Sex, you can join or withdraw at any time. The embodiments provided in this specification can run on any device with computing and storage capabilities, such as mobile phones, tablet computers, PCs (Personal Computers), notebook computers, servers, etc.; it can also be run on two Or logical nodes of more than two devices to implement various functions in the embodiments of this specification. The “blockchain” described in the embodiments provided in this specification can specifically refer to a P2P network system with distributed data storage structure achieved by each node through a consensus mechanism, and the data in the blockchain is distributed in time Within the connected "blocks", the latter block contains the data summary of the previous block, and according to the specific consensus mechanism ( such as POW, POS, DPOS or PBFT, etc.), all or The data of some nodes are fully backed up. Those skilled in the art are familiar with the fact that since the blockchain system operates under the corresponding consensus mechanism, the data that has been included in the blockchain database is difficult to be tampered with by any node. For example, the blockchain using Pow consensus requires at least a full Only an attack of 51% of the network's computing power is likely to tamper with the existing data. Therefore, the blockchain system has the characteristics of ensuring data security and preventing attack and tampering that are unmatched by other centralized database systems. It can be seen that in the embodiments provided in this specification, the "information" provided by the information provider and included in the blockchain will not be attacked or tampered, thereby ensuring the authenticity and fairness of supervision. In order to further ensure the privacy of regulation, in the embodiment provided in this specification, the information provided by the information provider is encrypted with a key related to the public key of the information regu system operates under the corresponding consensus mechanism, the data that has been included in the blockchain database is difficult to be tampered with by any node. For example, the blockchain using Pow consensus requires at least a full Only an attack of 51% of the network's computing power is likely to tamper with the existing data. Therefore, the blockchain system has the characteristics of ensuring data security and preventing attack and tampering that are unmatched by other centralized database systems. It can be seen that in the embodiments provided in this specification, the "information" provided by the information provider and included in the blockchain will not be attacked or tampered, thereby ensuring the authenticity and fairness of supervision. In order to further ensure the privacy of regulation, in the embodiment provided in this specification, the information provided by the information provider is encrypted with a key related to the public key of the information regu lator; the encrypted information can only be used by the information regulator The private key related to the private key is decrypted to obtain the original information record, preventing other nodes co-located in the same blockchain from learning the plaintext of the information (ie the original information record). There are many encryption methods that can be decrypted by the corresponding information regulator, such as ECDSA and RSA. In the embodiments provided in this specification, the encryption method can be specifically set according to requirements. According to the blockchain-based information supervision method provided by the embodiments of the present specification, the information supervisor implements risk supervision processing on the original information record based on pre-configured supervision rules. There are many specific risk supervision processing schemes, such as digitizing the supervision rules Transform into corresponding regulatory indicators, compare the lator; the encrypted information can only be used by the information regulator The private key related to the private key is decrypted to obtain the original information record, preventing other nodes co-located in the same blockchain from learning the plaintext of the information (ie the original information record). There are many encryption methods that can be decrypted by the corresponding information regulator, such as ECDSA and RSA. In the embodiments provided in this specification, the encryption method can be specifically set according to requirements. According to the blockchain- based information supervision method provided by the embodiments of the present specification, the information supervisor implements risk supervision processing on the original information record based on pre-configured supervision rules. There are many specific risk supervision processing schemes, such as digitizing the supervision rules Transform into corresponding regulatory indicators, compare the thresholds of the regulatory indicators with the values of the regulatory factors in the original information records obtained from the blockchain network, and then directly and effectively output the regulatory results according to whether or not the violations are violated; or from Identify the violation factor in the original information records obtained on the blockchain network. Once the violation factor is identified, the default risk supervision process is performed, such as early warning, alarm, and blockade. The plan for performing risk supervision processing on the original information records based on the pre-configured supervision rules is specifically set according to specific supervision requirements, and is not limited in this specification, thereby finally completing from the collection of supervision information to the supervised behavior The integrated digital supervision method of processing improves the convenience, economy, authenticity and efficiency of supervisio thresholds of the regulatory indicators with the values ​​of the regulatory factors in the original information records obtained from the blockchain network, and then directly and effectively output the regulatory results according to whether or not the violations are violated; or from Identify the violation factor in the original information records obtained on the blockchain network. Once the violation factor is identified, the default risk supervision process is performed, such as early warning, alarm, and blockade. The plan for performing risk supervision processing on the original information records based on the pre -configured supervision rules is specifically set according to specific supervision requirements, and is not limited in this specification, thereby finally completing from the collection of supervision information to the supervised behavior The integrated digital supervision method of processing improves the convenience, economy, authenticity and efficiency of supervisio n behavior. The following uses the financial regulator to supervise the borrowing of the same borrower in the same online loan institution and different online loan institutions as an example to explain the specific implementation methods provided in this manual. In this embodiment, the financial supervisory authority is an information supervisor, each online loan institution is a different information provider, and the natural borrower user is the subject of supervision. In order to reduce the confirmation time of transactions or data, increase transaction transmission volume, and meet the requirements for security and performance, financial institutions usually choose the alliance chain architecture to construct the blockchain. Institutions with higher credit, such as large banks, giant enterprises, and some regulatory agencies, can be used as pre-selected nodes of the alliance chain to participate in the block accounting. The consensus process of the alliance chain is also controlle n behavior. The following uses the financial regulator to supervise the borrowing of the same borrower in the same online loan institution and different online loan institutions as an example to explain the specific implementation methods provided in this manual. In this manual. In this, the financial supervisory authority is an information supervisor, each online loan institution is a different information provider, and the natural borrower user is the subject of supervision. In order to reduce the confirmation time of transactions or data, increase transaction transmission volume, and meet the requirements for security and performance, financial institutions usually choose the alliance chain architecture to construct the blockchain. Institutions with higher credit, such as large banks, giant enterprises, and some regulatory agencies, can be used as pre-selected nodes of the alliance chain to participate in the block alliance accounting. The consensus process of the alliance chain is also controlle d by the pre-selected nodes. When there are more than a set proportion of nodes (such as 2/3) on the network to confirm a block, the transactions or data recorded in the block will be confirmed by the entire network. The alliance chain can determine the degree of openness to the public according to the application scenario, and give open institutions permission to access the alliance chain. For example, in this embodiment, the financial regulator as an information regulator can participate in accounting for pre-selected nodes Each information provider such as an online loan institution may be a general node with access to the alliance chain; of course, the financial regulatory agency may also be a general node with access to the alliance chain, which is not limited in this specification. The alliance chain usually adopts proof-of-stake or consensus algorithms such as PBFT and RAFT. Figure 2 illustrates the consensus process of the simplified PBFT algorithm, where C is the client, N 0 ~ d by the pre-selected nodes. When there are more than a set proportion of nodes (such as 2/3) on the network to confirm a block, the transactions or data recorded in the block will be confirmed by the entire network. The alliance chain can determine the degree of openness to the public according to the application scenario, and give open institutions permission to access the alliance chain. For example, in this embodiment, the financial regulator as an information regulator can participate in accounting for pre-selected nodes Each information provider such as an online loan institution may be a general node with access to the alliance chain; of course, the financial regulatory agency may also be a general node with access to the alliance chain, which is not limited in this specification. The alliance chain usually adopts proof-of-stake or consensus algorithms such as PBFT and RAFT. Figure 2 illustrates the consensus process of the simplified PBFT algorithm, where C is the client, N 0 ~ N 3 represent the service node, in particular, N 0 is the main node, and N 3 is the faulty node. The PBFT system usually assumes that the number of faulty nodes is m, and the total number of service nodes is 3m+1. In simple terms, the entire communication process is as follows: 1) The client sends a request to the master node to call the service operation; 2) After the master node receives the request, it starts a three-phase protocol to broadcast the request to each slave node; [2.1] Sequence number allocation phase (Also called pre-prepare phase), the master node assigns a serial number n to the request, broadcasts the serial number assignment message and the client's request message m, and constructs the PRE-PREPARE message to each slave node; [2.2] interactive phase (also called prepare stage), receive PRE-PREPARE message from the node, broadcast PRE-PREPARE message to other server nodes; [2.3] sequence number confirmation stage (also called commit stage), after each node verifies N 3 represent the service node, in particular, N 0 is the main node, and N 3 is the faulty node. The PBFT system usually assumes that the number of faulty nodes is m, and the total number of service nodes is 3m+1 . In simple terms, the entire communication process is as follows: 1) The client sends a request to the master node to call the service operation; 2) After the master node receives the request, it starts a three-phase protocol to broadcast the request to each slave node; [2.1] Sequence number allocation phase (Also called pre-prepare phase), the master node assigns a serial number n to the request, broadcasts the serial number assignment message and the client's request message m, and constructs the PRE-PREPARE message to each slave node; [2.2] interactive phase (also called prepare stage), receive PRE-PREPARE message from the node, broadcast PRE-PREPARE message to other server nodes; [2.3] sequence number confirmation stage (also called commit stage), after each node verifies the request and order in the view, broadcast COMMIT message, execute the received client request and respond to the client. 3) The client waits for responses from different nodes. If m+1 responses are the same, the response is the result of consensus. As with all state machine replica replication technologies, PBFT puts forward two qualifications for each replica node: 1) All nodes must be deterministic. That is to say, in the case where the given state and parameters are the same, the result of the operation execution must be the same; 2) All nodes must start execution from the same state. Under these two limited conditions, even if the failed replica node exists, the PBFT algorithm agrees on the total order of execution for all non-failed replica nodes, thereby ensuring security. According to the consensus communication process shown in Figure 2, a batch of records generates a block, and finally forms a chain. The PBFT algorithm as a preferred embodiment provided in this specificati the request and order in the view, broadcast COMMIT message, execute the received client request and respond to the client. 3) The client waits for responses from different nodes. If m+1 responses are the same, the response is the result of consensus . As with all state machine replica replication technologies, PBFT puts forward two qualifications for each replica node: 1) All nodes must be deterministic. That is to say, in the case where the given state and parameters are the same, the result of the operation execution must be the same; 2) All nodes must start execution from the same state. Under these two limited conditions, even if the failed replica node exists, the PBFT algorithm agrees on the total order of execution for all non-failed replica nodes , thereby ensuring security. According to the consensus communication process shown in Figure 2, a batch of records generates a block, and finally forms a chain. The PBFT algorithm as a preferred embodiment provided in this specificati on is due to the high efficiency of consensus using this algorithm, which can meet the needs of high-frequency transaction volume, such as frequent loan transactions in this embodiment; and consensus The delay is very low, basically meeting the requirements of real-time processing, and can quickly and immediately output the supervision results to the supervision information; trusted nodes as pre-selected accounting nodes, taking into account the security and stability; in addition, the use of PBFT algorithm will not consume Excessive computer computing resources do not necessarily require token circulation, so it has good usability. More preferably, in the embodiments provided in this specification, each online loan institution acts as an information provider, and the information provided by it related to personal lending usually involves privacy information such as identity, as shown in Table 1, to ensure that it involves its own institution Or the plaintext of the borrower's privacy on is due to the high efficiency of consensus using this algorithm, which can meet the needs of high-frequency transaction volume, such as frequent loan transactions in this embodiment; and consensus The delay is very low, basically meeting the requirements of real-time processing, and can quickly and immediately output the supervision results to the supervision information; trusted nodes as pre-selected accounting nodes, taking into account the security and stability; in addition, the use of PBFT algorithm will not consume Excessive computer computing resources do not necessarily require token circulation, so it has good usability. More preferably, in the embodiments provided in this specification, each online loan institution acts as an information provider, and the information provided by it related to personal lending usually involves privacy information such as identity, as shown in Table 1, to ensure that it involves its own institution Or the plaintext of the borrower's privacy information is only known to the corresponding financial regulatory agency with regulatory authority, but not to other nodes in the same blockchain or illegal use. Each online loan agency should encrypt the regulatory information it provides. There are many specific encryption methods. For example, online lending institutions may agree with financial supervisory institutions to encrypt and decrypt symmetric keys in advance; online loan institutions may also use keys related to financial supervisory institutions' public keys for asymmetric encryption Then, the financial regulator can use the key related to its private key to decrypt to obtain the plain text of the loan information provided by the online loan institution (as shown in Table 1), thereby preventing other nodes from learning the regulatory information.
Figure 108105404-A0304-0001
Table 1 Information table of personal C borrowing from individual B on the platform of online lending institution A For example, as shown in Figure 3, the online lending institution as an information provider first uses the corresponding public key of the financial regulatory institution to lend to it The plaintext of the information (as shown in Table 1) is encrypted to obtain the ciphertext of the loan information, and then to ensure that the ciphertext is not tampered with and forged, the online loan institution digitally signs the ciphertext and encrypts the pair of ciphertext The digital signature and the cipher text are uploaded together to the cache of the blockchain database where the online loan institution node is located; the bookkeeper of the blockchain, such as the pre-selected node in the alliance chain with accounting authority, needs to be included To verify the data records to the blockchain, the verification process must include the verification of the above digital s Table 1 Information table of personal C borrowing from individual B on the platform of online lending institution A For example, as shown in Figure 3, the online lending institution as an information provider first uses the corresponding public key of the financial regulatory institution to lend to it The plaintext of the information (as shown in Table 1) is encrypted to obtain the ciphertext of the loan information, and then to ensure that the ciphertext is not tampered with and forged, the online loan institution digitally signs the ciphertext and encrypts the pair of ciphertext The digital signature and the cipher text are uploaded together to the cache of the blockchain database where the online loan institution node is located; the bookkeeper of the blockchain, such as the pre-selected node in the alliance chain with accounting authority, needs to be included To verify the data records to the blockchain, the verification process must include the verification of the above digital s ignatures. The verification process is to prevent the data from being tampered with or the information is forged by other participants. The digital signature and ciphertext of the ciphertext are included in the blocks of the above-mentioned blockchain. After the digital signature of the ciphertext and the ciphertext are included in the blockchain as a pre-selected node in the alliance chain, as a node of the blockchain, the financial regulator can obtain the above from the blockchain For the digital signature and ciphertext of the ciphertext, accordingly, the financial regulator can decrypt the ciphertext by using the private key corresponding to the above public key, thereby obtaining the plaintext of the specific loan information. In this embodiment, the financial regulator as the information regulator may be a pre-selected node with accounting authority or an ordinary node, which is not specifically limited in this specification, as long as it has the digital signature and The ciphe ignatures. The verification process is to prevent the data from being tampered with or the information is forged by other participants. The digital signature and ciphertext of the ciphertext are included in the blocks of the above-mentioned blockchain. After the digital signature of the ciphertext and the ciphertext are included in the blockchain as a pre-selected node in the alliance chain, as a node of the blockchain, the financial regulator can obtain the above from the blockchain For the digital signature and ciphertext of the ciphertext, accordingly, the financial regulator can decrypt the ciphertext by using the private key corresponding to the above public key, thereby obtaining the plaintext of the specific loan information. In this embodiment, the financial regulator as the information regulator may be a pre-selected node with accounting authority or an ordinary node, which is not specifically limited in this specification, as long as it has the digital signature and The ciphe r text has access to view permissions. The embodiments of this specification do not make specific limitations on the digital signature and verification algorithm, and the public-private key pair algorithm of the financial regulatory agency, and can use the elliptic curve algorithm and RSA algorithm to complete the relevant hash calculation. The method can be completed with MD5, SHA256, etc. Regarding the above process of encrypting the loan information to obtain the ciphertext, it can be implemented by the two parties agreeing on a symmetric key. For example, as shown in FIG. 4, an online loan institution as an information provider may encrypt the plain text of loan information by using ECDH to exchange keys. Those skilled in the art should know that in a blockchain system that uses the same elliptic curve algorithm (that is, the same straight line or base point) to obtain the public-private key pair related to the identity of the organization, the private key AS of the organization A r text has access to view permissions. The embodiments of this specification do not make specific limitations on the digital signature and verification algorithm, and the public-private key pair algorithm of the financial regulatory agency, and can use the elliptic curve algorithm and RSA algorithm to complete the relevant hash calculation. The method can be completed with MD5, SHA256, etc. Regarding the above process of encrypting the loan information to obtain the ciphertext, it can be implemented by the two parties agreeing on a symmetric key. For example, as shown in FIG. 4, an online loan institution as an information provider may encrypt the plain text of loan information by using ECDH to exchange keys. Those skilled in the art should know that in a blockchain system that uses the same elliptic curve algorithm ( that is, the same straight line or base point) to obtain the public-private key pair related to the identity of the organization, the private key AS of the organization A and the organization The product of B's public key BP is equal to the product of organization A's public key AP and organization B's private key BS. That is: AS and the organization The product of B's ​​public key BP is equal to the product of organization A's public key AP and organization B's private key BS. That is: AS
Figure 02_image001
, In the embodiment described in this specification: the public key JP of the financial regulatory agency , In the embodiment described in this specification: the public key JP of the financial regulatory agency
Figure 02_image003
. Therefore, the online lending institution can use the key obtained by multiplying the public key JP of the corresponding financial regulatory institution and its own private key DS to encrypt the plain text of the loan information to obtain the cipher text of the loan information, similarly, and then to ensure the secret The text is not tampered with and forged. The online lending institution digitally signs the ciphertext, and the digital signature of the ciphertext, the ciphertext and the corresponding private key DS used for encrypting the loan information mentioned above The public key DP and the public key JP of the financial regulatory agency are uploaded together to the cache of the blockchain database where the online loan institution node is located; the bookkeeper of the blockchain, such as a pre-selected node in the alliance chain with accounting authority, First verify the digital signature. The verification process is to prevent the data from being tampered or the inform Therefore, the online lending institution can use the key obtained by multiplying the public key JP of the corresponding financial regulatory institution and its own private key DS to encrypt the plain text of the loan information to obtain the cipher text of the loan information, similarly , and then to ensure the secret The text is not tampered with and forged. The online lending institution digitally signs the ciphertext, and the digital signature of the ciphertext, the ciphertext and the corresponding private key DS used for encrypting the loan information mentioned above The public key DP and the public key JP of the financial regulatory agency are uploaded together to the cache of the blockchain database where the online loan institution node is located; the bookkeeper of the blockchain, such as a pre-selected node in the alliance chain with accounting authority, First verify the digital signature. The verification process is to prevent the data from being tampered or the inform ation is forged by other participants. After the verification, the accountant will sign the digital signature, ciphertext, and the above The public key DP corresponding to the private key DS used for the encryption of the loan information and the public key JP of the financial regulatory agency are included in the blocks of the above-mentioned blockchain. After the digital signature of the ciphertext, the ciphertext, and the public key corresponding to the private key used to encrypt the loan information described above are included in the blockchain by the pre-selected node in the alliance chain, the financial The supervisory authority can obtain the above digital signature and ciphertext for the ciphertext from the blockchain. Accordingly, the financial supervisory authority can use the private key JS corresponding to the public key JP obtained from the Internet and The key obtained by multiplying the obtained DP decrypts the ciphertext to obtain the plaintext of the specific loan in ation is forged by other participants. After the verification, the accountant will sign the digital signature, ciphertext, and the above The public key DP corresponding to the private key DS used for the encryption of the loan information and the public key JP of the financial regulatory agency are included in the blocks of the above-mentioned blockchain. After the digital signature of the ciphertext, the ciphertext, and the public key corresponding to the private key used to encrypt the loan information described above are included in the blockchain by the pre -selected node in the alliance chain, the financial The supervisory authority can obtain the above digital signature and ciphertext for the ciphertext from the blockchain. Accordingly, the financial supervisory authority can use the private key JS corresponding to the public key JP obtained from the Internet and The key obtained by multiplying the obtained DP decrypts the ciphertext to obtain the plaintext of the specific loan in formation. Any other node cannot decrypt the ciphertext because it cannot know the private key JS of the financial supervisory authority. It is worth noting that since the same institution can have multiple sets of public-private key pairs in a blockchain, the public key DP and private key DS of the online loan institution used to encrypt credit information above may not necessarily be signed with the above-mentioned digital The private key and public key used in the process and signature verification are the same, but this does not affect the implementation of the technical solution, but reduces the possibility of being attacked by increasing the complexity of the system. Although the accounting node of the blockchain has verified the digital signature of the ciphertext when collecting the data, in order to further ensure the correctness of the supervision information source and prevent the data from being tampered with or malicious nodes to forge the data, the above examples provided formation. Any other node cannot decrypt the ciphertext because it cannot know the private key JS of the financial supervisory authority. It is worth noting that since the same institution can have multiple sets of public-private key pairs in a blockchain, the public key DP and private key DS of the online loan institution used to encrypt credit information above may not necessarily be signed with the above-mentioned digital The private key and public key used in the process and signature verification are the same, but this does not affect the implementation of the technical solution, but reduces the possibility of being attacked by increasing the complexity of the system. Although the accounting node of the blockchain has verified the digital signature of the ciphertext when collecting the data, in order to further ensure the correctness of the supervision information source and prevent the data from being tampered with or malicious nodes to forge the data, the above examples provided in this specification In the description, after the financial regulator obtains the ciphertext of the loan information from the above blockchain, and the online loan agency digitally signs the loan information, it can first verify the obtained digital signature again. After the verification is passed, the above ciphertext is decrypted, thereby further preventing other institutions or individuals from forging loan information, and strengthening the authenticity and authority of the financial supervision. In the embodiments provided in this specification, the financial regulator as an information regulator can establish a regulatory risk engine to modularize the processing of loan information provided by various online loan institutions. As shown in FIG. 5, the regulatory risk engine may specifically include: a data input module M1, a regulatory indicator generation module M2, a risk decision module M3, a risk disposal module M4, and so on. It is worth noting that the above-mentioned ri in this specification In the description, after the financial regulator obtains the ciphertext of the loan information from the above blockchain, and the online loan agency digitally signs the loan information, it can first verify the obtained digital signature again. After the verification is passed, the above ciphertext is decrypted, thereby further preventing other institutions or individuals from forging loan information, and strengthening the authenticity and authority of the financial supervision. In the embodiments provided in this specification, the financial regulator as an information regulator can establish a regulatory risk engine to modularize the processing of loan information provided by various online loan institutions. As shown in FIG. 5, the regulatory risk engine may specifically include: a data input module M1, a regulatory indicator generation module M2, a risk decision module M3, a risk disposal module M4, and so on. It is worth noting that the above-mentioned ri sk supervision engine is only the actualized name of the risk supervision processing program, and there is no specific boundary between each module of the risk supervision engine. It is only for the convenience of explaining the function of the above-mentioned risk engine. Divide it into multiple modules. The data input module M1 is used to process the data obtained by the financial regulatory agency from the above-mentioned blockchain, including the ciphertext of the loan information, the digital signature of the online loan institution on the loan information, etc. According to the relevant decryption algorithm, Decrypt the ciphertext of the above loan information, or decrypt the ciphertext of the above loan signature after passing the digital signature verification, and the data information contained in the plain text of the loan information according to the data format required by the risk decision module M3 Parse. Since the data structure carried by the existing distributed shared sk supervision engine is only the actualized name of the risk supervision processing program, and there is no specific boundary between each module of the risk supervision engine. It is only for the convenience of explaining the function of the above-mentioned risk engine. Divide it into multiple modules. The data input module M1 is used to process the data obtained by the financial regulatory agency from the above-mentioned blockchain, including the ciphertext of the loan information, the digital signature of the online loan institution on the loan information, etc . According to the relevant decryption algorithm, Decrypt the ciphertext of the above loan information, or decrypt the ciphertext of the above loan signature after passing the digital signature verification, and the data information contained in the plain text of the loan information according to the data format required by the risk decision module M3 Parse. Since the data structure carried by the existing distributed shared network system or blockchain system is usually in text format and does not have good operability, the data input module M1 can tabulate the plain text of the decrypted loan information above Analyze and build the important data information needed in the risk decision module M3 into a table form, for example, restore it to the data table described in Table 1 above, and input it to the risk decision module M3. The supervision indicator generation module M2 is used to generate supervision indicators corresponding to supervision actions according to supervision regulations or guidelines. As in this embodiment, in order to supervise the behavior of "the upper limit of the borrowing balance of the same borrower in the same online loan institution", according to the financial law "the single individual and single natural person's borrowing limit on a platform is 200,000", Training establishes corresponding indicators. The training process is as follows: 1) As shown in FIG. 6, through automat network system or blockchain system is usually in text format and does not have good operability, the data input module M1 can tabulate the plain text of the decrypted loan information above Analyze and build the important data information needed in the risk decision module M3 into a table form, for example, restore it to the data table described in Table 1 above, and input it to the risk decision module M3. The supervision indicator generation module M2 is used to generate supervision indicators corresponding to supervision actions according to supervision regulations or guidelines. As in this embodiment, in order to supervise the behavior of "the upper limit of the borrowing balance of the same borrower in the same online loan institution", according to the financial law "the single individual and single natural person's borrowing limit on a platform is 200,000", Training establishes corresponding indicators. The training process is as follows: 1) As shown in FIG. 6, through automat ic analysis techniques such as named entity recognition, grammatical analysis, and dependency analysis, the subject-predicate-object structure features of the sentence are dependency-analyzed to obtain action tuples (single, natural person or individual, Borrowing, going online, 200,000), and further transforming the regulatory compliance rules into a SQL statement executable by a computer program through a predefined mapping structure relationship. 2) Generate an indicator Z1′ and map it with the SQL statement generated in step 1, and store it together in the candidate of the regulatory indicator pool; 3) Manually review the above SQL statement, after revising and confirming the correctness of the above SQL statement, It is officially deposited in the regulatory indicator pool and named Z1 indicator; Z1 indicator includes the above executable SQL statement and its threshold value-20W. Similarly, the Z2 indicator can be trained based on the financial rule of “single individual, single ic analysis techniques such as named entity recognition, grammatical analysis, and dependency analysis, the subject-predicate-object structure features of the sentence are dependency-analyzed to obtain action tuples (single, natural person or individual, Borrowing, going online, 200,000) , and further transforming the regulatory compliance rules into a SQL statement executable by a computer program through a predefined mapping structure relationship. 2) Generate an indicator Z1′ and map it with the SQL statement generated in step 1, and store it together in the candidate of the regulatory indicator pool; 3) Manually review the above SQL statement, after revising and confirming the correctness of the above SQL statement, It is officially deposited in the regulatory indicator pool and named Z1 indicator; Z1 indicator includes the above executable SQL statement and its threshold value-20W. Similarly, the Z2 indicator can be trained based on the financial rule of “single individual, single natural person's borrowing limit on multiple platforms is 1 million”; the Z2 indicator includes an executable SQL statement and its threshold— —100W. In the embodiment described in this specification, in order to facilitate the management of multiple regulatory indicators, a multi-fork tree storage structure of regulatory indicators set up in the regulatory indicator pool may be used to store multiple regulatory indicators, such as Z1 and Z2, in the multiple On the nodes of the fork tree. Further, in order to facilitate the uniform supervision of similar types of behavior, multiple different types of multi-fork trees can be set up in the supervision indicator pool, corresponding to the storage of corresponding types of supervision indicators, for example, a “natural person à loan alarm” is set up in the supervision indicator pool "Indicated multi-fork tree of indicators, on which Z1, Z2 and other indicators related to the borrowing behavior of natural person users on the online loan pl natural person's borrowing limit on multiple platforms is 1 million”; the Z2 indicator includes an executable SQL statement and its threshold— —100W. In the embodiment described in this specification, in order to facilitate the management of multiple regulatory indicators, a multi-fork tree storage structure of regulatory indicators set up in the regulatory indicator pool may be used to store multiple regulatory indicators, such as Z1 and Z2, in the multiple On the nodes of the fork tree. Further, in order to facilitate the uniform supervision of similar types of behavior, multiple different types of multi-fork trees can be set up in the supervision indicator pool, corresponding to the storage of corresponding types of supervision indicators, for example, a “natural person à loan alarm” is set up in the supervision indicator pool "Indicated multi-fork tree of indicators, on which Z1, Z2 and other indicators related to the borrowing behavior of natural person users on the online loan pl atform can be stored; should be "the same legal person or other organization on the same online loan information intermediary platform The upper limit of the borrowing balance of the loan does not exceed RMB 1 million" and other relevant regulatory measures. A multi-fork tree of "enterprise à borrowing alarm" regulatory indicators can also be set up in the regulatory indicator pool, which stores online loan platforms with corporate users Regulatory indicators related to the statutory limits on loans. Moreover, in order to facilitate multi-level supervision and better achieve the effect of early warning and prevention of illegal supervision, corresponding early warning indicators can be set for some indicators (the threshold corresponding to the early warning indicator can be set to 95% or other values of the full indicator threshold), for example For the "single individual, single natural person's borrowing on a platform does not exceed 19w" early warning supervision statement, accordi atform can be stored; should be "the same legal person or other organization on the same online loan information intermediary platform The upper limit of the borrowing balance of the loan does not exceed RMB 1 million" and other relevant regulatory measures. A multi-fork tree of "enterprise à borrowing alarm" regulatory indicators can also be set up in the regulatory indicator pool, which stores online loan platforms with corporate users Regulatory indicators related to the statutory limits on loans. Moreover, in order to facilitate multi-level supervision and better achieve the effect of early warning and prevention of illegal supervision, corresponding early warning indicators can be set for some indicators (the threshold corresponding to the early warning indicator can be set to 95% or other values ​​of the full indicator threshold), for example For the "single individual, single natural person's borrowing on a platform does not exceed 19w" early warning supervision statement, accordi ng to the process of 1)--3) above, the early warning indicator Z1Y is generated, Z1Y includes the executable training trained by the above warning supervision statement The SQL statement and its corresponding threshold value of 19W are stored in the above-mentioned regulatory index pool. Similarly, a storage multi-fork tree of the “natural person à loan warning” indicator can be established in the regulatory indicator pool, and Z1Y is stored on the node of the multi-fork tree. The “Natural Person à Borrowing Warning” indicator multi-fork tree can also store Z2Y indicators related to the warning supervision of the same natural person's borrowing behavior on multiple online loan platforms, which will not be repeated here. So far, the regulatory indicator generation module M2 has mapped the regulatory indicators to the executable SQL statements through the above data training, auditing, indicator creation, or indicator multi-fork tree creation process. The executable supervision model, th ng to the process of 1)--3) above, the early warning indicator Z1Y is generated, Z1Y includes the executable training trained by the above warning supervision statement The SQL statement and its corresponding threshold value of 19W are stored in the above-mentioned regulatory index pool. Similarly, a storage multi-fork tree of the “natural person à loan warning” indicator can be established in the regulatory indicator pool, and Z1Y is stored on the node of the multi-fork tree. The “Natural Person à Borrowing Warning” indicator multi-fork tree can also store Z2Y indicators related to the warning supervision of the same natural person's borrowing behavior on multiple online loan platforms, which will not be repeated here. So far, the regulatory indicator generation module M2 has mapped the regulatory indicators to the executable SQL statements through the above data training, auditing, indicator creation, or indicator multi-fork tree creation process. The executable supervision model, th e specific risk supervision and disposal process are carried out in the risk decision module M3. It is worth noting that in this manual, just to explain the convenience of each function of the above-mentioned risk engine, it is divided into multiple modules, and there is no specific boundary between each module. For example, the above-mentioned regulatory indicator pool can be attributed to the regulatory The generation module M2 can also be attributed to the risk decision module M3. As shown in FIG. 7, the above-mentioned regulatory indicator pool (the regulatory indicator data mart shown in the figure) is stored in the risk decision module M3, and the regulatory indicator pool may contain several regulatory indicators. After the risk decision module M3 receives the supervision instruction on "whether a single individual or a single natural person borrows on a platform needs early warning", it first searches its supervision indicator pool for the existence of the corresponding supervi e specific risk supervision and disposal process are carried out in the risk decision module M3. It is worth noting that in this manual, just to explain the convenience of each function of the above-mentioned risk engine, it is divided into multiple modules, and there is no specific boundary between each module. For example, the above-mentioned regulatory indicator pool can be attributed to the regulatory The generation module M2 can also be attributed to the risk decision module M3. As shown in FIG. 7, the above- mentioned regulatory indicator pool (the regulatory indicator data mart shown in the figure) is stored in the risk decision module M3, and the regulatory indicator pool may contain several regulatory indicators. After the risk decision module M3 receives the supervision instruction on "whether a single individual or a single natural person borrows on a platform needs early warning", it first searches its supervision indicator pool for the existence of the corresponding supervi sion indicator Z1Y, such as Exist, the risk decision module M3 enters the risk factor identification stage. The risk decision module M3 reads the data information input from the data input module M1, and identifies the supervision factor from the above data information for the supervision instruction. In this example, the supervision object is a single natural person who borrows, because the uniqueness determines whether the natural person is The single factor is the natural person's ID number (or other unique user ID), so the supervision factor in this example is the natural person's ID number, and then the risk decision module M3 enters the user in the SQL statement corresponding to the regulatory index Z1Y ID card number, run the SQL statement to query the ID card number, you can get the actual number of loans (balance) of the single natural person on the single platform, and compare the value of the supervision factor-the actual number of loans and the indicator Z1Y The threshold o sion indicator Z1Y, such as Exist, the risk decision module M3 enters the risk factor identification stage. The risk decision module M3 reads the data information input from the data input module M1, and identifies the supervision factor from the above data information for the supervision instruction. In this example, the supervision object is a single natural person who borrows, because the uniqueness determines whether the natural person is The single factor is the natural person's ID number (or other unique user ID), so the supervision factor in this example is the natural person's ID number, and then the risk decision module M3 enters the user in the SQL statement corresponding to the regulatory index Z1Y ID card number, run the SQL statement to query the ID card number, you can get the actual number of loans (balance) of the single natural person on the single platform, and compare the value of the supervision factor-the actual number of loans and the indicator Z1Y The threshold o f 19W, the risk disposal module M4 of the risk engine outputs the corresponding regulatory treatment plan: when the actual borrowing amount of a single natural person is less than 19W, the risk disposal module M4 may not treat it as a risk event and do not respond; when a single natural person When the actual loan amount is higher than 19W, according to the default risk supervision processing logic, the risk treatment module M4 can send an early warning message to the corresponding online loan platform node, such as "a large amount of borrowing is about to reach the upper limit of the regulatory limit." Prevent the online lending institution's single platform from making new loans to the user in excess of the loanable balance, and reduce the possible losses of a business. The specific risk treatment plan mentioned above can be associated with regulatory indicators to facilitate the output of the treatment plan of the risk treatment module M4. If the above financial regulatory agency fi f 19W, the risk disposal module M4 of the risk engine outputs the corresponding regulatory treatment plan: when the actual borrowing amount of a single natural person is less than 19W, the risk disposal module M4 may not treat it as a risk event and do not respond; when a single natural person When the actual loan amount is higher than 19W, according to the default risk supervision processing logic, the risk treatment module M4 can send an early warning message to the corresponding online loan platform node, such as "a large The amount of borrowing is about to reach the upper limit of the regulatory limit." Prevent the online lending institution's single platform from making new loans to the user in excess of the loanable balance, and reduce the possible losses of a business. The specific risk treatment plan mentioned above can be associated with regulatory indicators to facilitate the output of the treatment plan of the risk treatment module M4. If the above financial regulatory agency fi nds that a natural person's borrowing on a single platform has exceeded the warning threshold, it can be linked to a plan to further monitor its alarm indicators: first, search for the corresponding regulatory indicator Z1 in its regulatory indicator pool, if it exists The risk decision module M3 enters the stage of risk factor identification. Similarly, the risk decision module M3 reads the data information input from the data input module M1, and identifies the supervision factor—the natural person's ID number—from the data information for the supervision instruction, and then the risk decision module M3 Enter the ID number in the SQL statement corresponding to the indicator Z1, and run the query to get the actual number of loans borrowed by the single natural person on the single platform, and compare the value of the supervision factor--the actual loan number and the threshold of the indicator Z1 are 20W , The risk disposal module M4 of the risk engine outputs the corresponding reg nds that a natural person's borrowing on a single platform has exceeded the warning threshold, it can be linked to a plan to further monitor its alarm indicators: first, search for the corresponding regulatory indicator Z1 in its regulatory indicator pool, if it exists The risk decision module M3 enters the stage of risk factor identification. Similarly, the risk decision module M3 reads the data information input from the data input module M1, and identifies the supervision factor—the natural person's ID number—from the data information for the supervision instruction , and then the risk decision module M3 Enter the ID number in the SQL statement corresponding to the indicator Z1, and run the query to get the actual number of loans borrowed by the single natural person on the single platform, and compare the value of the supervision factor--the actual loan number and the threshold of the indicator Z1 are 20W, The risk disposal module M4 of the risk engine outputs the corresponding reg ulatory treatment plan: when the actual borrowing amount of a single natural person is less than 20W, the risk disposal module M4 may not be output; when the actual borrowing amount of a single natural person is higher than 20W, the risk disposal Module M4 can send a strong alarm message to the corresponding online loan platform node, or report it to the supervisory authority or the higher supervisory authority. Similarly, the above specific risk treatment plan can be managed with specific regulatory indicators to facilitate the output of the risk treatment module M4's treatment plan. Of course, according to the specific requirements of supervision, the supervision of warning indicators can be omitted and the warning indicators can be directly regulated, which is not limited in this manual. When multiple regulatory indicators in the regulatory indicator pool are stored in the form of a multi-fork tree, since the multi-fork tree data structure is convenient for improving the efficiency ulatory treatment plan: when the actual borrowing amount of a single natural person is less than 20W, the risk disposal module M4 may not be output; when the actual borrowing amount of a single natural person is higher than 20W, the risk disposal Module M4 can send a strong alarm message to the corresponding online loan platform node, or report it to the supervisory authority or the higher supervisory authority. Similarly, the above specific risk treatment plan can be managed with specific regulatory indicators to facilitate the output of the risk treatment module M4's treatment plan. Of course, according to the specific requirements of supervision, the supervision of warning indicators can be omitted and the warning indicators can be directly regulated, which is not limited in this manual. When multiple regulatory indicators in the regulatory indicator pool are stored in the form of a multi-fork tree, since the multi-fork tree data structure is convenient for improving the efficiency of traversal search, in the face of "screening all regulatory indicators, monitoring for violations "Or similar general supervision directives, can improve the efficiency of supervision. When there are early warnings or violations in the universal supervision, financial regulators can traverse the multi-fork tree of regulatory indicators stored in their regulatory indicator pool, and make corresponding risk decisions for each established regulatory indicator. The specific process is similar to the above process for the regulatory index Z1 or the early warning regulatory index Z1Y, and will not be repeated here. It is worth noting that the above-mentioned risk treatment module M4's regulatory processing solution output for specific regulatory indicators (such as Z1Y or Z1) can also be associated with the node where the regulatory indicator is located and the multi-tree of the regulatory indicator, for example Two processing schemes are associated with the node of the regulatory index Z1 of traversal search, in the face of "screening all regulatory indicators, monitoring for violations "Or similar general supervision directives, can improve the efficiency of supervision. When there are early warnings or violations in the universal supervision, financial regulators can traverse the multi- fork tree of regulatory indicators stored in their regulatory indicator pool, and make corresponding risk decisions for each established regulatory indicator. The specific process is similar to the above process for the regulatory index Z1 or the early warning regulatory index Z1Y, and will not be repeated here. It is worth noting that the above-mentioned risk treatment module M4's regulatory processing solution output for specific regulatory indicators (such as Z1Y or Z1) can also be associated with the node where the regulatory indicator is located and the multi-tree of the regulatory indicator, for example Two processing schemes are associated with the node of the regulatory index Z1 Y: when the value of the regulatory factor is less than the threshold of the regulatory index Z1Y, no response is made; when the value of the regulatory factor is greater than or equal to the threshold of the regulatory index Z1Y, the corresponding network The loan platform node issues an early warning message. In this way, when the traversal supervision program for the storage multi-tree of the "natural person à borrowing alarm" indicator runs to the supervision indicator Z1Y, the ID number of the specific natural person is entered into the executable SQL statement of the indicator Z1Y and the The information provided by each platform is queried to obtain the actual loan value of the natural person on each platform. Based on the comparison between the value and the Z1Y threshold, the corresponding processing plan is output from the Z1Y node. The above technical solution that relates the regulatory processing program to the corresponding node of the regulatory multi-fork tree facilitat Y: when the value of the regulatory factor is less than the threshold of the regulatory index Z1Y, no response is made; when the value of the regulatory factor is greater than or equal to the threshold of the regulatory index Z1Y, the corresponding network The loan platform node issues an early warning message. In this way, when the traversal supervision program for the storage multi-tree of the "natural person à borrowing alarm" indicator runs to the supervision indicator Z1Y, the ID number of the specific natural person is entered into the executable SQL statement of the indicator Z1Y and the The information provided by each platform is queried to obtain the actual loan value of the natural person on each platform. Based on the comparison between the value and the Z1Y threshold, the corresponding processing plan is output from the Z1Y node. The above technical solution that relates the regulatory processing program to the corresponding node of the regulatory multi-fork tree facilitat es the risk processing program or risk processing engine to make risk processing faster, thereby improving the efficiency of supervision. By establishing the above-mentioned risk engine or executing the above-mentioned risk supervision processing program, the financial regulatory agency has completed the extraction of the regulatory query factor from the regulatory information, and compared the value of the regulatory query factor with the threshold of the regulatory index, and according to the The process of implementing the risk supervision and treatment plan based on the comparison results, especially by simultaneously monitoring the supervision information provided on multiple platforms, not only identifying the risks of a single platform, but penetrating and centrally monitoring multiple online loan platforms, which greatly reduces the risk of multiple platforms. The time and economic cost of offline supervision can effectively prevent cross-institution and cross-region violations es the risk processing program or risk processing engine to make risk processing faster, thereby improving the efficiency of supervision. By establishing the above-mentioned risk engine or executing the above-mentioned risk supervision processing program, the financial regulatory agency has completed the extraction of the regulatory query factor from the regulatory information, and compared the value of the regulatory query factor with the threshold of the regulatory index, and according to the The process of implementing the risk supervision and treatment plan based on the comparison results, especially by simultaneously monitoring the supervision information provided on multiple platforms, not only identifying the risks of a single platform, but penetrating and centrally monitoring multiple online loan platforms, which greatly reduces the risk of multiple platforms. The time and economic cost of offline supervision can effectively prevent cross- institution and cross-region violations . In the embodiments provided in this specification, the implementation of the above-mentioned pre-configured supervision rules to implement risk supervision processing on the original information records can be implemented by programmatic operation of information supervision parties such as centralized servers of financial supervision institutions It can also call the risk supervision smart contract published on the supervision blockchain, execute the execution program corresponding to the supervision rules declared in the smart contract, and perform risk supervision processing on the original information record. The issuer of the smart contract can be either the financial supervisory authority or the superior supervisory authority of the financial supervisory authority-for the convenience of supervision, the superior supervisory authority can publish a common smart contract program for multiple subordinate supervisory authorities for each Used by lower-level regulatory agencies. Thos In the embodiments provided in this specification, the implementation of the above-mentioned pre-configured supervision rules to implement risk supervision processing on the original information records can be implemented by programmatic operation of information supervision parties such as centralized servers of financial supervision institutions It can also call the risk supervision smart contract published on the supervision blockchain, execute the execution program corresponding to the supervision rules declared in the smart contract, and perform risk supervision processing on the original information record. The issuer of the smart contract can be either the financial supervisory authority or the superior supervisory authority of the financial supervisory authority-for the convenience of supervision, the superior supervisory authority can publish a common smart contract program for multiple subordinate supervisory authorities for each Used by lower-level regulatory agencies. Thos e skilled in the art should know that compared with the centralized server operation mode, smart contracts are called at any time according to user requests, which greatly improves the efficiency of supervision; and smart contract execution has low human intervention and The advantages of centralized authority further increase the fairness of regulatory actions. Corresponding to the above process implementation, the embodiments of the present specification also provide a decentralized information supervision device. The device can be realized by software, or by hardware or a combination of hardware and software. Taking software implementation as an example, as a logical device, it is formed by reading the corresponding computer program instructions into the memory through the CPU (Central Process Unit) of the device. From the hardware level, in addition to the CPU, internal memory, and memory shown in FIG. 9, the device where the network risk business implementation device is located u e skilled in the art should know that compared with the centralized server operation mode, smart contracts are called at any time according to user requests, which greatly improves the efficiency of supervision; and smart contract execution has low human intervention and The advantages of centralized authority further increase the fairness of regulatory actions. Corresponding to the above process implementation, the embodiments of the present specification also provide a decentralized information supervision device. The device can be realized by software, or by hardware or a combination of hardware and software. Taking software implementation as an example, as a logical device, it is formed by reading the corresponding computer program instructions into the memory through the CPU (Central Process Unit) of the device. From the hardware level, in addition to the CPU, internal memory, and memory shown in FIG. 9, the device where the network risk business implementation device is located u sually includes other hardware such as chips for wireless signal transmission and reception. And/or other hardware such as boards for network communication. FIG. 8 shows an information supervision device based on a blockchain provided by this specification. The blockchain includes at least one information supervision node and several information provider nodes. The information supervision device includes an information acquisition unit 802 for Obtain the encrypted information record issued by the information provider from the information supervisor; wherein the encrypted information record is encrypted based on a key related to the public key of the information supervisor; the information decryption unit 804 is used for A key related to the private key of the information regulator, decrypts the encrypted information record to obtain the original information record; a risk supervision processing unit 806 is used to perform risk supervision on the original information record based on pre sually includes other hardware such as chips for wireless signal transmission and reception. And/or other hardware such as boards for network communication. FIG. 8 shows an information supervision device based on a blockchain provided by this specification. The blockchain includes at least one information supervision node and several information provider nodes. The information supervision device includes an information acquisition unit 802 for Obtain the encrypted information record issued by the information provider from the information supervisor; wherein the encrypted information record is encrypted based on a key related to the public key of the information supervisor; the information decryption unit 804 is used for A key related to the private key of the information regulator, decrypts the encrypted information record to obtain the original information record; a risk supervision processing unit 806 is used to perform risk supervision on the original information record based on pre -configured supervision rules deal with. For the implementation process of the functions and functions of each module in the above device, please refer to the implementation process of the corresponding steps in the above method for details, which will not be repeated here. As for the device embodiments, since they basically correspond to the method embodiments, the relevant parts can be referred to the description of the method embodiments. The device embodiments described above are only schematic, wherein the modules described as separate components may or may not be physically separated, and the components displayed as modules may or may not be physical modules. It can be located in one place, or it can be distributed on multiple network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without paying creative labor. The system, de -configured supervision rules deal with. For the implementation process of the functions and functions of each module in the above device, please refer to the implementation process of the corresponding steps in the above method for details, which will not be repeated here. As for the device embodiments, since they basically correspond to the method embodiments, the relevant parts can be referred to the description of the method embodiments. The device embodiments described above are only schematic, wherein the modules described as separate components may or may not be physically separated , and the components displayed as modules may or may not be physical modules. It can be located in one place, or it can be distributed on multiple network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement without paying creative labor. The system, de vice, module or module explained in the above embodiments may be implemented by a computer chip or entity, or by a product with a certain function. A typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet, wearable device, or any combination of these devices. Corresponding to the above method embodiments, the embodiments of the present specification provide a computer device, which includes a memory and a processor. Among them, a computer program that can be executed by the processor is stored on the memory; when the processor runs the stored computer program, each step of the implementation method of information supervision based on blockchain in the embodiments of the present specification is executed. For a detailed description vice, module or module explained in the above embodiments may be implemented by a computer chip or entity, or by a product with a certain function. A typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a mobile phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email sending and receiving device, and a game control Desk, tablet, wearable device, or any combination of these devices. Corresponding to the above method embodiments, the embodiments of the present specification provide a computer device, which includes a memory and a processor. Among them, a computer program that can be executed by the processor is stored on the memory; when the processor runs the stored computer program, each step of the implementation method of information supervision based on blockchain in the embodiments of the present specification is executed. For a detailed description of each step of the above information supervision implementation method, please refer to the previous content and will not be repeated. Corresponding to the above method embodiments, the embodiments of the present specification provide a computer-readable storage medium on which computer programs are stored. When the computer programs are executed by a processor, the computer-based storage programs execute block-based storage in the embodiments of the present specification. Each step of the implementation method of chain information supervision. For a detailed description of each step of the above information supervision implementation method, please refer to the previous content and will not be repeated. The above are only the preferred embodiments of this specification and are not intended to limit this specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of this specification should be included in this specification Within of each step of the above information supervision implementation method, please refer to the previous content and will not be repeated. Corresponding to the above method embodiments, the embodiments of the present specification provide a computer-readable storage medium on which computer programs are stored. When the computer programs are executed by a processor, the computer-based storage programs execute block-based storage in the embodiments of the present specification. Each step of the implementation method of chain information supervision. For a detailed description of each step of the above information supervision implementation method, please refer to the previous content and will not be repeated. The above are only the preferred embodiments of this specification and are not intended to limit this specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principles of this specification should be included in this specification Within the scope of protection. In a typical configuration, the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. Memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory ( flash RAM). Memory is an example of computer-readable media. Computer-readable media, including permanent and non-permanent, removable and non-removable media, can be stored by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read- the scope of protection. In a typical configuration, the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory. Memory may include non-permanent memory, random access memory (RAM) and/or non-volatile memory in computer-readable media, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media. Computer-readable media, including permanent and non-permanent, removable and non-removable media, can be stored by any method or technology. The information can be computer readable instructions, data structures, modules of programs, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, read- only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic tape cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves. It should also be noted that the terms "include", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device that includes a series of elements includes not only those elements, but also includes Other elements not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. Without more restrictions, the element defined by the sentence "include one..." does not exclude that there are other identical elements i only disc read-only memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic tape cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include temporary computer-readable media (transitory media), such as modulated data signals and carrier waves. It should also be noted that the terms "include ", "include" or any other variant thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or device that includes a series of elements includes not only those elements, but also includes Other elements not explicitly listed, or include elements inherent to this process, method, commodity, or equipment. Without more restrictions, the element defined by the sentence "include one..." does not exclude that there are other identical elements i n the process, method, commodity, or equipment that includes the element. Those skilled in the art should understand that the embodiments of this specification can be provided as methods, systems, or computer program products. Therefore, the embodiments of the present specification may take the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the embodiments of the present specification may employ computer programs implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer usable program code The form of the product. n the process, method, commodity, or equipment that includes the element. Those skilled in the art should understand that the embodiments of this specification can be provided as methods, systems, or computer program products. Therefore, the embodiments of the present specification may take the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, the embodiments of the present specification may employ computer programs implemented on one or more computer usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer usable program code The form of the product.

802‧‧‧資訊獲取單元 804‧‧‧資訊解密單元 806‧‧‧風險監管處理單元802‧‧‧ Information acquisition unit 804‧‧‧ Information decryption unit 806‧‧‧Risk supervision and processing unit

圖1為本說明書所提供的一實施例所示的基於區塊鏈的資訊監管方法的流程圖; 圖2為簡化的PBFT演算法的達到共識的一致性過程示意圖; 圖3為本說明書所提供的一實施例所示的資訊加密及資訊解密的流程圖; 圖4為本說明書所提供的又一實施例所示的利用ECDH資訊加密及資訊解密的流程圖; 圖5為本說明書實施例所示的金融監管機構建立的監管風險引擎示意圖; 圖6為本說明書實施例所示的金融監管機構根據監管要求產生可執行SQL語句的示意圖; 圖7為本說明書所實施例所示的金融監管機構針對用戶借款行為的風險監管流程圖; 圖8為本說明書所提供的一實施例所示的資訊監管裝置的示意圖; 圖9為運行本說明書所提供的分散式資訊監管裝置實施例的一種硬體結構圖。FIG. 1 is a flowchart of a blockchain-based information supervision method shown in an embodiment provided by this specification; Figure 2 is a schematic diagram of the consensus process of the simplified PBFT algorithm to reach consensus; FIG. 3 is a flowchart of information encryption and information decryption according to an embodiment provided by this specification; FIG. 4 is a flowchart of using ECDH information encryption and information decryption shown in another embodiment provided by this specification; FIG. 5 is a schematic diagram of a regulatory risk engine established by a financial regulatory agency shown in an embodiment of this specification; FIG. 6 is a schematic diagram of an executable SQL statement generated by a financial regulatory agency according to the regulatory requirements shown in an embodiment of this specification; FIG. 7 is a flowchart of the risk supervision of the financial regulatory agency for user borrowing behavior as shown in the embodiment of this specification; 8 is a schematic diagram of an information supervision device according to an embodiment provided by this specification; FIG. 9 is a hardware structure diagram of an embodiment of a distributed information supervision device provided in this specification.

Claims (14)

  1. 一種基於區塊鏈的資訊監管方法,該區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,該監管方法包括:該資訊監管方獲取該資訊提供方發佈的加密資訊記錄;其中,該加密資訊記錄基於與該資訊監管方的公鑰相關的密鑰進行加密;使用與該資訊監管方的私鑰相關的密鑰,對該加密資訊記錄進行解密獲取原始資訊記錄;基於預配置的監管規則對該原始資訊記錄執行風險監管處理,包括:識別該原始資訊記錄中的監管因數,將該監管因數的取值與預設的監管閾值的閾值作比較,根據比較結果執行風險監管處理。 A blockchain-based information supervision method, the blockchain includes at least one information supervisor node and a number of information provider nodes, the supervision method includes: the information supervisor obtains encrypted information records issued by the information provider; wherein, The encrypted information record is encrypted based on a key related to the information regulator's public key; using the key related to the information regulator's private key, the encrypted information record is decrypted to obtain the original information record; based on the pre-configured The supervision rules perform risk supervision processing on the original information record, including: identifying the supervision factor in the original information record, comparing the value of the supervision factor with the preset supervision threshold, and performing risk supervision processing according to the comparison result.
  2. 根據請求項1所述的資訊監管方法,所述基於預配置的監管規則對該原始資訊記錄執行風險監管處理,包括:調用發佈在該區塊鏈上的風險監管智能合約,執行該智能合約中聲明的與監管規則對應的執行程式,對該原始資訊記錄執行風險監管處理。 According to the information supervision method described in claim 1, the risk supervision processing is performed on the original information record based on the pre-configured supervision rules, including: calling a risk supervision smart contract published on the blockchain and executing the smart contract The declared execution program corresponding to the supervision rules executes risk supervision processing on the original information record.
  3. 根據請求項2所述的資訊監管方法,該智能合約由該資訊監管方發佈至該區塊鏈。 According to the information supervision method described in claim 2, the smart contract is issued to the blockchain by the information supervision party.
  4. 根據請求項1至3中任一項所述的資訊監管方法,該區塊鏈為聯盟鏈。 According to the information supervision method described in any one of claims 1 to 3, the blockchain is a consortium chain.
  5. 根據請求項1所述的資訊監管方法,該加密資訊記錄基於與該資訊監管方的公鑰相關的密鑰進行加密,包括:基於與該資訊監管方的公鑰相關的密鑰對該原始資訊記錄進行加密,得到該加密資訊記錄,再對該加密資訊記錄進行數位簽章得到第一簽名資訊;所述使用與該資訊監管方的私鑰相關的密鑰,對該加密資訊記錄進行解密獲取原始資訊記錄,包括:該資訊監管方對該第一簽名資訊進行驗簽,驗簽通過後再使用與該資訊監管方的私鑰相關的密鑰對該加密資訊記錄進行解密,得到該原始資訊記錄。 According to the information supervision method described in claim 1, the encrypted information record is encrypted based on a key related to the public key of the information supervisor, including: based on the key related to the public key of the information supervisor Encrypt the record to obtain the encrypted information record, and then digitally sign the encrypted information record to obtain the first signature information; using the key related to the private key of the information regulator to decrypt the encrypted information record Original information records, including: the information regulator verifies the first signature information, and after the verification is passed, decrypts the encrypted information record using a key related to the information regulator's private key to obtain the original information recording.
  6. 根據請求項1或5所述的資訊監管方法,該資訊監管方的公鑰相關的密鑰為:該資訊監管方的公鑰,該資訊監管方的私鑰相關的密鑰為:該資訊監管方的私鑰。 According to the information supervision method described in claim 1 or 5, the key related to the public key of the information supervisor is: the public key of the information supervisor, and the key related to the private key of the information supervisor is: the information supervisor Party's private key.
  7. 根據請求項1或5所述的資訊監管方法,該資訊監管方的公鑰相關的密鑰為:該資訊監管方的公鑰與該資訊提供方的私鑰的乘積,該資訊監管方的私鑰相關的密鑰為:該資訊監管方的私鑰與該資訊提供方的公鑰的乘積。 According to the information supervision method described in claim 1 or 5, the key related to the public key of the information supervisor is: the product of the public key of the information supervisor and the private key of the information provider, the private key of the information supervisor The key related to the key is: the product of the private key of the information supervisor and the public key of the information provider.
  8. 根據請求項1所述的資訊監管方法,該資訊監管方預設的監管指標,包括針對監管規則轉換產生的可執行SQL語句和對應的監管閾值;識別該原始資訊記錄中的監管因數,將該監管因數的取值與預設的監管閾值的閾值作比較,包括:識別該原始資訊記錄中的監管因數,在該監管指標的可執行SQL語句中輸入監管因數進行查詢,將查詢所得的該監管因數的取值與該監管指標的監管閾值作比較。 According to the information supervision method described in claim 1, the default supervision indicators of the information supervision party include executable SQL statements and corresponding supervision thresholds generated for the conversion of supervision rules; identify the supervision factors in the original information record, and The value of the supervision factor is compared with the preset threshold of the supervision threshold, including: identifying the supervision factor in the original information record, entering the supervision factor in the executable SQL statement of the supervision index to query, and querying the supervision The value of the factor is compared with the regulatory threshold of the regulatory index.
  9. 根據請求項1所述的資訊監管方法,該資訊監管方還配置了監管指標池;該方法還包括:將監管規則轉換為可執行的SQL語句;產生監管指標名稱,並建立該監管指標的名稱與該SQL語句的映射關係,並將該映射關係存入監管指標池。 According to the information supervision method described in claim 1, the information supervisor also configures a supervision indicator pool; the method further includes: converting the supervision rules into executable SQL statements; generating the supervision indicator name, and establishing the supervision indicator name The mapping relationship with the SQL statement, and the mapping relationship is stored in the regulatory indicator pool.
  10. 根據請求項10所述的資訊監管方法,該監管指標池中的監管指標為多叉樹儲存結構,該監管指標為該多叉樹上的節點。 According to the information supervision method described in claim 10, the supervision index in the supervision index pool is a multi-fork tree storage structure, and the supervision index is a node on the multi-fork tree.
  11. 根據請求項1所述的資訊監管方法,該監管指標還關聯了對應的監管處理方案; 所述根據該比較結果執行風險監管處理,包括,確定該監管因數的取值是否達到該監管指標中的監管閾值:如果否,不作出回應;如果是,執行與該監管指標關聯的監管處理方案。 According to the information supervision method described in claim 1, the supervision index is also associated with the corresponding supervision processing scheme; The execution of risk supervision processing based on the comparison result includes determining whether the value of the supervision factor reaches the supervision threshold in the supervision index: if not, no response is made; if it is, the supervision processing scheme associated with the supervision index is executed .
  12. 一種基於區塊鏈的資訊監管裝置,該區塊鏈包括至少一個資訊監管方節點以及若干資訊提供方節點,該資訊監管裝置包括:資訊獲取單元,用於該資訊監管方獲取該資訊提供方發佈的加密資訊記錄,其中,該加密資訊記錄基於與該資訊監管方的公鑰相關的密鑰進行加密;資訊解密單元,用於使用與該資訊監管方的私鑰相關的密鑰,對該加密資訊記錄進行解密獲取原始資訊記錄;風險監管處理單元,用於基於預配置的監管規則對該原始資訊記錄執行風險監管處理,包括:識別該原始資訊記錄中的監管因數,將該監管因數的取值與預設的監管閾值的閾值作比較,根據比較結果執行風險監管處理。 An information supervisory device based on a blockchain, the blockchain includes at least one information supervisor node and a number of information provider nodes, the information supervisory device includes: an information acquisition unit for the information supervisor to obtain the information provider's release Encrypted information record, where the encrypted information record is encrypted based on a key related to the public key of the information regulator; an information decryption unit is used to encrypt the encrypted key related to the private key of the information regulator The information record is decrypted to obtain the original information record; the risk supervision processing unit is used to perform risk supervision processing on the original information record based on pre-configured supervision rules, including: identifying the supervision factor in the original information record, and taking the supervision factor The value is compared with the threshold value of the preset regulatory threshold value, and the risk regulatory processing is performed according to the comparison result.
  13. 一種電腦設備,包括:記憶體和處理器;該記憶體上儲存有可由處理器運行的電腦程式;該處理器運行該電腦程式時,執行如請求項1至11任一項所述的步驟。 A computer device includes: a memory and a processor; a computer program executable by the processor is stored on the memory; when the processor runs the computer program, the steps described in any one of the items 1 to 11 are performed.
  14. 一種電腦可讀儲存媒體,其上儲存有電腦程式,該電腦程式被處理器運行時,執行如請求項1至11任一項所述的步驟。 A computer-readable storage medium on which a computer program is stored. When the computer program is executed by a processor, the steps described in any one of the items 1 to 11 are performed.
TW108105404A 2018-05-11 2019-02-19 Information supervision method and device based on blockchain TWI694350B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201810446957.7A CN108681966B (en) 2018-05-11 2018-05-11 Information supervision method and device based on block chain
CN201810446957.7 2018-05-11

Publications (2)

Publication Number Publication Date
TW201947446A TW201947446A (en) 2019-12-16
TWI694350B true TWI694350B (en) 2020-05-21

Family

ID=63805498

Family Applications (1)

Application Number Title Priority Date Filing Date
TW108105404A TWI694350B (en) 2018-05-11 2019-02-19 Information supervision method and device based on blockchain

Country Status (3)

Country Link
CN (2) CN108681966B (en)
TW (1) TWI694350B (en)
WO (1) WO2019214311A1 (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681966B (en) * 2018-05-11 2020-07-21 阿里巴巴集团控股有限公司 Information supervision method and device based on block chain
CN109472166A (en) * 2018-11-01 2019-03-15 恒生电子股份有限公司 A kind of electronic signature method, device, equipment and medium
CN109753792B (en) * 2018-12-29 2020-12-11 北京金山安全软件有限公司 Attack detection method and device and electronic equipment
CN109413116A (en) * 2019-01-03 2019-03-01 国家电网有限公司 A kind of believable cloud identity identifying method and system
CN109831545B (en) * 2019-01-31 2020-10-09 中国互联网络信息中心 Domain name abuse processing method and system based on block chain
CN110061845A (en) * 2019-03-14 2019-07-26 深圳壹账通智能科技有限公司 Block chain data ciphering method, device, computer equipment and storage medium
CN110490728A (en) * 2019-07-30 2019-11-22 阿里巴巴集团控股有限公司 Transaction, transaction monitoring and managing method, device and equipment based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170213287A1 (en) * 2012-03-06 2017-07-27 Daniel B. Bruno System and method for providing a cryptographic platform for exchanging debt securities denominated in virtual currencies
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
TW201732706A (en) * 2016-02-23 2017-09-16 Nchain Holdings Ltd Registry and automated management method for blockchain-enforced smart contracts
CN107451485A (en) * 2017-06-02 2017-12-08 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104320262B (en) * 2014-11-05 2017-07-21 中国科学院合肥物质科学研究院 The method and system of client public key address binding, retrieval and the verification of account book technology are disclosed based on encryption digital cash
US20160321751A1 (en) * 2015-04-28 2016-11-03 Domus Tower, Inc. Real-time settlement of securities trades over append-only ledgers
CN106228344A (en) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 A kind of electronic government affairs system building method based on block chain technology
CN106778343A (en) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 It is a kind of that the data sharing method of private data is related to based on block chain
CN106991612A (en) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 Method, device and the electronic equipment shared for finance data
CN108681966B (en) * 2018-05-11 2020-07-21 阿里巴巴集团控股有限公司 Information supervision method and device based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170213287A1 (en) * 2012-03-06 2017-07-27 Daniel B. Bruno System and method for providing a cryptographic platform for exchanging debt securities denominated in virtual currencies
TW201732706A (en) * 2016-02-23 2017-09-16 Nchain Holdings Ltd Registry and automated management method for blockchain-enforced smart contracts
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN107451485A (en) * 2017-06-02 2017-12-08 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain

Also Published As

Publication number Publication date
WO2019214311A1 (en) 2019-11-14
CN108681966B (en) 2020-07-21
CN108681966A (en) 2018-10-19
CN111898148A (en) 2020-11-06
TW201947446A (en) 2019-12-16

Similar Documents

Publication Publication Date Title
Ali et al. Applications of blockchains in the Internet of Things: A comprehensive survey
AU2016378211B2 (en) Method and system for blockchain variant using digital signatures
Xu et al. The blockchain as a software connector
Zheng et al. Blockchain challenges and opportunities: A survey
KR101727525B1 (en) Block chain based distributed storage method and device thereof
US20190013934A1 (en) Blockchain proof of custody, proof against tampering, proof of chain of custody
Wang et al. A blockchain-based framework for data sharing with fine-grained access control in decentralized storage systems
US20200382478A1 (en) Systems and methods for providing data privacy in a private distributed ledger
US20190342344A1 (en) Controlling permissible actions a computing device can perform on a data resource based on a use policy evaluating an authorized context of the device
US10108794B2 (en) System and method for identity management
Xia et al. MeDShare: Trust-less medical data sharing among cloud service providers via blockchain
Archer et al. From keys to databases—real-world applications of secure multi-party computation
Lu The blockchain: State-of-the-art and research challenges
US10135802B2 (en) System and method for identity management
Panarello et al. Blockchain and iot integration: A systematic survey
JP6514830B2 (en) Method and system for verifying ownership of digital assets using distributed hash tables and peer-to-peer distributed ledgers
Niranjanamurthy et al. Analysis of Blockchain technology: pros, cons and SWOT
WO2018137316A1 (en) Secure transaction method based on block chain, electronic device, system, and storage medium
AU2014308610B2 (en) System and method for identity management
Karlstrøm Do libertarians dream of electric coins? The material embeddedness of Bitcoin
Sikorski et al. Blockchain technology in the chemical industry: Machine-to-machine electricity market
Zhu et al. Efficient audit service outsourcing for data integrity in clouds
JP2020516104A (en) Off-chain smart contract service based on trusted execution environment
US10614239B2 (en) Immutable cryptographically secured ledger-backed databases
US10192073B2 (en) System and method for interaction object reconciliation in a blockchain environment