WO2019214311A1 - 一种基于区块链的信息监管方法及装置 - Google Patents

一种基于区块链的信息监管方法及装置 Download PDF

Info

Publication number
WO2019214311A1
WO2019214311A1 PCT/CN2019/075463 CN2019075463W WO2019214311A1 WO 2019214311 A1 WO2019214311 A1 WO 2019214311A1 CN 2019075463 W CN2019075463 W CN 2019075463W WO 2019214311 A1 WO2019214311 A1 WO 2019214311A1
Authority
WO
WIPO (PCT)
Prior art keywords
information
supervision
regulatory
supervisor
key
Prior art date
Application number
PCT/CN2019/075463
Other languages
English (en)
French (fr)
Inventor
于君泽
周扬
唐强
Original Assignee
阿里巴巴集团控股有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 阿里巴巴集团控股有限公司 filed Critical 阿里巴巴集团控股有限公司
Publication of WO2019214311A1 publication Critical patent/WO2019214311A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption

Definitions

  • the present specification relates to the field of data processing technologies, and in particular, to a method and device for monitoring information based on a blockchain.
  • the existing information supervision usually adopts the offline on-site supervision method.
  • the regulatory agencies conduct active burial or secret visits according to complaint clues, public opinion, and check the regulatory compliance to check the business compliance of the regulated institutions.
  • the problem with on-site inspection is that the cost is relatively high, and it needs to be centralized for a period of time by the regulatory body, and it does not rule out the situation that the regulatory agency is rushing to prepare for supervision, which also increases the cost of the regulated institution.
  • the present specification provides a blockchain-based information supervision method
  • the blockchain includes at least one information supervisor node and a plurality of information provider nodes
  • the supervision method includes:
  • the pre-configured supervision rule performs risk supervision processing on the original information record, including:
  • the smart contract is issued by the information supervisor to the blockchain.
  • the blockchain is a coalition chain.
  • the encrypted information record is encrypted based on a key associated with the public key of the information supervisor, including:
  • Decrypting the encrypted information record using the key associated with the private key of the information supervisor to obtain the original information record including:
  • the information supervising party performs verification on the first signature information, and after the verification is passed, decrypts the encrypted information record by using a key related to the private key of the information supervising party to obtain the original information record. .
  • the public key related to the information supervisor is: the public key of the information supervisor
  • the key related to the private key of the information supervisor is: the private key of the information supervisor
  • the public key related to the information supervisor is: a product of a public key of the information supervisor and a private key of the information provider, and a key related to the private key of the information supervisor The product of the private key of the information supervisor and the public key of the information provider.
  • the pre-configured supervision rule performs risk supervision processing on the original information record, including:
  • the information policing party presets the policing indicators, including executable SQL statements generated by the regulatory rules conversion and corresponding regulatory thresholds;
  • Identifying a supervisory factor in the original information record comparing the value of the supervisory factor with a threshold of a preset regulatory threshold, including
  • the value of the regulatory factor obtained by the query is compared with the regulatory threshold of the regulatory indicator.
  • the information regulator is also configured with a pool of regulatory indicators
  • the method further includes:
  • the supervision indicator in the supervision indicator pool is a multi-tree storage structure, and the supervision indicator is a node on the multi-fork tree.
  • the regulatory indicator is also associated with a corresponding regulatory treatment plan
  • the present specification also provides a blockchain-based information supervision apparatus, the blockchain includes at least one information supervisor node and a plurality of information provider nodes, and the information supervision apparatus includes:
  • An information acquiring unit configured to acquire, by the information supervisor, an encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key related to a public key of the information supervisor;
  • An information decryption unit configured to decrypt the encrypted information record to obtain an original information record by using a key related to a private key of the information supervisor;
  • the risk supervision processing unit is configured to perform risk supervision processing on the original information record based on the pre-configured supervision rule.
  • the present specification also provides a computer device comprising: a memory and a processor; the memory storing a computer program executable by the processor; and the method for implementing the information supervision service when the processor runs the computer program The steps described.
  • the present specification also provides a computer readable storage medium having stored thereon a computer program that, when executed by a processor, performs the steps described in the above-described method of implementing the information supervision service.
  • the information supervising method and device provided by the present specification set the information supervising party and the information provider as the nodes of the blockchain, and join the blockchain to receive supervision and information for the information provider to dynamically and low-cost.
  • the supervisor provides real-time access to the regulatory information from the blockchain, thereby eliminating the cost of the online investigation and supervision; and the information provider encrypts the information in the blockchain, in the blockchain. Any other node cannot decrypt it correctly, thus ensuring the security of information provided by each information provider; further, the blockchain architecture ensures that the information provided by each information provider in real time will not be tampered with after being provided.
  • the information regulator digitizes the regulatory requirements into regulatory indicators, and compares the corresponding values of regulatory indicators and regulatory factors to enable real-time information providers. Digital supervision, timely output of risk management and treatment programs to ensure the timeliness of regulatory actions; Provided simultaneous real-time supervision of multi-node multi-agency information-based supervision method and apparatus block chain, which can effectively prevent violations across agencies across regions.
  • FIG. 1 is a flowchart of a blockchain-based information monitoring method according to an embodiment provided by the present specification
  • FIG. 2 is a schematic diagram of a consensus process for achieving a simplified PBFT algorithm
  • FIG. 3 is a flow chart of information encryption and information decryption according to an embodiment provided by the present specification
  • FIG. 4 is a flow chart showing the use of ECDH information encryption and information decryption according to still another embodiment provided by the present specification
  • FIG. 5 is a schematic diagram of a supervisory risk engine established by a financial regulatory institution according to an embodiment of the present specification
  • FIG. 6 is a schematic diagram of a financial regulatory institution according to an embodiment of the present specification generating executable SQL statements according to regulatory requirements;
  • FIG. 7 is a flowchart of risk supervision of a financial regulatory institution for a user's borrowing behavior according to an embodiment of the present specification
  • FIG. 8 is a schematic diagram of an information supervision apparatus according to an embodiment provided by the present specification.
  • FIG. 9 is a hardware structural diagram of an embodiment of a distributed information supervision apparatus provided by the present specification.
  • the embodiment provided by the present specification illustrates a blockchain-based blockchain-based information supervision method, the blockchain including at least one information supervisor node and a plurality of information provider nodes, Regulatory methods include:
  • Step 102 The information supervisor acquires an encrypted information record issued by the information provider, where the encrypted information record is encrypted based on a key associated with the public key of the information supervisor;
  • Step 104 decrypt the encrypted information record to obtain an original information record by using a key related to the private key of the information supervisor;
  • Step 106 Perform risk supervision processing on the original information record based on the pre-configured supervision rule.
  • the “information supervisor” described in the embodiments provided in this specification is the server or terminal where the organization performing the supervisory duties in the information supervision is located, and the “information provider” described in the embodiments provided in this specification may specifically be in the information supervision.
  • the supervised party terminal, or other server or terminal that has a data connection with the supervised party provides the "information" of the object information, such as loan data, transaction data, and the like.
  • any information supervisor and information provider may join the blockchain as a node of the blockchain by following the installation of the corresponding node protocol and the running node protocol program. Therefore, compared with the supervisory authority to view the current status of the regulated organization, the embodiment of the present specification provides an advantage in that the online joining of the blockchain becomes a node to participate in supervision or supervision. Economical, you can join or withdraw at any time.
  • the embodiments provided in this specification can be run on any computing and storage device, such as a mobile phone, tablet, PC (Personal Computer), notebook, server, etc.; it can also be run by two or two
  • the logical nodes of the above devices implement the functions in the embodiments of the present specification.
  • the "blockchain” described in the embodiments provided by the present specification may specifically refer to a P2P network system having a distributed data storage structure achieved by a consensus mechanism, and the data distribution in the blockchain is connected in time.
  • the latter block contains the data summary of the previous block, and all or part of it is achieved according to the specific consensus mechanism (such as POW, POS, DPOS or PBFT).
  • POW POW
  • POS POS
  • DPOS DPOS
  • PBFT PBFT
  • a full backup of the node's data it is well known to those skilled in the art that since the blockchain system operates under the corresponding consensus mechanism, the data that has been included in the blockchain database is difficult to be tampered with by any node. For example, a blockchain using the Pow consensus requires at least the entire network.
  • the 51% power attack can tamper with existing data, so the blockchain system has other characteristics of data security and anti-attack tampering compared with other centralized database systems. It can be seen that, in the embodiment provided by the present specification, the “information” provided by the information provider and included in the blockchain is not attacked or falsified, thereby ensuring the authenticity and impartiality of the supervision.
  • the information provided by the information provider is encrypted with a key associated with the public key of the information supervisor; the encrypted information can only be used by the information supervisor
  • the key associated with the private key is decrypted to obtain the original information record, preventing other nodes that are in the same blockchain from knowing the plaintext of the information (ie, the original information record).
  • encryption methods can be specifically set according to requirements.
  • the information supervisor performs risk supervision processing on the original information record based on the pre-configured supervision rules, and specific risk supervision processing schemes are numerous, for example, the regulatory rules are digitized.
  • the regulatory rules are digitized.
  • the violation factor is identified in the original information record obtained on the blockchain network. Once the violation factor is identified, the preset risk supervision process, such as early warning, alarm, and execution of the blockade, is performed.
  • the scheme for performing risk supervision processing on the original information record based on the pre-configured supervision rule is specifically set according to specific regulatory requirements, and is not limited in the present specification, thereby finally completing the collection from the supervision information to the regulated
  • the integrated digital supervision method of behavioral processing enhances the convenience, economy, authenticity and efficiency of regulatory behavior.
  • the financial supervisory authority is the information supervising party
  • each lending institution is a different information provider
  • the natural borrower user is the subject of supervision.
  • financial institutions often use a federated chain architecture to build the blockchain.
  • Organizations with higher credit such as large banks, giant companies, and some regulatory agencies, can act as pre-selected nodes of the alliance chain and participate in the accounting of the block.
  • the consensus process of the alliance chain is also controlled by the pre-selected node. When a node on the network exceeds a set proportion (such as 2/3) to confirm a block, the transaction or data recorded by the block will be confirmed by the whole network.
  • the alliance chain can determine the degree of openness to the public according to the application scenario, and the accessibility of the open chain to the alliance chain.
  • the financial supervisory authority as the information supervisor can participate in the pre-selected node.
  • the information provider such as the online lending institution, may be a general node having access to the alliance chain; of course, the financial supervisory authority may also be a general node having access to the alliance chain, which is not limited in this specification.
  • the alliance chain usually uses equity proof or consensus algorithms such as PBFT and RAFT.
  • Figure 2 illustrates the consensus-consistent process of the simplified PBFT algorithm, where C is the client, N 0 - N 3 represent the service node, and in particular, N 0 is the master node and N 3 is the fault node.
  • the PBFT system usually assumes that the number of faulty nodes is m and the number of service nodes is 3m+1.
  • the entire communication process is as follows:
  • the client sends a request to the master node to invoke the service operation
  • Sequence number allocation stage (also known as pre-prepare stage), the master node assigns a sequence number n to the request, broadcasts the sequence number assignment message and the client's request message m, and constructs a PRE-PREPARE message to each slave node;
  • Interaction phase also known as prepare phase
  • receiving a PRE-PREPARE message from a node and broadcasting a PRE-PREPARE message to other server nodes
  • Sequence number confirmation phase (also known as commit phase), after each node verifies the request and order in the view, it broadcasts a COMMIT message, executes the received client's request and gives the client a corresponding response.
  • the client waits for a response from a different node. If there are m+1 responses the same, the response is the result of the consensus.
  • PBFT Like all state machine replica replication technologies, PBFT proposes two qualifications for each replica node:
  • the PBFT algorithm agrees on the total order of request execution for all non-failed replica nodes, thus ensuring security.
  • the PBFT algorithm is high in efficiency and can meet the requirements of high-frequency transaction volume, such as frequent loan transactions in this embodiment;
  • the delay is very low, basically meets the requirements of real-time processing, and can directly supervise the supervisory information in the real-time;
  • the trusted node acts as a pre-selected billing node, taking into account the security and stability; in addition, the PBFT algorithm does not consume too much
  • the computer computing resources do not necessarily need token circulation, so they have good usability.
  • each online lending institution acts as an information provider, and the information related to personal lending provided by the lending institution generally involves private information such as identity, as shown in Table 1, in order to ensure that the institution is involved. Or the information of the privacy of the borrower is only known by the corresponding financial regulatory authority with regulatory authority, and is not known or illegally used by other nodes in the same blockchain.
  • Each online lending institution should encrypt and process the regulatory information provided by it.
  • the online lending institution can agree with the financial regulatory authority to encrypt and decrypt the symmetric key in advance; the online lending institution can also use the key associated with the financial authority's public key for asymmetric encryption.
  • the financial regulator can use the key associated with its private key to decrypt the plaintext of the loan information provided by the online lending institution (as shown in Table 1), thereby preventing other nodes from being informed of the regulatory information.
  • the online lending institution as the information provider first encrypts the plaintext (as shown in Table 1) of the loan information provided by the corresponding financial regulatory institution to obtain the ciphertext of the loan information. Then, in order to ensure that the ciphertext is not falsified and forged, the online lending institution digitally signs the ciphertext, and uploads the digital signature of the ciphertext together with the ciphertext to the blockchain database cache where the lending institution node is located.
  • the account manager of the blockchain such as the pre-selected node with the accounting authority in the alliance chain, needs to verify the data record that can be included in the blockchain, and the verification process necessarily includes the verification of the digital signature above.
  • the signing process is to prevent the data from being tampered with or the information is forged by other participants. After the verification is passed, the accountant will record the digital signature and ciphertext of the ciphertext into the block of the blockchain.
  • the financial supervisory authority may obtain the pair from the blockchain as a node of the blockchain.
  • the digital signature and ciphertext of the ciphertext correspondingly, the financial regulator can decrypt the ciphertext by using the private key corresponding to the public key, thereby obtaining the plaintext of the specific loan information.
  • the financial supervisory authority as the information supervising party may be a pre-selected node with billing authority, or may be an ordinary node, which is not specifically limited in the present specification, as long as it digitally signs the above-mentioned ciphertext and Ciphertext has access to view permissions.
  • the embodiment of the present specification does not specifically limit the algorithm for the digital signature and the verification algorithm and the financial authority's own public-private key pair.
  • the elliptic curve algorithm and the RSA algorithm may be used, and the related hash algorithm may be MD5 or SHA256. Waiting for completion.
  • the process of encrypting the loan information to obtain the ciphertext can be implemented by means of a mutually agreed symmetric key.
  • the online loan institution as the information provider encrypts the plaintext of the loan information by using the ECDH exchange key.
  • the private key AS and the mechanism B of the organization A
  • the product of the public key BP is equal to the product of the public key AP of the institution A and the private key BS of the institution B.
  • the online lending institution may encrypt the plaintext of the loan information by using the key obtained by multiplying the public key JP of the corresponding financial regulatory institution with its own private key DS to obtain the ciphertext of the lending information, similarly, and then ensuring the confidentiality.
  • the text is not falsified and forged, the online lending institution digitally signs the ciphertext, and the digital signature of the ciphertext, the ciphertext, and the public key corresponding to the private key DS used to encrypt the loan information.
  • the public key JP of the DP and the financial regulatory authority is uploaded together to the blockchain database cache where the online lending institution node is located; the accounting staff of the blockchain, such as the pre-selected node with the accounting authority in the alliance chain, firstly The digital signature is checked.
  • the verification process is to prevent the data from being tampered with or the information is forged by other participants.
  • the accountant encrypts the digital signature of the ciphertext, the ciphertext, and the above-mentioned loan information.
  • the public key DP corresponding to the private key DS used by itself and the public key JP of the financial supervisor are included in the block of the above blockchain.
  • the financial supervision after the digital signature corresponding to the ciphertext, the ciphertext, and the public key corresponding to the private key used for encrypting the loan information are included in the blockchain, such as a pre-selected node in the alliance chain.
  • the organization may obtain the above-mentioned digital signature and ciphertext for the ciphertext from the blockchain. Accordingly, the financial supervisory authority may obtain the private key JS corresponding to the public key JP obtained from the network and the obtained from the network. The key obtained by multiplying the DP decrypts the ciphertext, thereby obtaining the plaintext of the specific loan information. Any other node cannot decrypt the above ciphertext because the financial controller's private key JS cannot be known.
  • the public key DP and private key DS of the online lending institution used for encrypting the credit information are not necessarily related to the above digital signature process.
  • the private key and the public key used in the verification are the same, but this does not affect the implementation of the technical solution, but reduces the possibility of being attacked by increasing the complexity of the system.
  • the accounting node of the blockchain has verified the digital signature of the ciphertext when the data is included, in order to further ensure the correctness of the source of the regulatory information, prevent the data from being tampered with or the malicious node falsifies the data, the above implementation of the present specification is provided.
  • the financial regulatory institution may first verify the obtained digital signature and verify the verification. After decrypting the above ciphertext, it further prevents other institutions or individuals from forging loan information and strengthens the authenticity and authority of the financial supervision.
  • a financial supervisory authority as an information supervisor may establish a supervisory risk engine to modularize the lending information provided by various online lending institutions.
  • the supervisory risk engine may specifically include: a data input module M1, a supervisory index generating module M2, a risk decision module M3, a risk handling module M4, and the like. It is worth noting that the above risk monitoring engine is only a concrete name for the process of risk supervision processing, and there is no specific boundary between the various modules of the risk supervision engine, just to explain the convenience of the above-mentioned risk engine function, artificially It is divided into multiple modules.
  • the data input module M1 is configured to process data acquired by the financial regulatory institution from the blockchain, including ciphertext of the loan information, digital signature of the lending institution, and the like, and the lending information is obtained according to a related decryption algorithm.
  • the ciphertext is decrypted, or the ciphertext of the loan information is decrypted after the digital signature verification is passed, and the data information included in the plaintext of the loan information is parsed according to the data format required by the risk decision module M3. Since the data structure carried by the existing distributed shared network system or the blockchain system is usually in a text format and does not have good operability, the data input module M1 can perform data table analysis on the plaintext of the decrypted loan information.
  • the important data information to be used in the risk decision module M3 is formed into a table form, for example, restored to the data table described in Table 1 above, and input to the risk decision module M3.
  • the supervisory indicator generation module M2 is configured to generate a supervisory indicator corresponding to the supervisory behavior according to the regulatory regulations or guidelines.
  • Training establishes corresponding indicators. The training process is as follows.
  • Z1 indicator includes the above executable SQL statement, and its threshold value - 20W .
  • the Z2 indicator can be trained; the Z2 indicator includes an executable SQL statement and its threshold— —100W.
  • a multi-fork tree storage structure of a supervisory index that can be established in a pool of supervisory indicators is stored in the plurality of supervisory indicators, such as Z1 and Z2, respectively.
  • the plurality of supervisory indicators such as Z1 and Z2, respectively.
  • Z1 and Z2 the plurality of supervisory indicators
  • multiple different types of multi-fork trees may be set up in the regulatory indicator pool, corresponding to storing corresponding categories of regulatory indicators, for example, a "natural person ⁇ loan alarm" is established in the regulatory indicator pool.
  • the upper limit of the balance does not exceed RMB 1 million.
  • Other provisions of the relevant regulatory measures, and the regulatory indicators pool may also have a multi-fork tree of “enterprise ⁇ loan alarm” regulatory indicators, which are stored on the online loan platform with enterprise users. Regulatory indicators related to statutory limits.
  • a corresponding early warning indicator can be set for some indicators (the threshold corresponding to the early warning indicator can be set to 95% of the full indicator threshold or other value),
  • the “single individual, single natural person borrows no more than 19w on a platform” early warning supervision statement, according to the above process 1)--3) generates an early warning indicator Z1Y, Z1Y includes the training of the above-mentioned early warning supervision statement
  • the executed SQL statement and its corresponding threshold value of 19W are stored in the above-mentioned regulatory indicator pool.
  • a storage multi-fork tree of "natural person ⁇ loan early warning” type indicator can be established in the regulatory indicator pool, and Z1Y is stored on the node of the multi-fork tree.
  • the "natural person ⁇ loan early warning” indicator can also store the Z2Y indicator related to the early warning supervision of the borrowing behavior of the same natural person on multiple online loan platforms, and will not be described here.
  • the supervisory indicator generation module M2 associates the supervisory index with the executable SQL statement through the above data training, auditing, index establishment or index multi-tree establishment process, and creates a license for the natural person user to borrow on the online loan institution.
  • the implementation of the regulatory template, the specific risk monitoring and disposal process is carried out in the risk decision module M3. It should be noted that in this specification, only to explain the convenience of each function of the above-mentioned risk engine, it is divided into multiple modules, and there is no specific boundary between the modules. For example, the above-mentioned regulatory indicator pool can be attributed to the supervisory generation module. M2 can also be attributed to the risk decision module M3.
  • the above-mentioned regulatory indicator pool (the regulatory indicator data mart shown in the figure) is stored in the risk decision module M3, and the supervisory index pool may include several supervisory indicators.
  • the risk decision module M3 receives the supervision instruction of “single individual, single natural person borrowing on a platform needs to be early warning”, first search for the corresponding regulatory indicator Z1Y in the pool of regulatory indicators, if any The risk decision module M3 enters the risk factor identification phase.
  • the risk decision module M3 reads the data information input from the data input module M1, and identifies the supervisory factor from the data information for the supervisory command.
  • the supervisory object is a single borrowing natural person, and because the uniqueness is determined, whether the natural person is a single
  • the factor is the natural person's ID number (or other unique user ID), so the regulatory factor in this example is the natural person's ID number, and then the risk decision module M3 enters the user's ID in the SQL statement corresponding to the regulatory indicator Z1Y.
  • the number running the SQL statement to query the ID number, can obtain the actual borrowing amount (balance) of the single natural person on the single platform, and compare the value of the supervision factor - the actual borrowing number and the threshold value of the index Z1Y 19W,
  • the risk processing module M4 of the risk engine outputs a corresponding regulatory treatment plan: when the actual borrowing amount of a single natural person is lower than 19W, the risk handling module M4 may not regard it as a risk event and does not respond; when the actual borrowing amount of a single natural person is higher than 19W
  • the risk handling module M4 can lend to the corresponding network
  • the station node issues an alert message, such as “a large amount of borrowing, which is about to reach the regulatory limit”, thereby preventing the lending institution from single platform to exceed the loanable new balance of the user, and reducing the loss that may occur in a certain business.
  • the above specific risk disposal plan can be associated with the regulatory indicators to facilitate the output of the disposal plan of the risk handling module M4.
  • the financial regulatory agency finds that a natural person's borrowing on a single platform has exceeded the threshold of early warning, it can further supervise and supervise the alarm indicators: first, in the pool of its regulatory indicators, whether there is a corresponding regulatory indicator Z1 exists, if any
  • the risk decision module M3 enters the risk factor identification phase. Similarly, the risk decision module M3 reads the data information input from the data input module M1, for which the supervisory factor is identified from the data information, the natural person's ID number, and then the risk decision module M3 corresponds to the index Z1. Enter the ID number in the SQL statement and run the query to get the actual number of borrowings of the single natural person on the single platform.
  • the risk management module M4 of the engine outputs the corresponding regulatory treatment plan: when the actual borrowing amount of a single natural person is less than 20W, the risk handling module M4 may not output; when the actual borrowing amount of a single natural person is higher than 20W, the risk handling module M4 may correspond to
  • the online loan platform node sends a strong alarm message or reports to the supervisor or the higher authorities.
  • the above specific risk management plan can be managed with specific regulatory indicators to facilitate the output of the risk handling module M4.
  • the supervision of the early warning indicators can be omitted and the alarm indicators can be directly supervised, which is not limited in this specification.
  • the above-mentioned risk management module M4 for the specific regulatory indicators (such as Z1Y or Z1) output of the regulatory treatment program can also be associated with the regulatory indicators where the regulatory indicators are multi-fork nodes, such as in the supervision
  • the two treatment schemes are associated with the node of the indicator Z1Y: when the value of the supervisory factor is less than the threshold of the supervisory index Z1Y, no response is made; when the value of the supervisory factor is greater than or equal to the threshold of the supervisory index Z1Y, the corresponding online loan is The platform node issues an alert message.
  • the traversal supervision program for storing the multi-fork tree of the "natural person ⁇ loan alarm" type indicator runs to the supervision index Z1Y
  • the specific natural person's ID number is input into the executable SQL statement of the indicator Z1Y and is supervised in each
  • the data provided by the platform is queried, and the actual loan value of the natural person on each platform is obtained.
  • the corresponding processing scheme is outputted from the Z1Y node.
  • the financial regulatory institution completes the above-mentioned risk engine or implements the above-mentioned risk supervision processing procedure, and completes the extraction of the supervision query factor from the supervision information, and compares the value of the supervision query factor with the threshold value of the supervision index, and according to the The process of comparing the results of the implementation of the risk management treatment program, especially by simultaneously monitoring the regulatory information provided on multiple platforms, not only identifying the risks of a single platform, but also centrally supervising multiple online lending platforms, greatly reducing the number of The time and economic costs of under-platform supervision can effectively prevent cross-institutional cross-regional violations.
  • the implementation of the risk management process performed on the original information record based on the pre-configured supervision rule may be implemented by a centralized information server, such as a centralization server of a financial regulatory institution.
  • the risk supervision smart contract issued on the regulatory blockchain may also be invoked to execute an execution procedure corresponding to the regulatory rule declared in the smart contract, and perform risk supervision processing on the original information record.
  • the issuing party of the smart contract may be either the financial regulatory agency or the superior supervisory institution of the financial regulatory institution.
  • the superior supervisory authority may issue a plurality of intelligent contract procedures common to the lower-level regulatory agencies for the convenience of supervision. Used by lower level regulators.
  • the smart contract should be invoked at the request of the corresponding user at any time, which greatly improves the efficiency of supervision; and the smart contract execution has low human intervention and goes to the center.
  • the advantages of the authority have further increased the fairness of regulatory behavior.
  • the embodiment of the present specification further provides a distributed information supervision apparatus.
  • the device can be implemented by software, or can be implemented by hardware or a combination of hardware and software.
  • the CPU Central Process Unit
  • the device in which the network risk service implementation device is located usually includes other hardware such as a chip for transmitting and receiving wireless signals, and/or is implemented. Other hardware such as boards for network communication functions.
  • FIG. 8 is a blockchain-based information monitoring apparatus provided by the present specification, the blockchain includes at least one information supervisor node and a plurality of information provider nodes, and the information monitoring apparatus includes
  • the information obtaining unit 802 is configured to obtain, by the information supervising party, an encrypted information record issued by the information provider; wherein the encrypted information record is encrypted based on a key related to a public key of the information supervisor;
  • the information decryption unit 804 is configured to decrypt the encrypted information record to obtain the original information record by using a key related to the private key of the information supervisor;
  • the risk supervision processing unit 806 is configured to perform risk supervision processing on the original information record based on the pre-configured supervision rule.
  • the device embodiment since it basically corresponds to the method embodiment, reference may be made to the partial description of the method embodiment.
  • the device embodiments described above are merely illustrative, wherein the modules described as separate components may or may not be physically separate, and the components displayed as modules may or may not be physical modules, ie may be located A place, or it can be distributed to multiple network modules. Some or all of the modules may be selected according to actual needs to achieve the objectives of the present specification. Those of ordinary skill in the art can understand and implement without any creative effort.
  • the system, device, module or module illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
  • a typical implementation device is a computer, and the specific form of the computer may be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email transceiver, and a game control.
  • an embodiment of the present specification provides a computer device including a memory and a processor.
  • the computer stores a computer program executable by the processor; and when the processor runs the stored computer program, the processor performs the steps of the method for implementing the blockchain-based information supervision in the embodiment of the present specification.
  • the steps in the implementation of the above information supervision please refer to the previous content, and will not be repeated.
  • embodiments of the present specification provide a computer readable storage medium having stored thereon computer programs that, when executed by a processor, perform a region based on an embodiment of the present specification
  • the various steps of the implementation of the blockchain information supervision please refer to the previous content, and will not be repeated.
  • a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
  • RAM random access memory
  • ROM read only memory
  • Memory is an example of a computer readable medium.
  • Computer readable media includes both permanent and non-persistent, removable and non-removable media.
  • Information storage can be implemented by any method or technology.
  • the information can be computer readable instructions, data structures, modules of programs, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device. As defined herein, computer readable media does not include temporary storage of computer readable media, such as modulated data signals and carrier waves.
  • PRAM phase change memory
  • SRAM static random access memory
  • DRAM dynamic random access memory
  • RAM random access memory
  • ROM read only memory
  • EEPROM electrically erasable programmable read only memory
  • flash memory or other memory technology
  • CD-ROM compact disk read only memory
  • DVD digital versatile disk
  • Magnetic tape cartridges magnetic tape storage or other magnetic
  • embodiments of the present specification can be provided as a method, system, or computer program product.
  • embodiments of the present specification can take the form of an entirely hardware embodiment, an entirely software embodiment or a combination of software and hardware.
  • embodiments of the present specification can take the form of a computer program product embodied on one or more computer usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer usable program code embodied therein. .

Abstract

一种信息监管方法和装置,用于信息监管方监管信息提供方提供的信息,设置所述信息监管方和所述信息提供方为一区块链的节点;所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密(102);使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录(104);基于预配置的监管规则对所述原始信息记录执行风险监管处理(106)。

Description

一种基于区块链的信息监管方法及装置 技术领域
本说明书涉及数据处理技术领域,尤其涉及一种基于区块链的信息监管方法及装置。
背景技术
现有的信息监管通常采用线下现场监管的方式,监管机构根据投诉线索、舆情、进行主动埋点或暗地访查,参考监管条例来检查被监管机构的业务合规情况。现场检查的问题在于成本比较高,需要到被监管机构集中办公一段时间,而且不排除被监管机构突击准备应付监管的情况出现,这也增加了被监管机构的成本。
随着业务多元化发展,随时随地掌握被监管机构的情况成为监管机构的刚性业务需求。因此亟需构建一套基础监管方法及设施,便于被监管机构动态低成本加入、同时监管机构不用亲赴现场也可以远程地掌握被监管机构在对应条例下的合规情况。
发明内容
针对以上提出的信息监管的现状,本说明书提供了一种基于区块链的信息监管方法,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,所述监管方法包括:
所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
基于预配置的监管规则对所述原始信息记录执行风险监管处理。
更优的,所述基于预配置的监管规则对所述原始信息记录执行风险监管处理,包括:
调用发布在所述区块链上的风险监管智能合约,执行所述智能合约中声明的与监管规则对应的执行程序,对所述原始信息记录执行风险监管处理。
更优的,所述智能合约由所述信息监管方发布至所述区块链。
更优的,所述区块链为联盟链。
更优的,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密,包括:
基于与所述信息监管方的公钥相关的密钥对所述原始信息记录进行加密,得到所述加密信息记录,再对所述加密信息记录进行数字签名得到第一签名信息;
所述使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录,包括:
所述信息监管方对所述第一签名信息进行验签,验签通过后再使用与所述信息监管方的私钥相关的密钥对所述加密信息记录进行解密,得到所述原始信息记录。
更优的,所述信息监管方的公钥相关的密钥为:所述信息监管方的公钥,所述信息监管方的私钥相关的密钥为:所述信息监管方的私钥。
更优的,所述信息监管方的公钥相关的密钥为:所述信息监管方的公钥与所述信息提供方的私钥的乘积,所述信息监管方的私钥相关的密钥为:所述信息监管方的私钥与所述信息提供方的公钥的乘积。
更优的,所述基于预配置的监管规则对所述原始信息记录执行风险监管处理,包括:
识别所述原始信息记录中的监管因子,将所述监管因子的取值与预设的监管阈值的阈值作比较,根据比较结果执行风险监管处理。
更优的,所述信息监管方预设的监管指标,包括针对监管规则转换生成的可执行SQL语句和对应的监管阈值;
识别所述原始信息记录中的监管因子,将所述监管因子的取值与预设的监管阈值的阈值作比较,包括
识别所述原始信息记录中的监管因子,
在所述监管指标的可执行SQL语句中输入监管因子进行查询,
将查询所得的所述监管因子的取值与所述监管指标的监管阈值作比较。
更优的,所述信息监管方还与配置了监管指标池;
所述方法还包括:
将监管规则转换为可执行的SQL语句;
生成监管指标名称,并建立所述监管指标的名称与所述SQL语句的映射关系,并将所述映射关系存入监管指标池。
更优的,所述监管指标池中的监管指标为多叉树存储结构,所述监管指标为所述多叉树 上的节点。
更优的,所述监管指标还关联了对应的监管处理方案;
所述根据所述比较结果执行风险监管处理,包括,
确定所述监管因子的取值是否达到所述监管指标中的监管阈值:
如果否,不作出响应;
如果是,执行与所述监管指标关联的监管处理方案。
本说明书还提供了一种基于区块链的信息监管装置,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,所述信息监管装置包括:
信息获取单元,用于所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
信息解密单元,用于使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
风险监管处理单元,用于基于预配置的监管规则对所述原始信息记录执行风险监管处理。
本说明书还提供了一种计算机设备,包括:存储器和处理器;所述存储器上存储有可由处理器运行的计算机程序;所述处理器运行所述计算机程序时,执行上述信息监管业务的实现方法所述的步骤。
本说明书还提供了一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器运行时,执行上述信息监管业务的实现方法所述的步骤。
由以上技术方案可见,本说明书提供的信息监管方法及装置,将信息监管方与信息提供方均设置为区块链的节点,为信息提供方动态、低成本加入该区块链接收监管、信息监管方实时从该区块链获取监管信息提供了线上通道,从而免除了双方在线下勘察监管中付出的成本;而且,信息提供方将信息加密发布于该区块链,处于该区块链的其他任意节点无法将其正确解密,从而保证了每个信息提供方提供信息的安全性;进一步地,区块链的架构,确保每个信息提供方实时提供的信息不会在提供后被篡改,从而保证了信息监管的真实有效性;更优的是,信息监管方将监管要求数字化成监管指标,并采用对比监管指标和监管因子的对应的值的方式,可以实时地对信息提供方进行数字化监管,及时输出风险监管处理方案,保证监管行为的时效性;而且本说明书所提供的基于区块链的信息监管方法和装置可同时对多节点多机构进行实时监管,可有效防止跨机构跨地区的违规现象。
附图说明
图1为本说明书所提供的一实施例所示的基于区块链的信息监管方法的流程图;
图2为简化的PBFT算法的达到共识的一致性过程示意图;
图3为本说明书所提供的一实施例所示的信息加密及信息解密的流程图;
图4为本说明书所提供的又一实施例所示的利用ECDH信息加密及信息解密的流程图;
图5为本说明书实施例所示的金融监管机构建立的监管风险引擎示意图;
图6为本说明书实施例所示的金融监管机构根据监管要求生成可执行SQL语句的示意图;
图7为本说明书所实施例所示的金融监管机构针对用户借款行为的风险监管流程图;
图8为本说明书所提供的一实施例所示的信息监管装置的示意图;
图9为运行本说明书所提供的分布式信息监管装置实施例的一种硬件结构图。
具体实施方式
如图1所示,本说明书提供的实施例示意了一种基于区块链的基于区块链的信息监管方法,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,该监管方法包括:
步骤102,所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
步骤104,使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
步骤106,基于预配置的监管规则对所述原始信息记录执行风险监管处理。
本说明书提供的实施例所述的“信息监管方”为信息监管中履行监管职责的机构所在的服务器或终端,本说明书提供的实施例所述的“信息提供方”具体可以为信息监管中的被监管方终端,也可为与被监管方发生数据连接的其他服务器或终端,其提供的“信息”即为被监管的对象信息数据,如贷款数据、交易数据等。在本说明书所述的实施例中,任意的信息监管方与信息提供方可通过遵循相应节点协议、运行节点协议程序的安装来加入作该区块链,作为该区块链的节点。因此相比于监管机构线下一一查看被监管机构的业务现状,本说明书的实施例提供的线上加入该区块链成为其节点以参与监管或被监管的方法有着更加优越的便 捷性和经济性,可随时加入或撤出。
本说明书提供的实施例可以运行在任何具有计算和存储能力的设备上,如手机、平板电脑、PC(Personal Computer,个人电脑)、笔记本、服务器等设备;还可以由运行在两个或两个以上设备的逻辑节点来实现本说明书实施例中的各项功能。
本说明书提供的实施例所述的“区块链”,具体可指一个各节点通过共识机制达成的、具有分布式数据存储结构的P2P网络系统,该区块链内的数据分布在时间上相连的一个个“区块(block)”之内,后一区块包含前一区块的数据摘要,且根据具体的共识机制(如POW、POS、DPOS或PBFT等)的不同,达成全部或部分节点的数据全备份。本领域的技术人员熟知,由于区块链系统在相应共识机制下运行,已收录至区块链数据库内的数据很难被任意的节点篡改,例如采用Pow共识的区块链,至少需要全网51%算力的攻击才有可能篡改已有数据,因此区块链系统有着其他中心化数据库系统所法比拟的保证数据安全、防攻击篡改的特性。由此可知,在本说明书所提供的实施例中,由信息提供方提供的、被该区块链收录的“信息”不会被攻击或篡改,从而保证了监管的真实与公正性。
为了进一步保证监管的隐私性,本说明书提供的实施例中,信息提供方提供的信息以与所述信息监管方的公钥相关的密钥进行加密;该加密信息仅能被所述信息监管方的私钥相关的密钥进行解密以获取原始信息记录,防止共处于同一区块链的其他节点获知该信息的明文(即原始信息记录)。相应的信息监管方可解密的加密方式有很多,如ECDSA、RSA,在本说明书提供的实施例中可根据需求而具体设定加密方式。
本说明书实施例所提供的基于区块链的信息监管方法,信息监管方基于预配置的监管规则对所述原始信息记录执行风险监管处理,具体的风险监管处理方案有很多,例如将监管规则数字化为相应的监管指标,将监管指标的阈值与从区块链网络上获取的原始信息记录中监管因子的取值做比对,进而根据是否违规、违规程度直接有效输出监管结果;或者是从区块链网络上获取的原始信息记录中识别违规因子,一旦识别出违规因子,即执行预设的风险监管处理,如预警、报警、执行封锁等。所述基于预配置的监管规则对所述原始信息记录执行风险监管处理的方案,根据具体的监管要求具体设定,在本说明书中不作限定,从而最终完成了从监管信息的收集到对被监管行为的处理的一体化的数字监管方法,提高了监管行为的便捷性、经济性、真实性与高效性。
下面以金融监管机构监管同一借款人在同一网贷机构及不同网贷机构的借款情况为例,阐述本说明书所提供的具体实施方式。
在本实施例中,金融监管机构为信息监管方,各个网贷机构为不同的信息提供方,自然 借款人用户为被监管的对象。为降低交易或数据的确认时间、提高交易吞吐量、满足对安全和性能的需求,金融机构通常选用联盟链架构来构建该区块链。信用较高的机构,如大型银行、巨头企业、一些监管机构可作为该联盟链的预选的节点,参与区块的记账。联盟链的共识过程也由该预选的节点控制,当网络上有超过设定比例(如2/3)的节点确认一个区块,该区块记录的交易或数据将得到全网确认。联盟链可以根据应用场景来决定对公众的开放程度,对可开放的机构给予接入该联盟链的权限,例如在本实施例中,作为信息监管方的金融监管机构可为预选的节点参与记账,各个信息提供方如网贷机构可为具有接入联盟链权限的一般节点;当然,金融监管机构也可为具有接入联盟链权限的一般节点,在本说明书中不作限定。
联盟链通常多采用权益证明或PBFT、RAFT等共识算法。图2示意了简化的PBFT算法的达到共识的一致性过程,其中C为客户端,N 0~N 3表示服务节点,特别的,N 0为主节点,N 3为故障节点。PBFT系统通常假设故障节点数为m个,而整个服务节点数为3m+1个。简单而言,整个通信过程如下:
1)客户端向主节点发送请求调用服务操作;
2)当主节点接收请求后,启动三阶段的协议以向各从节点广播请求;
[2.1]序号分配阶段(又称pre-prepare阶段),主节点给请求赋值一个序列号n,广播序号分配消息和客户端的请求消息m,并将构造PRE-PREPARE消息给各从节点;
[2.2]交互阶段(又称prepare阶段),从节点接收PRE-PREPARE消息,向其他服务器节点广播PRE-PREPARE消息;
[2.3]序号确认阶段(又称commit阶段),各节点对视图内的请求和次序进行验证后,广播COMMIT消息,执行收到的客户端的请求并给客户端以相应。
3)客户端等待来自不同节点的响应,若有m+1个响应相同,则该响应即为共识的结果。
同所有的状态机副本复制技术一样,PBFT对每个副本节点提出了两个限定条件:
1)所有节点必须是确定性的。也就是说,在给定状态和参数相同的情况下,操作执行的结果必须相同;
2)所有节点必须从相同的状态开始执行。
在这两个限定条件下,即使失效的副本节点存在,PBFT算法对所有非失效副本节点的请求执行总顺序达成一致,从而保证安全性。
根据图2所示的共识通信过程一批记录生成一个区块,最终形成链。PBFT算法作为本 说明书所提供的一种优选的实施方式,是由于采用该种算法共识的效率高,可满足高频交易量的需求,例如在本实施例中频繁的借贷交易;且共识的时延很低,基本达到实时处理的要求,能快速实时地对监管信息输出监管结果;可信节点作为预选的记账节点,兼顾了安全性与稳定性;另外,采用PBFT算法不会消耗过多的计算机算力资源,也不一定需要代币流通,因此具有良好的可使用性。
更优地,在本说明书所提供的实施例中,各个网贷机构作为信息提供方,其提供的与个人借贷相关的信息通常涉及身份等隐私信息,如表1所示,为保证涉及自身机构或借贷人隐私的信息明文只被相应的具有监管权限的金融监管机构获知,而不被处在同一区块链的其他节点获知或非法使用,各个网贷机构应加密处理其提供的监管信息。具体的加密方式有很多种,例如网贷机构可提前与金融监管机构约定对称密钥来进行加密和解密;网贷机构也可使用与金融监管机构的公钥相关的密钥来进行非对称加密,则金融监管机构可使用与其私钥相关的密钥来进行解密得到网贷机构所提供的借贷信息的明文(如表1所示),从而防止其他节点获悉该监管信息。
表1 网贷机构A平台上发生的个人C向个人B借贷的信息表
Figure PCTCN2019075463-appb-000001
例如,如图3所示,作为信息提供方的网贷机构首先使用对应的金融监管机构的公钥对其提供的借贷信息的明文(如表1所示)进行加密得到借贷信息的密文,接着为保证所述密文不被篡改和伪造,网贷机构对该密文进行数字签名,并将该对密文的数字签名和密文一起上传至网贷机构节点所在的区块链数据库缓存中;该区块链的记账工,如联盟链中的预选的具有记账权限的节点,需对可收录至区块链的数据记录进行验证,该验证过程必然包含对上述数字签名的验签,验签过程是为了防止数据被篡改或者该信息是其他参与者伪造,验签通过后记账工将该对密文的数字签名和密文收录至上述区块链的区块中。
在该对密文的数字签名和密文被如联盟链中的预选节点收录至所述区块链中后,作为该区块链的节点,该金融监管机构可从区块链中获取上述对密文的数字签名和密文,相应地,该金融监管机构可通过使用与上述公钥对应的私钥对密文进行解密,从而得到具体的借贷信息的明文。在本实施例中,作为信息监管方的金融监管机构可以是具有记账权限的预选节点,也可为普通的节点,在本说明书中不作具体限定,只要其对上述对密文的数字签名和密文具有访问查看权限。
本说明书实施例对关于数字签名及验签算法、金融监管机构自身的公钥-私钥对的算法不作具体限定,可选用椭圆曲线算法、RSA算法等完成,相关的hash算法可选用MD5、SHA256等完成。
关于上述对借贷信息进行加密以得到密文的过程,可以采用双方约定对称密钥的方式实现。例如,如图4所示,作为信息提供方的网贷机构对借贷信息的明文进行加密可采用ECDH交换密钥的方式。本领域的技术人员应知,在使用同一椭圆曲线算法(即选用同一直线或基点)获取机构的身份相关的公钥-私钥对的区块链系统中,机构A的私钥AS与机构B的公钥BP的乘积等于机构A的公钥AP与机构B的私钥BS的乘积。
即:AS·BP=AP·BS,
在本说明书所述的实施例中:金融监管机构的公钥JP·网贷机构的私钥DS=金融监管机构的私钥JS·网贷机构的公钥DP
因此,网贷机构可使用对应的金融监管机构的公钥JP与自身的私钥DS乘积所得的密钥对借贷信息的明文进行加密得到借贷信息的密文,类似的,接着为保证所述密文不被篡改和伪造,网贷机构对该密文进行数字签名,并将该对密文的数字签名、密文和与上述对借贷信息加密所使用的自身的私钥DS相对应的公钥DP、金融监管机构的公钥JP一起上传至网贷机构节点所在的区块链数据库缓存中;该区块链的记账工,如联盟链中的预选的具有记账权限的节点,首先对该数字签名进行验签,验签过程是为了防止数据被篡改或者该信息是其他参与者伪造,验签通过后记账工将该对密文的数字签名、密文、和上述对借贷信息加密所使用的自身的私钥DS相对应的公钥DP、金融监管机构的公钥JP一起收录至上述区块链的区块中。
在该对密文的数字签名、密文和上述对借贷信息加密所使用的自身的私钥相对应的公钥被如联盟链中的预选节点收录至所述区块链中后,该金融监管机构可从区块链中获取上述对密文的数字签名和密文,相应地,该金融监管机构可通过使用与上述从网络上获取的公钥JP对应的私钥JS与从网络上获取的DP相乘而得的密钥对密文进行解密,从而得到具体的借贷信息的明文。其他任意节点,由于不能获知该金融监管机构的私钥JS而无法将上述密文解密。
值得注意的是,由于同一机构在一个区块链中可具有多组公钥-私钥对,上述对信贷信息加密所用的网贷机构的公钥DP、私钥DS不一定与上述数字签名过程及验签所使用的私钥、公钥相同,但这并不影响本技术方案的实施,反而由于增加了系统的复杂性而降低了被攻击的可能性。
虽然该区块链的记账节点在收录数据时已经验证过密文的数字签名,为了进一步地保证监管信息来源的正确性,防止数据被篡改或者恶意节点伪造数据,上述对本说明书所提供的实施例的描述中,金融监管机构在从上述区块链中获取到借贷信息的密文、网贷机构对该借贷信息的数字签名等数据后,首先可再次对获取到的数字签名进行验证,验证通过后再解密上述密文,从而进一步防止其他机构或个人伪造借贷信息,加强该金融监管行为的真实可靠权威性。
在本说明书所提供的实施例中,作为信息监管方的金融监管机构可建立监管风险引擎来模块化处理各个网贷机构提供的借贷信息。如图5所示,该监管风险引擎具体可包括:数据输入模块M1、监管指标生成模块M2、风险决策模块M3、风险处置模块M4等。值得注意的是,上述风险监管引擎仅仅是风险监管处理的程序的具象化名称,且该风险监管引擎的各个模块之间并无特定的分界,仅仅为了阐释上述风险引擎的功能的方便,人为将其划分为多个模块。
数据输入模块M1用以处理该金融监管机构从上述区块链获取到的数据,包括借贷信息的密文、网贷机构对该借贷信息的数字签名等数据,根据相关的解密算法将上述借贷信息的密文解密、或对上述数字签名验签通过后再将上述借贷信息的密文解密,按风险决策模块M3所需的数据格式将该借贷信息的明文所包含的数据信息解析。由于现有的分布式共享网络系统或区块链系统承载的数据结构通常为文本格式,不具有良好的可操作性,因此数据输入模块M1可将上述解密的借贷信息的明文进行数据表格化解析,将风险决策模块M3中需用到的重要数据信息建立成表格形式,例如还原为上文表1所述的数据表格,输入至风险决策模块M3。
监管指标生成模块M2用于根据监管法规或准则生成监管行为对应的监管指标。如本实施例中,为监管“同一借款人在同一网贷机构的借款余额上限”行为,根据“单一的个体、单一的自然人在一个平台上的借款上限是20万”这一金融法条,训练建立对应的指标。该训练过程如下,
1)如图6所示,通过命名实体识、语法分析、依存分析等自动分析技术,依存分析句子的主谓宾结构特征,获取到动作元组(单一、自然人or个体、借款、上线、20万),进一步通过预定义的映射结构关系将该监管合规法文转换为一段计算机程序可执行的SQL语句;
2)生成一个指标Z1′,并和第1步产生的SQL语句映射关联,将其一起存入监管指标池候选;
3)人工审核上述SQL语句,在修订并确认上述SQL语句的正确性后,将其正式存入监 管指标池,命名为Z1指标;Z1指标包括上述可执行的SQL语句,及其阈值——20W。
类似地,根据“单一的个体、单一的自然人在多个平台上的借款上限是100万”这一金融法条,可训练出Z2指标;Z2指标包括一段可执行的SQL语句,及其阈值——100W。
在本说明书所述的实施例中,为便于管理多个监管指标,可在监管指标池内设立的监管指标多叉树存储结构,将多个监管指标,如Z1、Z2,分别存储在该多叉树的节点上。进一步地,为便于对相似种类的行为进行统一监管,可以在监管指标池内设立多个不同种类的多叉树,对应存储相应类别的监管指标,例如监管指标池中设立有“自然人→借款报警”类指标的存储多叉树,其上可存储如上述Z1、Z2及其他与自然人用户在网贷平台上借款行为相关的指标;应“同一法人或其他组织在同一网络借贷信息中介机构平台的借款余额上限不超过人民币100万元”等其他相关监管办法条款,监管指标池中还可设立有“企业→借款报警”类监管指标多叉树,其上存储有与企业用户在网贷平台上借款的法定限额相关的监管指标。
而且,为了便于多层次监管,更好地达到提前警示预防违法的监管效果,可对一些指标设置相应的预警指标(预警指标对应的阈值可设定为全指标阈值的95%或其他值),例如为“单一的个体、单一的自然人在一个平台上的借款不超过19w”预警监管语句,按照上述1)--3)的过程生成预警指标Z1Y,Z1Y包括由上述预警监管语句训练出的可执行的SQL语句及其对应的阈值19W,将其存入上述监管指标池。类似地,可以在监管指标池内建立一个“自然人→借款预警”类指标的存储多叉树,并将Z1Y存储在该多叉树的节点上。该“自然人→借款预警”类指标多叉树上还可存储与同一自然人在多个网贷平台上借款行为的预警监管相关的Z2Y指标,在此不再赘述。
至此,监管指标生成模块M2通过以上数据训练、审核、指标建立或指标多叉树建立过程,将监管指标与可执行的SQL语句映射关联,为监管自然人用户在网贷机构上借款情况创建了可执行的监管模板,具体的风险监管及处置过程在风险决策模块M3中进行。值得注意的是,在本说明书中仅仅为了阐释上述风险引擎的各个功能的方便,将其划分为多个模块,各模块之间并无特定的界限,例如上述监管指标池可以归属于监管生成模块M2,也可归属于风险决策模块M3。
如图7所示,上述的监管指标池(图中所示的监管指标数据集市)被存储于风险决策模块M3内,该监管指标池内可包含若干个监管指标。在风险决策模块M3接收到对“单一的个体、单一的自然人在一个平台上的借款是否需预警”的监管指令后,首先在其监管指标池中搜索是否有对应的监管指标Z1Y存在,如存在,风险决策模块M3进入风险因素识别阶段。该风险决策模块M3读取从数据输入模块M1输入的数据信息,针对该监管指令从上述数据 信息中识别监管因子,在本例中监管对象为单个借款自然人,由于可唯一性确定自然人是否为单个的因素为自然人的身份证号码(或其他唯一性用户ID),因此本例中的监管因子为自然人的身份证号码,接着风险决策模块M3在监管指标Z1Y对应的SQL语句输入该用户的身份证号码,运行该SQL语句对该身份证号码进行查询,即可得到该单一自然人在该单平台的实际借款数(余额),对比该监管因子的取值—实际借款数与指标Z1Y的阈值19W,该风险引擎的风险处置模块M4输出相应的监管处理方案:当单一自然人实际借款数低于19W时,风险处置模块M4可不将其视为风险事件,不作响应;当单一自然人实际借款数高于19W时,根据预设的风险监管处理逻辑,风险处置模块M4可向相应的网贷平台节点发出预警提示消息,如“已大额借款,即将达到监管限制上限”,从而阻止该网贷机构单平台对该用户超过可放款余额的新放款,减少某业务可能发生的损失。上述具体的风险处置方案可与监管指标关联,以方便风险处置模块M4的处置方案输出。
如上述金融监管机构发现某自然人在单平台的借款已经超出预警的阈值,可预案关联而进一步对其进行报警指标监管:首先在其监管指标池中搜索是否有对应的监管指标Z1存在,如存在,风险决策模块M3进入风险因素识别阶段。类似地,该风险决策模块M3读取从数据输入模块M1输入的数据信息,针对该监管指令从上述数据信息中识别监管因子——该自然人的身份证号码,接着风险决策模块M3在指标Z1对应的SQL语句中输入该身份证号码,并运行查询,即可得到该单一自然人在该单平台的实际借款数,对比该监管因子的取值--实际借款数与指标Z1的阈值20W,该风险引擎的风险处置模块M4输出相应的监管处理方案:当单一自然人实际借款数低于20W时,风险处置模块M4可不作输出;当单一自然人实际借款数高于20W时,风险处置模块M4可向相应的网贷平台节点发出强力报警消息,或再向本监管机构或上级监管部门呈报。同样,上述具体的风险处置方案可与具体的监管指标管理,以方便风险处置模块M4的处置方案输出。
当然,根据监管的具体需求,可以省去对预警指标的监管而直接对报警指标进行监管,在本说明书中不作限定。
当监管指标池中的多个监管指标以多叉树的形式被存储时,由于多叉树数据结构便于提高遍历查找的效率,因此在面对“筛查所有的监管指标,监测是否有违规行为”或类似的普遍性监管指令时,更能提高监管的效率。在普遍性监察是否有预警或违规行为发生时,金融监管机构可遍历其监管指标池中存储的监管指标多叉树,对每个已经设立好的监管指标进行对应的风险决策,该风险决策的具体过程与上述对监管指标Z1、或预警监管指标Z1Y的过程类似,在此不作赘述。
值得注意的是,上述的风险处置模块M4针对具体的监管指标(如Z1Y或Z1)输出的监管处理方案,也可关联在该监管指标所在的、监管指标多叉树的节点上,例如在监管指标Z1Y的节点上关联两种处理方案:当监管因子的取值小于监管指标Z1Y的阈值时,不作出响应;当监管因子的取值大于或等于监管指标Z1Y的阈值时,向相应的网贷平台节点发出预警提示消息。这样在对“自然人→借款报警”类指标的存储多叉树的遍历监管程序运行到所述监管指标Z1Y时,将具体自然人的身份证号码输入指标Z1Y的可执行SQL语句并在所监管的每个平台所提供的数据中查询,得到该自然人在每个平台上的实际贷款取值,根据该取值于Z1Y阈值的对比关系,从Z1Y节点上输出执行相应的处理方案。上述将监管处理方案关联于监管多叉树的相应节点上的技术方案,方便风险处理程序或风险处理引擎更快地作出风险处理,从而提升监管的效率。
金融监管机构通过建立上述风险引擎或执行上述风险监管处理程序,完成了从监管信息中提取监管查询因子,并将所述监管查询因子的取值与所述监管指标的阈值作对比,且根据所述比较结果执行风险监管处理方案的过程,尤其是通过同时监管多平台上发生提供的监管信息,不仅仅识别单个平台的风险,穿透式集中监管多个网贷平台,极大降低了对多平台线下监管的时间和经济成本,可有效防止跨机构跨地区违规行为。
在本说明书所提供的实施例中,上述基于预配置的监管规则对所述原始信息记录执行风险监管处理的实施,既可以由信息监管方如金融监管机构的中心化服务器来程序化运行实现,也可调用发布在该监管区块链上的风险监管智能合约,执行该智能合约中声明的与监管规则对应的执行程序,对所述原始信息记录执行风险监管处理。该智能合约的发布方,既可以是该金融监管机构,又可以是该金融监管机构的上级监管机构——上级监管机构为了监管方便,可发布多个下级监管机构通用的智能合约程序,供各个下级监管机构使用。本领域的技术人员应知,相比于中心化的服务器运行方式,智能合约在任何时候应相应用户的请求而调用,大大提升监管的效率;且智能合约执行有着较低的人为干预、去中心化权威的优势,更加增加了监管行为的公平性。
与上述流程实现对应,本说明书的实施例还提供了一种分布式信息监管装置。该装置可以通过软件实现,也可以通过硬件或者软硬件结合的方式实现。以软件实现为例,作为逻辑意义上的装置,是通过所在设备的CPU(Central Process Unit,中央处理器)将对应的计算机程序指令读取到内存中运行形成的。从硬件层面而言,除了图9所示的CPU、内存以及存储器之外,网络风险业务的实现装置所在的设备通常还包括用于进行无线信号收发的芯片等其他硬件,和/或用于实现网络通信功能的板卡等其他硬件。
图8所示为本说明书所提供一种基于区块链的信息监管装置,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,所述信息监管装置包括
信息获取单元802,用于所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
信息解密单元804,用于使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
风险监管处理单元806,用于基于预配置的监管规则对所述原始信息记录执行风险监管处理。
上述装置中各个模块的功能和作用的实现过程具体详见上述方法中对应步骤的实现过程,在此不再赘述。
对于装置实施例而言,由于其基本对应于方法实施例,所以相关之处参见方法实施例的部分说明即可。以上所描述的装置实施例仅仅是示意性的,其中所述作为分离部件说明的模块可以是或者也可以不是物理上分开的,作为模块显示的部件可以是或者也可以不是物理模块,即可以位于一个地方,或者也可以分布到多个网络模块上。可以根据实际的需要选择其中的部分或者全部模块来实现本说明书方案的目的。本领域普通技术人员在不付出创造性劳动的情况下,即可以理解并实施。
上述实施例阐明的系统、装置、模块或模块,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机,计算机的具体形式可以是个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件收发设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任意几种设备的组合。
与上述方法实施例相对应,本说明书的实施例提供了一种计算机设备,该计算机设备包括存储器和处理器。其中,存储器上存储有能够由处理器运行的计算机程序;处理器在运行存储的计算机程序时,执行本说明书实施例中基于区块链的信息监管的实现方法的各个步骤。对上述信息监管的实现方法的各个步骤的详细描述请参见之前的内容,不再重复。
与上述方法实施例相对应,本说明书的实施例提供了一种计算机可读存储介质,该存储介质上存储有计算机程序,这些计算机程序在被处理器运行时,执行本说明书实施例中基于区块链的信息监管的实现方法的各个步骤。对上述信息监管的实现方法的各个步骤的详细描述请参见之前的内容,不再重复。
以上所述仅为本说明书的较佳实施例而已,并不用以限制本说明书,凡在本说明书的精神和原则之内,所做的任何修改、等同替换、改进等,均应包含在本说明书保护的范围之内。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。
计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书的实施例可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书的实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。

Claims (15)

  1. 一种基于区块链的信息监管方法,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,所述监管方法包括:
    所述信息监管方获取所述信息提供方发布的加密信息记录;其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
    使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
    基于预配置的监管规则对所述原始信息记录执行风险监管处理。
  2. 根据权利要求1所述的信息监管方法,所述基于预配置的监管规则对所述原始信息记录执行风险监管处理,包括:
    调用发布在所述区块链上的风险监管智能合约,执行所述智能合约中声明的与监管规则对应的执行程序,对所述原始信息记录执行风险监管处理。
  3. 根据权利要求2所述的信息监管方法,所述智能合约由所述信息监管方发布至所述区块链。
  4. 根据权利要求1至3中任一权利要求所述的信息监管方法,所述区块链为联盟链。
  5. 根据权利要求1所述的信息监管方法,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密,包括:
    基于与所述信息监管方的公钥相关的密钥对所述原始信息记录进行加密,得到所述加密信息记录,再对所述加密信息记录进行数字签名得到第一签名信息;
    所述使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录,包括:
    所述信息监管方对所述第一签名信息进行验签,验签通过后再使用与所述信息监管方的私钥相关的密钥对所述加密信息记录进行解密,得到所述原始信息记录。
  6. 根据权利要求1或5所述的信息监管方法,所述信息监管方的公钥相关的密钥为:所述信息监管方的公钥,所述信息监管方的私钥相关的密钥为:所述信息监管方的私钥。
  7. 根据权利要求1或5所述的信息监管方法,所述信息监管方的公钥相关的密钥为:所述信息监管方的公钥与所述信息提供方的私钥的乘积,所述信息监管方的私钥相关的密钥为:所述信息监管方的私钥与所述信息提供方的公钥的乘积。
  8. 根据权利要求1所述的信息监管方法,所述基于预配置的监管规则对所述原始 信息记录执行风险监管处理,包括:
    识别所述原始信息记录中的监管因子,将所述监管因子的取值与预设的监管阈值的阈值作比较,根据比较结果执行风险监管处理。
  9. 根据权利要求8所述的信息监管方法,所述信息监管方预设的监管指标,包括针对监管规则转换生成的可执行SQL语句和对应的监管阈值;
    识别所述原始信息记录中的监管因子,将所述监管因子的取值与预设的监管阈值的阈值作比较,包括:
    识别所述原始信息记录中的监管因子,
    在所述监管指标的可执行SQL语句中输入监管因子进行查询,
    将查询所得的所述监管因子的取值与所述监管指标的监管阈值作比较。
  10. 根据权利要求8所述的信息监管方法,所述信息监管方还与配置了监管指标池;
    所述方法还包括:
    将监管规则转换为可执行的SQL语句;
    生成监管指标名称,并建立所述监管指标的名称与所述SQL语句的映射关系,并将所述映射关系存入监管指标池。
  11. 根据权利要求10所述的信息监管方法,所述监管指标池中的监管指标为多叉树存储结构,所述监管指标为所述多叉树上的节点。
  12. 根据权利要求8所述的信息监管方法,所述监管指标还关联了对应的监管处理方案;
    所述根据所述比较结果执行风险监管处理,包括,
    确定所述监管因子的取值是否达到所述监管指标中的监管阈值:
    如果否,不作出响应;
    如果是,执行与所述监管指标关联的监管处理方案。
  13. 一种基于区块链的信息监管装置,所述区块链包括至少一个信息监管方节点以及若干信息提供方节点,所述信息监管装置包括:
    信息获取单元,用于所述信息监管方获取所述信息提供方发布的加密信息记录,其中,所述加密信息记录基于与所述信息监管方的公钥相关的密钥进行加密;
    信息解密单元,用于使用与所述信息监管方的私钥相关的密钥,对所述加密信息记录进行解密获取原始信息记录;
    风险监管处理单元,用于基于预配置的监管规则对所述原始信息记录执行风险监管处理。
  14. 一种计算机设备,包括:存储器和处理器;所述存储器上存储有可由处理器运行的计算机程序;所述处理器运行所述计算机程序时,执行如权利要求1到12任意一项所述的步骤。
  15. 一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器运行时,执行如权利要求1到12任意一项所述的步骤。
PCT/CN2019/075463 2018-05-11 2019-02-19 一种基于区块链的信息监管方法及装置 WO2019214311A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810446957.7A CN108681966B (zh) 2018-05-11 2018-05-11 一种基于区块链的信息监管方法及装置
CN201810446957.7 2018-05-11

Publications (1)

Publication Number Publication Date
WO2019214311A1 true WO2019214311A1 (zh) 2019-11-14

Family

ID=63805498

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/075463 WO2019214311A1 (zh) 2018-05-11 2019-02-19 一种基于区块链的信息监管方法及装置

Country Status (3)

Country Link
CN (2) CN108681966B (zh)
TW (1) TWI694350B (zh)
WO (1) WO2019214311A1 (zh)

Families Citing this family (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108681966B (zh) * 2018-05-11 2020-07-21 阿里巴巴集团控股有限公司 一种基于区块链的信息监管方法及装置
CN109472166B (zh) * 2018-11-01 2021-05-07 恒生电子股份有限公司 一种电子签章方法、装置、设备及介质
CN110059495B (zh) * 2018-12-14 2020-11-17 创新先进技术有限公司 数据共享方法、装置及系统、电子设备
CN109784918A (zh) * 2018-12-15 2019-05-21 深圳壹账通智能科技有限公司 基于区块链的信息监督方法、装置、设备和存储介质
CN110009317A (zh) * 2018-12-27 2019-07-12 阿里巴巴集团控股有限公司 资源转移数据的监控方法及装置
CN109753792B (zh) * 2018-12-29 2020-12-11 北京金山安全软件有限公司 一种攻击检测方法、装置及电子设备
CN109886677B (zh) * 2018-12-29 2021-06-29 创新先进技术有限公司 一种基于区块链的商品购置方法和装置
CN109413116A (zh) * 2019-01-03 2019-03-01 国家电网有限公司 一种可信的云端身份认证方法及系统
CN109831545B (zh) 2019-01-31 2020-10-09 中国互联网络信息中心 一种基于区块链的域名滥用处理方法及系统
CN110061845A (zh) * 2019-03-14 2019-07-26 深圳壹账通智能科技有限公司 区块链数据加密方法、装置、计算机设备及存储介质
CN110365475B (zh) * 2019-06-21 2021-12-10 深圳壹账通智能科技有限公司 区块链两级监管方法、装置、设备及存储介质
CN112152982B (zh) * 2019-06-28 2022-01-07 华为技术有限公司 区块链信息的处理方法、装置及介质
CN110490728B (zh) * 2019-07-30 2021-03-19 创新先进技术有限公司 基于区块链的交易、交易监管方法、装置及设备
CN110533318A (zh) * 2019-08-27 2019-12-03 腾讯科技(深圳)有限公司 一种基于区块链的数据处理方法及设备
CN110661790A (zh) * 2019-09-10 2020-01-07 连连银通电子支付有限公司 一种区块链隐私数据的保护方法、装置、设备和介质
CN110955909B (zh) * 2019-10-12 2022-08-05 四川九洲电器集团有限责任公司 个人数据保护方法及区块链节点
CN110956476A (zh) * 2019-12-17 2020-04-03 江苏扬子易联智能软件有限公司 一种基于区块链实现gmp/gsp自动监管的方法和平台
CN111681723A (zh) * 2020-04-27 2020-09-18 山东浪潮通软信息科技有限公司 一种基于区块链的健康信息管理方法及设备、介质
CN112561540A (zh) * 2020-08-14 2021-03-26 北京京东振世信息技术有限公司 物品监管方法和装置
CN112115497B (zh) * 2020-09-28 2023-06-27 上海对外经贸大学 一种基于区块链的舆情存证信息可擦除处置方法
CN112581339B (zh) * 2020-12-16 2024-03-29 深圳市深汕特别合作区智慧城市研究院有限公司 一种公平开放性的智慧城市社会要素表述系统
CN112529696B (zh) * 2020-12-24 2021-06-25 优观融资租赁(中国)有限公司 基于区块链和舆情的金融风控系统
CN112435029B (zh) * 2021-01-27 2021-04-23 支付宝(杭州)信息技术有限公司 一种基于区块链的业务处理方法、装置和电子设备
CN113051551A (zh) * 2021-03-16 2021-06-29 上海图灵加佳网络科技有限公司 基于区块链的数据监管方法、系统、介质及被监管终端
CN113360569B (zh) * 2021-06-03 2023-10-13 沈阳工业大学 基于储能参数选择与容量分解的电网区块链架构方法
CN113971015B (zh) * 2021-11-10 2023-09-08 哲库科技(北京)有限公司 Uia2计算电路及其数据处理方法、芯片、电子设备及存储介质
CN114580029A (zh) * 2022-04-28 2022-06-03 浙江甲骨文超级码科技股份有限公司 一种区块链数字资产隐私保护方法、装置、设备及存储介质
CN114579581B (zh) * 2022-05-05 2022-08-30 武汉北大高科软件股份有限公司 一种基于区块链的数据监管方法和装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106228344A (zh) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 一种基于区块链技术的电子政务系统建设方法
CN106778343A (zh) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 一种基于区块链的涉及隐私数据的数据共享方法
CN106991612A (zh) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 用于金融数据共享的方法、装置及电子设备
CN108681966A (zh) * 2018-05-11 2018-10-19 阿里巴巴集团控股有限公司 一种基于区块链的信息监管方法及装置

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050120009A1 (en) * 2003-11-21 2005-06-02 Aker J. B. System, method and computer program application for transforming unstructured text
US8688607B2 (en) * 2007-11-12 2014-04-01 Debra Pacha System and method for detecting healthcare insurance fraud
US20170213287A1 (en) * 2012-03-06 2017-07-27 Daniel B. Bruno System and method for providing a cryptographic platform for exchanging debt securities denominated in virtual currencies
CN104320262B (zh) * 2014-11-05 2017-07-21 中国科学院合肥物质科学研究院 基于加密数字货币公开账本技术的用户公钥地址绑定、检索和校验的方法及系统
US20160321751A1 (en) * 2015-04-28 2016-11-03 Domus Tower, Inc. Real-time settlement of securities trades over append-only ledgers
IL278834B2 (en) * 2016-02-23 2023-09-01 Nchain Holdings Ltd Automatic registration and management method for smart contracts based on 'block chain'
CN106845960B (zh) * 2017-01-24 2018-03-20 上海壹账通区块链科技有限公司 基于区块链的安全交易方法及系统
CN107025602A (zh) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 一种基于联盟链的金融资产交易系统构建方法
CN107451485B (zh) * 2017-06-02 2020-03-13 创新先进技术有限公司 一种基于区块链的数据处理方法及设备
CN107483198B (zh) * 2017-09-25 2019-11-12 中国科学院信息工程研究所 一种可监管的区块链系统及方法

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106228344A (zh) * 2016-07-28 2016-12-14 杭州云象网络技术有限公司 一种基于区块链技术的电子政务系统建设方法
CN106778343A (zh) * 2016-12-12 2017-05-31 武汉优聘科技有限公司 一种基于区块链的涉及隐私数据的数据共享方法
CN106991612A (zh) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 用于金融数据共享的方法、装置及电子设备
CN108681966A (zh) * 2018-05-11 2018-10-19 阿里巴巴集团控股有限公司 一种基于区块链的信息监管方法及装置

Also Published As

Publication number Publication date
TWI694350B (zh) 2020-05-21
CN108681966A (zh) 2018-10-19
CN108681966B (zh) 2020-07-21
TW201947446A (zh) 2019-12-16
CN111898148A (zh) 2020-11-06

Similar Documents

Publication Publication Date Title
WO2019214311A1 (zh) 一种基于区块链的信息监管方法及装置
CN108830601B (zh) 基于区块链的智慧城市信息安全使用方法及系统
JP6873270B2 (ja) ブロックチェーンにおけるスマートコントラクトに基づくトランザクション活動の取扱注意データを保護するための方法及びデバイス
CN109450910B (zh) 基于区块链的数据共享方法、数据共享网络及电子设备
CN109525671B (zh) 基于区块链的数据存储方法、电子设备及存储介质
CN111316278B (zh) 安全身份和档案管理系统
TWI764037B (zh) 跨區塊鏈的交互方法及系統、電腦設備及儲存媒體
CN110046996B (zh) 数据处理方法和装置
EP3962019A1 (en) Trusted data transmission methods, apparatuses, and devices
WO2021239104A1 (zh) 基于区块链的业务处理
CN110363527B (zh) 基于区块链的存证、监管方法和装置
TW201947910A (zh) 一種區塊鏈資料處理方法、裝置、處理設備及系統
TW201947436A (zh) 區塊鏈成員管理的資料處理方法、裝置、伺服器及系統
WO2020147568A1 (zh) 基于区块链的存证方法和装置
CN110569674A (zh) 基于区块链网络的认证方法及装置
CN113347008B (zh) 一种加法同态加密的贷款信息存储方法
WO2020000777A1 (zh) 基于区块链获取个人征信方法、装置及计算机设备
CN113302610B (zh) 基于区块链的可信平台
CN111291394A (zh) 一种虚假信息管理方法、装置和存储介质
CN107302524A (zh) 一种云计算环境下的密文数据共享系统
CN114357492A (zh) 一种基于区块链的医疗数据隐私融合方法及装置
CN110766548A (zh) 基于区块链的信息处理方法、装置、存储介质及电子设备
CN113315745A (zh) 一种数据处理方法、装置、设备及介质
CN113302612B (zh) 一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置
WO2019175427A1 (en) Method, device and medium for protecting work based on blockchain

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19800297

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 19800297

Country of ref document: EP

Kind code of ref document: A1