WO2022126967A1 - 基于区块链的数据监管方法、装置、设备及存储介质 - Google Patents

基于区块链的数据监管方法、装置、设备及存储介质 Download PDF

Info

Publication number
WO2022126967A1
WO2022126967A1 PCT/CN2021/090219 CN2021090219W WO2022126967A1 WO 2022126967 A1 WO2022126967 A1 WO 2022126967A1 CN 2021090219 W CN2021090219 W CN 2021090219W WO 2022126967 A1 WO2022126967 A1 WO 2022126967A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
data
blockchain
encrypted
encryption
Prior art date
Application number
PCT/CN2021/090219
Other languages
English (en)
French (fr)
Inventor
徐世辉
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022126967A1 publication Critical patent/WO2022126967A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Definitions

  • This application relates to the technical field of big data and the technical field of blockchain, and in particular, to a method, device, device and storage medium for data supervision based on blockchain.
  • the current trading platforms are all centralized, such as Taobao, Lianjia, and Meituan.
  • the trading platform When a customer makes a transaction, the trading platform will record the customer's transaction information, including bank account information, identity information, address information, etc., which are all customer privacy data and are very important.
  • the personal letter transaction information of the huge user group is under the actual control of the trading platform, and it is easy to become the target of hacker attacks.
  • the information carried in these centralized trading platforms is at risk of being lost, tampered with, and leaked. If there is a dispute over the transaction, there is no completely fair and equitable platform that can provide transaction information as a basis for refereeing.
  • the main purpose of this application is to solve the technical problem of inefficiency in data supervision based on blockchain, which cannot be processed differently according to the accounting methods of different docking channels.
  • a first aspect of the present application provides a blockchain-based data supervision method, including: obtaining a preset encryption key pair, and synchronizing the encryption key pair to a preset supervision party, wherein the encryption key pair is The key pair carries an encrypted private key and an encrypted public key; through the encrypted private key, the transaction information of the target customer on the blockchain transaction network is encrypted, and encrypted transaction data is generated, wherein the encrypted transaction data carries certain information.
  • the private information of the target customer encrypts the encryption public key by presetting the recipient public key, and generate the recipient encryption public key; form a transaction body based on the encrypted transaction data and the recipient encryption public key
  • the transaction body initiates a transaction request on the blockchain; completes the transaction according to the transaction request, and stores transaction-related data corresponding to the transaction to the blockchain, wherein the transaction-related data It includes user information, behavior information, transaction information, and contract information; the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information.
  • a second aspect of the present application provides a blockchain-based data supervision device, comprising: a first acquisition module for acquiring a preset encryption key pair and synchronizing the encryption key pair to a preset supervision party , wherein the encryption key pair carries an encryption private key and an encryption public key; an encryption module is used to encrypt the transaction information of the target customer on the blockchain transaction network through the encryption private key, and generate an encrypted transaction data, wherein the encrypted transaction data carries the private information of the target customer; a generating module is configured to encrypt the encrypted public key by using a preset public key of the recipient to generate the encrypted public key of the recipient; an initiating module, is used to form a transaction body with the encrypted transaction data and the encrypted public key of the recipient, and initiate a transaction request on the blockchain based on the transaction body; a storage module is used to complete the transaction request according to the transaction body.
  • transaction and store the transaction-related data corresponding to the transaction in the blockchain, wherein the transaction-related data includes user information, behavior information, transaction information, and contract
  • a third aspect of the present application provides a blockchain-based data monitoring device, comprising: a memory and at least one processor, wherein instructions are stored in the memory, and the memory and the at least one processor are interconnected through a line;
  • the at least one processor invokes the instructions in the memory, so that the blockchain-based data monitoring device executes the following steps of the blockchain-based data monitoring method: obtaining a preset encryption key pair , and synchronize the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key;
  • the transaction information of the target customer is encrypted to generate encrypted transaction data, wherein the encrypted transaction data carries the private information of the target customer;
  • the encrypted public key is encrypted by the preset recipient public key, and the recipient encryption key is generated.
  • the transaction-related data corresponding to the transaction is stored in the blockchain, wherein the transaction-related data includes user information, behavior information, transaction information, and contract information; the supervisory party encrypts the encrypted data according to the encryption public key.
  • the transaction data is decrypted to obtain transaction information, and the transaction information is displayed.
  • a fourth aspect of the present application provides a computer-readable storage medium having instructions stored in the computer-readable storage medium, which, when executed on a computer, cause the computer to perform the blockchain-based data supervision as described below
  • the steps of the method are: obtaining a preset encryption key pair, and synchronizing the encryption key pair to a preset supervisory party, wherein the encryption key pair carries an encryption private key and an encryption public key; Encrypt the private key, encrypt the transaction information of the target customer on the blockchain transaction network, and generate encrypted transaction data, wherein the encrypted transaction data carries the private information of the target customer; encrypting the encryption public key to generate the recipient encryption public key; form a transaction body with the encrypted transaction data and the recipient encryption public key, and initiate a transaction request on the blockchain based on the transaction body;
  • the transaction request completes the transaction, and stores the transaction-related data corresponding to the transaction in the blockchain, wherein the transaction-related data includes user information, behavior information, transaction information, and contract information; the supervision
  • the party decrypts the encrypted
  • FIG. 1 is a schematic diagram of the first embodiment of the blockchain-based data supervision method of the present application
  • FIG. 2 is a schematic diagram of a second embodiment of the blockchain-based data supervision method of the present application.
  • FIG. 3 is a schematic diagram of a third embodiment of the blockchain-based data supervision method of the present application.
  • FIG. 4 is a schematic diagram of the fourth embodiment of the blockchain-based data supervision method of the present application.
  • FIG. 5 is a schematic diagram of the fifth embodiment of the blockchain-based data supervision method of the present application.
  • FIG. 6 is a schematic diagram of the first embodiment of the blockchain-based data monitoring device of the present application.
  • FIG. 7 is a schematic diagram of a second embodiment of the blockchain-based data monitoring device of the present application.
  • FIG. 8 is a schematic diagram of an embodiment of the blockchain-based data monitoring device of the present application.
  • the embodiments of the present application provide a blockchain-based data supervision method, device, device, and storage medium.
  • a preset encryption key pair is first obtained, and the encryption key pair is synchronized to the preset The supervisor; encrypts the transaction information of the target customer on the blockchain transaction network through the encrypted private key to generate encrypted transaction data; encrypts the encrypted public key through the preset recipient's public key to generate the recipient's encrypted public key; based on The transaction body composed of the encrypted transaction data and the recipient's encrypted public key initiates a transaction request on the blockchain; completes the transaction according to the transaction request, and stores the transaction data in the blockchain; the supervisor decrypts the encrypted transaction data according to the encrypted public key Obtain transaction information and display the transaction information.
  • Using the decentralized nature of the blockchain solves the technical problem of inefficient data supervision.
  • the first embodiment of the blockchain-based data supervision method in the embodiment of the present application includes:
  • the key used for encryption is the SHA256 key.
  • SHA-256 is a one-way hash algorithm that converts the plaintext to be transmitted into a message digest through a Hash function operation. Different plaintexts correspond to different message digests. After the message digest is encrypted, it is sent to the recipient together with the plaintext. , the receiver generates a new message digest from the received plaintext and decrypts and compares it with the sender's sent message digest. If the comparison results are consistent, the plaintext has not been altered. If they are inconsistent, the plaintext has been tampered with. There is a one-to-one correspondence between plaintext and ciphertext. When decrypting, the ciphertext can be decrypted by using the same key as the encryption key and the corresponding decryption method above to obtain the decryption key.
  • the encryption key in this embodiment is stored in the encryption device, and the corresponding decryption key is also stored in the encryption device. After scanning the QR code of the encryption key, use the same key as the encryption key and the SHA-256 decryption method. The ciphertext can be decrypted, and the decryption key corresponding to the encryption key can be obtained.
  • Encrypt the transaction information of the target customer on the blockchain transaction network by encrypting the private key to generate encrypted transaction data;
  • the content in the transaction request can be preprocessed by means of public and private key encryption, that is, the transaction request has a certain format .
  • the transaction request includes the transaction header, transaction content and key group; for the transaction header, it includes the transaction type information of this transaction; for the transaction content, it includes the specific transaction details and transaction details of this transaction. Data, this part of the content may involve commercial privacy, so this part of the content is encrypted, and the key group includes encryption keys involved in encryption.
  • the encryption idea combining symmetric encryption and asymmetric encryption is adopted, and the transaction content is encrypted in multiple layers.
  • symmetric encryption means that both parties sending and receiving data use the same key (symmetric key) to encrypt and decrypt the plaintext.
  • the encryption and decryption speed is fast, and it is suitable for processing large amounts of data.
  • Decryption uses the same symmetric key, so it is difficult to manage the symmetric key.
  • Asymmetric encryption requires two keys: a public key (public key) and a private key (private key). The public key is disclosed to other parties, and the private key is kept by itself; the public key and private key are a pair.
  • the encryption and decryption speed is not symmetrical The speed of encryption and decryption is fast, but due to the different keys used for encryption and decryption, its security is better than that of symmetric encryption.
  • the transaction content part will be encrypted by using a symmetric encryption method, and the key used for encryption is called the transaction symmetric key;
  • Transaction parties can use the transaction symmetric key for decryption, and the transaction symmetric key needs to be sent at the same time when sending a transaction request.
  • the transaction symmetric key may also be leaked during the transmission process, it is also necessary to encrypt the transaction symmetric key; due to the small amount of data corresponding to the transaction symmetric key, based on the dual considerations of security and encryption efficiency,
  • the encryption of the transaction symmetric key will be carried out by asymmetric encryption, that is, the public key in the asymmetric key group is used for encryption, and the private key corresponding to this public key must only exist in the transaction related parties, so as to ensure that other The content encrypted by the public key cannot be decrypted by the three parties, thus improving the security.
  • the encryption public key used to encrypt the symmetric key of the transaction is the real public key of the transaction related party, and the corresponding transaction related party used for decryption
  • the real private key exists only at the parties involved in the transaction, thus ensuring the security of encrypted data.
  • the transaction request can be received by all nodes in the blockchain, but because the transaction request adopts a multi-layer encryption method, the key to decrypt the transaction content and the real private key of the transaction parties are only the transaction. The relevant parties own it, so even if other nodes receive the anonymous handshake request, they cannot decrypt and read the transaction content, effectively protecting commercial privacy.
  • other encryption algorithms can also be used to encrypt transaction requests according to specific usage conditions.
  • Encrypt the encryption public key by presetting the recipient's public key to generate the recipient's encryption public key
  • the encryption key may be preset and notified to the supervisor synchronously. These key pairs can also be obtained by applying from the CA center, and the supervisor can apply to the CA center to learn the key pair by virtue of his supervisory identity.
  • the transaction information is divided into transaction business data and transaction content data, for example, the transaction business data is "A transfers to B", and the transaction content data is "transfer amount 100".
  • the transaction initiator A obtains the preset encryption key pair for this transaction, or applies for the encryption key pair for this transaction from the CA center.
  • Transaction initiator A uses the encrypted private key in the applied encryption key pair to encrypt the transaction content data of this transaction to generate encrypted transaction content data, for example, encrypt the plaintext data 100 to generate encrypted transaction content data, and A transaction body is formed, and the transaction body includes transaction business data and encrypted transaction content data.
  • the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by using the recipient public key of the transaction recipient B to generate the recipient encryption public key.
  • the encryption public key in the encryption key pair applied by the transaction initiator A from the CA center is encrypted by using the first public key of the first informed party node to generate the first encryption public key.
  • the new transaction body includes transaction service data, encrypted transaction content data, the recipient's encryption public key and the first encryption public key.
  • Transaction initiator A uses a hash algorithm for the entire transaction body to calculate the corresponding hash value, and uses the signature private key applied from the CA center to encrypt the hash value calculated by the entire transaction body to obtain the encrypted hash value, and then encrypts the encrypted hash value. If the value is added to the transaction body, the final formed transaction body includes five parts, namely transaction business data, encrypted transaction content data, recipient encryption public key, first encryption public key and encrypted hash value.
  • forming the encrypted transaction data and the recipient's encrypted public key into a transaction body includes:
  • the transaction body is composed of transaction business data, encrypted transaction content data, and the recipient's encrypted public key.
  • the blockchain also includes preset third-party informed party nodes (including nodes that can fully or partially know this transaction) in addition to the two parties to the transaction.
  • the encrypted public key of the party constitutes the transaction body.
  • this embodiment also includes a step of signature authentication.
  • a preset signature key pair is obtained; the corresponding hash value is calculated for the entire transaction body using a hash algorithm, and the signature key is used to calculate the corresponding hash value.
  • the signature private key in the pair encrypts the hash value calculated by the entire transaction body to obtain an encrypted hash value, and adds the encrypted hash value to the transaction body.
  • the transaction recipient After the transaction recipient receives the transaction body on the blockchain, it first performs signature authentication, such as decrypting the encrypted hash value received by the transaction recipient by using the signature public key in the signature key pair to obtain Decrypted hash value; use the hash algorithm to calculate the corresponding hash value for the transaction body received by the transaction recipient, and compare the calculated hash value with the decrypted hash value; if the calculated hash value If the hash value is the same as the decrypted hash value, the transaction between the transaction receiver and the transaction initiator is completed based on the transaction body; if the calculated hash value is different from the decrypted hash value, the transaction process ends.
  • signature authentication such as decrypting the encrypted hash value received by the transaction recipient by using the signature public key in the signature key pair to obtain Decrypted hash value
  • use the hash algorithm to calculate the corresponding hash value for the transaction body received by the transaction recipient, and compare the calculated hash value with the decrypted hash value; if the calculated has
  • the initiated transaction is completed according to the transaction request, and all data information related to this transaction is stored in the blockchain.
  • the blockchain is also called a data structure, which is a term in the field of information technology. In essence, it is a shared database, and the data or information stored in it has the characteristics of "unforgeable”, “full traces”, “traceable”, “open and transparent” and “collective maintenance”. Based on these characteristics, blockchain technology has laid a solid "trust” foundation, created a reliable “cooperation” mechanism, and has broad application prospects. At the same time, blockchain is a new application mode of computer technology such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain (Blockchain) is an important concept of Bitcoin. It is essentially a decentralized database.
  • the data block contains the information of a batch of Bitcoin network transactions, which is used to verify the validity of its information (anti-counterfeiting) and generate the next block.
  • a feature of the blockchain is that information is difficult to modify, so the encrypted transaction data is stored in all blockchain nodes to ensure that the transaction data is not modified (such as malicious modification caused by hacker attacks).
  • the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information.
  • the encrypted private key in the preset encryption key pair is used to encrypt the transaction information determined by the transaction initiator on the blockchain to generate encrypted transaction data; encrypt the encryption public key in the encryption key pair to generate the recipient encryption public key; form a transaction body with the encrypted transaction data and the recipient encryption public key; based on the transaction body in the area Transactions are initiated on the blockchain.
  • the transaction recipient on the blockchain can use the preset recipient's private key to The receiver's encryption public key is decrypted to obtain the encryption public key in the encryption key pair, and the encrypted transaction data is decrypted using the decrypted encryption public key to obtain the determined transaction information, and the transaction is completed with the transaction initiator. Since there is only the recipient's encryption public key in the transaction body, other nodes on the blockchain cannot decrypt the encryption public key obtained in the encryption key pair, and cannot decrypt the encrypted transaction data, thus ensuring that Privacy of transaction data in the blockchain.
  • the supervisor can decrypt the encrypted transaction data according to the encrypted public key in the synchronized encrypted key pair to obtain the determined transaction information, and display the transaction information. It can not only ensure the privacy of transaction data, but also allow regulatory agencies to effectively supervise transactions.
  • the decrypted transaction data can be obtained by decrypting the encrypted transaction data stored in any one blockchain node; the decrypted transaction data can also be decrypted from the encrypted transaction data stored in any number of blockchain nodes. data; it can also be decrypted transaction data obtained by decrypting the encrypted transaction data stored in all blockchain nodes. If the electronic transaction data is the same as the decrypted stored transaction data in the blockchain node, the electronic transaction data can be considered to be true, otherwise it is false, thereby preventing malicious claims.
  • the comparison method includes: performing an XOR operation on the electronic transaction data and the decrypted transaction data according to bytes to obtain repeated bytes of the electronic transaction data and the decrypted transaction data; if the number of repeated bytes If the first threshold is exceeded, that is, the similarity between the decrypted transaction data and the electronic transaction data is greater than the first threshold, it is determined that the electronic transaction data is the same as the decrypted transaction data, thereby determining that the electronic transaction data is true.
  • the second embodiment of the blockchain-based data supervision method in the embodiment of the present application includes:
  • the data related to the transaction is sent to the blockchain node.
  • the terminal that agrees with the consensus mechanism can be any terminal, preferably the computer of the company's financial product business network, or the computer of the financial product business network of other companies (that is, a blockchain constructed by multiple financial companies at the same time). ).
  • the method for establishing the blockchain may adopt any existing method for establishing the blockchain, which will not be repeated here.
  • the pre-built blockchain can be any type of blockchain, such as building a blockchain network using a consensus protocol similar to the Bitcoin blockchain. It is a web server that receives an application for web page access, preferably an insurance web server. This embodiment is described by taking an insurance web server as an example. Among them, the insurance policy is preferably a car insurance policy.
  • the pre-built blockchain network can be used as the initiator of the blockchain network by either end, for example, the web server that receives the web page access application is the initiator, and the specific process includes: creating a Blockchain class in any feasible language , create a list for storing the blockchain in the constructor; after instantiating the Blockchain, create a genesis block (the first block before the block); determine the consensus mechanism of the blockchain (such as work Amount proof mechanism, equity proof mechanism, share authorization proof mechanism and Pool verification pool); accept the terminal that agrees with the consensus mechanism as the node of the blockchain network, so as to obtain the pre-built blockchain network.
  • the consensus mechanism of the blockchain such as work Amount proof mechanism, equity proof mechanism, share authorization proof mechanism and Pool verification pool
  • the nodes (subjects that interact with each other) of the blockchain network can be any terminals that agree to the consensus mechanism, preferably the computers of each insurance business network of an insurance company are nodes. Among them, each node is connected to each other and can verify whether the data has been tampered with each other (using the hash value and the asymmetric encryption technology in the blockchain).
  • the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information.
  • Steps 203-207 in this embodiment are similar to steps 101-106 in the first embodiment, and are not repeated here.
  • the third embodiment of the blockchain-based data supervision method in the embodiment of the present application includes:
  • the data to be sent may be the transaction information of the target customer and the personal data information of the target customer.
  • the data can be, for example, the data transmitted by the source and the destination during the two-terminal handshake, or the data exchanged by the two ends during data transmission.
  • the raw data may be received by the data encryption device and may be encrypted by the data encryption device.
  • the data encryption apparatus may add random data of a specified length to the original data in order to remove the fixed features in the original data.
  • the fixed characteristics of data are often represented by strings in the data packet header. Therefore, in this embodiment, random data can be spliced in the front of the original data to remove the original data packet header.
  • the specified length of the random data may be determined in advance according to the time stamp and the above-mentioned preset redundant data.
  • the source end may also send the time stamp of the original data when sending the original data.
  • the data encryption device receives the corresponding time when receiving the original data. stamp.
  • the original data sent by the source end may not carry the corresponding time stamp, and the data encryption device may use the time when the original data is received as the time stamp corresponding to the original data.
  • the timestamp and the preset redundant data can be spliced as feature data; then, a preset hash algorithm can be used to calculate the
  • the hash value of the characteristic data for example, the preset hash algorithm may be a SHA1 (Secure Hash Algorithm, secure hash algorithm) algorithm.
  • the specified length of the random data can be determined based on the hash value. Specifically, the content of the first two bytes of the hash value can be taken, and then the first two bytes can be After dividing the content of the bytes by 256, the result is rounded up, which can be used as the specified length of the random data. It can be understood that, the specific manner of determining the specified length based on the hash value may be modified according to actual settings.
  • random data having the specified length can be generated.
  • random data with a specified length can be generated through the /dev/random command.
  • new data after random data is spliced into the original data, new data can be obtained.
  • the new data may be encrypted.
  • the data encryption device may generate an encryption key for the new data.
  • the data encryption apparatus can identify the length L of the new data, and can calculate a length hash value corresponding to the length L of the new data by using a preset hash algorithm.
  • the preset hash algorithm may be the SHA512 algorithm, and the above-mentioned length hash value can be obtained by calculation through SHA512(L).
  • the data encryption apparatus may splicing the length hash value and the preset redundant data into target data, and calculate the hash value of the target data through the preset hash algorithm.
  • SHA512(SHA512(L)+salt) salt may indicate the preset redundant data
  • salt may indicate that SHA512(L) is spliced with the preset redundant data
  • SHA512(*) represents the default hash algorithm.
  • the hash value of the target data can be used as the encryption key of the new data.
  • the new data and the encryption key may be XORed to complete the encryption process of the new data.
  • the data after XOR operation can be used as encrypted data.
  • the encrypted data can be sent to the data decryption device by the data encryption device through a pre-established secure channel.
  • the data encryption device may also add a timestamp used in the process of calculating the specified length to the encrypted data. .
  • the data decryption device can calculate the specified length in the same way based on the preset redundant data and the time stamp identified from the encrypted data. . Subsequently, the data decryption apparatus can remove the content of the specified length from the decrypted data, thereby restoring the original data.
  • the method of adding a timestamp to the encrypted data may include directly adding a timestamp of a preset length to a fixed position of the encrypted data, wherein the preset length and the fixed position are mutually negotiated by the encryption and decryption devices, or Initially set. For example, adding a timestamp to the beginning, end, or middle of encrypted data.
  • the decryption device receives the data sent from the encryption device, it can intercept the timestamp from the received data based on the addition position and length of the timestamp, and the intercepted data needs to be encrypted. key to decrypt the data. In this way, when the data in the transmission process is illegally hijacked, it will also increase the difficulty of the data being cracked.
  • Encrypt the transaction information of the target customer on the blockchain transaction network by encrypting the private key to generate encrypted transaction data;
  • Encrypt the encryption public key by presetting the recipient's public key to generate the recipient's encryption public key
  • the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information.
  • Steps 301, 306-310 in this embodiment are similar to steps 101-106 in the first embodiment, and details are not repeated here.
  • the fourth embodiment of the blockchain-based data supervision method in the embodiment of the present application includes:
  • the blockchain technology has the characteristics of decentralization, information cannot be tampered with, etc., and the use of the blockchain technology can realize transaction events involving multiple parties.
  • some transactions require supervisory parties to participate and supervise the transaction; however, in the transaction process, in order to protect the privacy of transaction-related parties (or participants), the identity of the trader and transaction data are usually It will be encrypted (for example, anonymously protected by zero-knowledge proof); in this case, non-transaction related parties can see the transaction, but do not know the real identity of the transaction and the specific transaction content; at this time, if the transaction is initiated If the party does not invite the supervisor to join the transaction process, the supervisor cannot normally perform the supervisory function in the blockchain platform, which will adversely affect the orderliness and stability of the blockchain transaction platform.
  • a smart contract is preset in the blockchain trading platform, and a smart contract can be understood as a collection of codes and data, which is stored in the nodes of the blockchain platform; the smart contract can be automatically driven by time or events. Perform some functions, such as the ability to transfer information between each other, modify the state of the blockchain (account information, etc.), and Turing complete calculations (everything that can be done with a Turing machine, in layman’s terms, a general programming language can do all things).
  • each transaction executed by the blockchain platform will call a smart contract to execute the transaction; among them, the smart contract is set with relevant transaction supervision events, when the platform in the blockchain receives a certain user (which can be called When the transaction request is sent by the transaction initiator), the smart contract will be automatically invoked, and the transaction request will be parsed and identified, the transaction type of the transaction corresponding to the transaction request will be determined, and the transaction that the transaction initiator wants to conduct will be determined. Introduce regulators to supervise.
  • the transaction request will be parsed to determine whether the supervisory party has been regarded as one of the transaction related parties in the transaction in the transaction request. If the transaction related party in the transaction request includes the supervisory party, it means that the transaction initiator has also issued a transaction invitation to the supervisory party while initiating the transaction at this time, so as to introduce the supervisory party into this transaction.
  • the judgment on whether the transaction related parties include the supervisory party may be obtained by analyzing the encryption algorithm. Specifically, since the supervisor is a credible and knowable existence in the blockchain platform, the supervisor's public key of supervision needs to be pre-announced in the blockchain platform.
  • the transaction initiator sends a transaction request
  • the supervisor can add the supervisor as a "special" transaction related party in the transaction request (the supervisor mainly plays a supervisory function); in other words, Among the transaction symmetric keys used for encrypted transaction content, one transaction symmetric key is encrypted with the supervision public key of the supervisor; so that the supervisor can decrypt the transaction symmetric key through its own supervision private key, and use the decryption
  • the symmetric key of the subsequent transaction obtains the transaction content, thereby supervising the transaction process.
  • the transaction related parties in the transaction request when judging whether the transaction related parties in the transaction request include the supervisory party, it is to determine whether there is a transaction symmetric key encrypted by the real public key of the supervised party in the transaction request (if the transaction request If there are multiple encrypted transaction symmetric keys in the transaction request, then judge whether at least one of them is encrypted by the real public key of the supervised party); if there is a transaction symmetric key encrypted by the real public key of the supervised party in the transaction request, then It means that the transaction related party in the transaction request includes the supervisory party; if there is a transaction symmetric key encrypted by the real public key of the supervised party in the transaction request, it means that the transaction related party in the transaction request does not include the supervisory party.
  • transaction related parties in the transaction request include the supervisory party, send the transaction request in the blockchain network for the transaction related parties to confirm the transaction request;
  • the transaction related party in the transaction request includes the supervisory party
  • the transaction initiator also sends a transaction invitation to the supervisory party while initiating the transaction, so as to introduce the supervisory party into the transaction process.
  • this transaction request meets the preliminary regulatory requirements, and then the transaction request can be broadcast on the blockchain platform for the relevant parties in the transaction request ( (including the supervisory party) can obtain the transaction request, and check and confirm the content.
  • the regulator joins the transaction as a related party, it can decrypt the transaction symmetric key with its own supervision private key, and use the decrypted transaction symmetric key to obtain the transaction content.
  • the supervisor can check the transaction according to the supervision strategy, and automatically approve the transaction that conforms to the supervision strategy; automatically reject the transaction that does not conform to the transaction supervision strategy; Push it to the relevant personnel, and ask the supervisor to make a manual secondary judgment.
  • the transaction related parties in the transaction request do not include the supervisory party, it means that the transaction initiator does not send a transaction invitation to the supervisory party when initiating the transaction.
  • the transaction initiator did not invite the supervisor to participate in the transaction according to the regulations in the smart contract when initiating the transaction, it can be considered that the transaction request is not credible; at this time, the transaction request will not be stored in the blockchain.
  • the platform broadcasts, but directly rejects (rejects) the transaction request.
  • a preset smart contract is invoked, and based on the preset smart contract, it is determined whether the transaction corresponding to the transaction request needs to be introduced into a supervisory party; If the transaction needs to introduce a supervisory party, the transaction request is parsed to determine whether the transaction related parties in the transaction request include the supervisory party; if the transaction related parties in the transaction request include the supervisory party party, broadcast the transaction request in the blockchain platform for the transaction related party to confirm the transaction request; if the transaction related party in the transaction request does not include the supervisory party, reject the transaction request. the transaction request.
  • the transaction initiator when the transaction initiator sends a transaction request, it is determined through the smart contract whether the transaction needs to introduce a supervisory party.
  • the transaction request is broadcast to the blockchain platform; thus, the control of the transaction request in the blockchain transaction is realized, which is beneficial for the monitoring party to normally realize its supervision function in the blockchain transaction and effectively guarantee the block chain.
  • the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information.
  • Steps 401 - 404 and 409 - 411 in this embodiment are similar to steps 101 - 106 in the first embodiment, and are not repeated here.
  • the fifth embodiment of the blockchain-based data supervision method in the embodiment of the present application includes:
  • the execution body of this application may be a node in the supervision blockchain.
  • the transaction data may include customer personal data, transaction information of both parties to the transaction, transaction status, transaction time and other parameters
  • the blockchain supervisor includes transaction individuals, financial institutions, and the like.
  • the above regulators create a blockchain for transaction supervision. After the transaction is completed, the customer sends the transaction-related data to the blockchain node corresponding to the blockchain, so that the corresponding blockchain node receives the transaction record data and writes the received data into the blockchain;
  • the regulated financial institution can send the transaction information and other parameters of the two parties to the blockchain node based on the actual transaction progress and the regulatory agreement signed by the two parties after signing the regulatory agreement, so that the blockchain node will receive the data. written into the blockchain.
  • a smart contract running in the blockchain system can be constructed according to the supervision protocol in the transaction data. Building a smart contract can also be called deploying a smart contract. The process of constructing a smart contract It is to initialize the transaction data according to the transaction needs.
  • the contract name of the smart contract When building a smart contract, the contract name of the smart contract will be generated. It is understandable that the contract name is also set according to the specific transaction needs. Since the contract name is set according to the specific transaction needs, the contract name contains a description of the transaction purpose of the smart contract. Of course, when describing the transaction purpose of the contract name, try to use a unified format, and then extract the regulatory agreement in the transaction data as a function of the smart contract, and use other data in the transaction data, such as capital information, transaction time, and transaction product type. As the data of the smart contract, use solc to compile it to form a smart contract.
  • the regulatory agreement in the transaction data is used as a function of the smart contract, so the smart contract is set with the judgment condition of the transaction status.
  • Conversion can be used as a function of smart contracts.
  • the smart contract is divided into project formation, project release, and verification and execution in the entire cycle.
  • the smart contract is composed of multiple chapters, and its execution is also executed in paragraphs.
  • the supervisor decrypts the encrypted transaction data according to the encryption public key to obtain transaction information, and displays the transaction information;
  • the decrypted transaction data can be obtained by decrypting the encrypted transaction data stored in any one blockchain node; the decrypted transaction data can also be decrypted from the encrypted transaction data stored in any number of blockchain nodes. data; it can also be decrypted transaction data obtained by decrypting the encrypted transaction data stored in all blockchain nodes.
  • the comparison method includes: performing an XOR operation on the transaction data and the decrypted transaction data according to bytes to obtain the repeated bytes of the transaction data and the decrypted transaction data; A threshold, that is, the similarity between the decrypted transaction data and the transaction data is greater than a first threshold, then it is determined that the transaction data is the same as the decrypted transaction data, so that the transaction data is determined to be true. For example, in insurance fraud there is the possibility of forged policies.
  • This embodiment ensures the authenticity of the insurance policy by utilizing the characteristics of the information of the blockchain that are difficult to be tampered with. If the electronic policy is the same as the decrypted stored policy in the blockchain node, the electronic policy can be considered to be true, otherwise it is false, thereby preventing malicious claims.
  • Steps 501 - 505 and 508 in this embodiment are similar to steps 101 - 105 and 106 in the first embodiment, and will not be repeated here.
  • a first embodiment of a data monitoring device includes:
  • the first obtaining module 601 is configured to obtain a preset encryption key pair and synchronize the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key ;
  • An encryption module 602 configured to encrypt the transaction information of the target customer on the blockchain transaction network through the encrypted private key, and generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target customer;
  • a generating module 603, configured to encrypt the encryption public key by using a preset recipient public key, and generate the recipient encryption public key;
  • an initiating module 604 configured to form a transaction body with the encrypted transaction data and the recipient's encrypted public key, and initiate a transaction request on the blockchain based on the transaction body;
  • a storage module 605 configured to complete the transaction according to the transaction request, and store transaction-related data corresponding to the transaction to the blockchain, wherein the transaction-related data includes user information, behavior information, and transaction information , contract information;
  • the decryption module 606 is used for the supervisory party to decrypt the encrypted transaction data according to the encryption public key to obtain transaction information, and to display the transaction information.
  • the block chain-based data monitoring device specifically includes:
  • the first obtaining module 601 is configured to obtain a preset encryption key pair and synchronize the encryption key pair to a preset supervisor, wherein the encryption key pair carries an encryption private key and an encryption public key ;
  • An encryption module 602 configured to encrypt the transaction information of the target customer on the blockchain transaction network through the encrypted private key, and generate encrypted transaction data, wherein the encrypted transaction data carries the privacy information of the target customer;
  • a generating module 603, configured to encrypt the encryption public key by using a preset recipient public key to generate the recipient encryption public key
  • an initiating module 604 configured to form a transaction body with the encrypted transaction data and the recipient's encrypted public key, and initiate a transaction request on the blockchain based on the transaction body;
  • a storage module 605 configured to complete the transaction according to the transaction request, and store transaction-related data corresponding to the transaction to the blockchain, wherein the transaction-related data includes user information, behavior information, and transaction information , contract information;
  • the decryption module 606 is used for the supervisory party to decrypt the encrypted transaction data according to the encryption public key to obtain transaction information, and to display the transaction information.
  • the blockchain-based data monitoring device further includes:
  • the building module 607 is used to establish the genesis block and determine the consensus mechanism of the blockchain, and use the terminal that agrees with the consensus mechanism as a blockchain node to build a blockchain transaction network.
  • the encryption module 602 includes:
  • the receiving unit 6021 is used to receive the transaction information of the target customer on the blockchain transaction network to be transmitted;
  • a generating unit 6022 configured to generate random data of a specified length, and add the generated random data to the transaction information to form new data; based on the length of the new data and the preset redundant data, generating an encryption key for the new data;
  • An encryption unit 6023 configured to encrypt the new data by using the encryption key.
  • the blockchain-based data monitoring device further includes:
  • the judgment module 608 is configured to call a preset smart contract when receiving a transaction request sent by the target client in a preset format, and determine whether the transaction corresponding to the transaction request needs to be introduced into a supervisor based on the preset smart contract;
  • a parsing module 609 configured to parse the transaction request when a supervisory party needs to be introduced into the transaction, and determine whether the supervisory party is included in the transaction-related parties in the transaction request;
  • a confirmation module 610 configured to send the transaction request in the blockchain network when the transaction related party in the transaction request includes the supervisory party, so that the transaction related party can confirm the transaction request;
  • the rejecting module 611 is configured to reject the transaction request when the transaction related parties in the transaction request do not include the supervisory party.
  • the blockchain-based data monitoring device further includes:
  • the second acquisition module 612 is used to acquire transaction data sent by each supervisory party to the blockchain
  • the construction module 613 is configured to construct a smart contract running in the blockchain according to the supervision agreement in the transaction data, wherein the smart contract includes the judgment condition of the transaction status.
  • the blockchain-based data monitoring device further includes:
  • a receiving module 614 configured to receive transaction data and a request for authenticity judgment of the transaction data
  • a comparison module 615 is configured to compare the transaction data with the decrypted transaction data obtained by decrypting the encrypted transaction data stored in the blockchain node; If the similarity of the transaction data is greater than the first threshold, it is determined that the transaction data is true.
  • FIGS 6 and 7 above describe in detail the blockchain-based data monitoring device in the embodiment of the present application from the perspective of modular functional entities.
  • the following describes the blockchain-based data monitoring device in the embodiment of the present application from the perspective of hardware processing. Describe in detail.
  • FIG. 8 is a schematic structural diagram of a blockchain-based data monitoring device provided by an embodiment of the present application.
  • the blockchain-based data monitoring device 800 may vary greatly due to different configurations or performances, and may include one or more One or more central processing units (CPUs) 810 (eg, one or more processors) and memory 820, one or more storage media 830 (eg, one or more mass storage devices) that store applications 833 or data 832 ).
  • the memory 820 and the storage medium 830 may be short-term storage or persistent storage.
  • the program stored in the storage medium 830 may include one or more modules (not shown in the figure), and each module may include a series of instruction operations in the blockchain-based data monitoring device 800 .
  • the processor 810 may be configured to communicate with the storage medium 830, and execute a series of instruction operations in the storage medium 830 on the blockchain-based data monitoring device 800, so as to implement the block-based method provided by the above method embodiments. Steps of the chain's data governance approach.
  • the blockchain-based data curation device 800 may also include one or more power supplies 840 , one or more wired or wireless network interfaces 850 , one or more input and output interfaces 860 , and/or, one or more operating systems 831 , such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc.
  • operating systems 831 such as Windows Server, Mac OS X, Unix, Linux, FreeBSD, etc.
  • FIG. 8 does not constitute a limitation on the blockchain-based data monitoring device provided in the present application, and may include more or less than shown in the figure. components, or a combination of certain components, or a different arrangement of components.
  • the present application also provides a computer-readable storage medium.
  • the computer-readable storage medium may be a non-volatile computer-readable storage medium.
  • the computer-readable storage medium may also be a volatile computer-readable storage medium. Instructions are stored in the computer-readable storage medium, and when the instructions are executed on the computer, make the computer perform the steps of the above-mentioned blockchain-based data supervision method.
  • the blockchain referred to in this application is a new application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, and encryption algorithm.
  • Blockchain essentially a decentralized database, is a series of data blocks associated with cryptographic methods. Each data block contains a batch of network transaction information to verify its Validity of information (anti-counterfeiting) and generation of the next block.
  • the blockchain can include the underlying platform of the blockchain, the platform product service layer, and the application service layer.
  • the integrated unit if implemented in the form of a software functional unit and sold or used as an independent product, may be stored in a computer-readable storage medium.
  • the technical solutions of the present application can be embodied in the form of software products in essence, or the parts that contribute to the prior art, or all or part of the technical solutions, and the computer software products are stored in a storage medium , including several instructions for causing a computer device (which may be a personal computer, a server, or a network device, etc.) to execute all or part of the steps of the methods described in the various embodiments of the present application.
  • the aforementioned storage medium includes: U disk, mobile hard disk, read-only memory (ROM), random access memory (RAM), magnetic disk or optical disk and other media that can store program codes .

Abstract

本申请涉及大数据领域和区块链技术领域,公开了一种基于区块链的数据监管方法、装置、设备及存储介质。该方法包括:获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行监管。利用区块链的去中心化的特性,解决了数据监管效率低下的技术问题,提高数据监管效率,保证交易数据的准确性。

Description

基于区块链的数据监管方法、装置、设备及存储介质
本申请要求于2020年12月15日提交中国专利局、申请号为202011472818.5、发明名称为“基于区块链的数据监管方法、装置、设备及存储介质”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请涉及大数据技术领域和区块链技术领域,尤其涉及一种基于区块链的数据监管方法、装置、设备及存储介质。
背景技术
近年来,随着信息产业的高速发展和移动互联网的普及,目前的交易平台都是中心化的例如淘宝、链家、美团等。当客户发生交易时交易平台会记录客户的交易信息包括银行账户信息、身份信息、住址信息等,这些信息都是客户隐私数据,十分重要。庞大用户群的个人信交易信息都处于交易平台的实际控制下,容易成为黑客攻击的目标。此外,这些中心化的交易平台中携带的信息存在丢失、被串改、被泄露等风险。如果交易发生争执,则没有完全公平公正的平台可以提供交易信息作为裁判的依据。
发明人意识到,随着比特币的成功应用,区块链技术越来越受到很多行业、企业的青睐。金融+互联网的兴起给保险行业带来了新的机遇与挑战,许多金融公司也纷纷开始试点将区块链技术应用于解决金融信用问题上。但是,目前在交易数据处理方法中,并不存在有效利用区块链技术的方案。因此,需要一个基于加密系统的去中心化的在线交易平台来解决问题。
发明内容
本申请的主要目的是解决无法根据不同的对接渠道的核算方式进行不同的处理,基于区块链的数据监管效率低下的技术问题。
本申请第一方面提供了一种基于区块链的数据监管方法,包括:获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本申请第二方面提供了一种基于区块链的数据监管装置,包括:第一获取模块,用于获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;加密模块,用于通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;生成模块,用于通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;发起模块,用于将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;存储模块,用 于根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;解密模块,用于所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本申请第三方面提供了一种基于区块链的数据监管设备,包括:存储器和至少一个处理器,所述存储器中存储有指令,所述存储器和所述至少一个处理器通过线路互连;所述至少一个处理器调用所述存储器中的所述指令,以使得所述基于区块链的数据监管设备执行下述的基于区块链的数据监管方法的步骤:获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本申请的第四方面提供了一种计算机可读存储介质,所述计算机可读存储介质中存储有指令,当其在计算机上运行时,使得计算机执行如下所述的基于区块链的数据监管方法的步骤:获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本申请提供的技术方案中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
附图说明
图1为本申请基于区块链的数据监管方法的第一个实施例示意图;
图2为本申请基于区块链的数据监管方法的第二个实施例示意图;
图3为本申请基于区块链的数据监管方法的第三个实施例示意图;
图4为本申请基于区块链的数据监管方法的第四个实施例示意图;
图5为本申请基于区块链的数据监管方法的第五个实施例示意图;
图6为本申请基于区块链的数据监管装置的第一个实施例示意图;
图7为本申请基于区块链的数据监管装置的第二个实施例示意图;
图8为本申请基于区块链的数据监管设备的一个实施例示意图。
具体实施方式
本申请实施例提供了一种基于区块链的数据监管方法、装置、设备及存储介质,本申请的技术方案中,首先获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
本申请的说明书和权利要求书及上述附图中的术语“第一”、“第二”、“第三”、“第四”等(如果存在)是用于区别类似的对象,而不必用于描述特定的顺序或先后次序。应该理解这样使用的数据在适当情况下可以互换,以便这里描述的实施例能够以除了在这里图示或描述的内容以外的顺序实施。此外,术语“包括”或“具有”及其任何变形,意图在于覆盖不排他的包含,例如,包含了一系列步骤或单元的过程、方法、系统、产品或设备不必限于清楚地列出的那些步骤或单元,而是可包括没有清楚地列出的或对于这些过程、方法、产品或设备固有的其它步骤或单元。
为便于理解,下面对本申请实施例的具体流程进行描述,请参阅图1,本申请实施例中基于区块链的数据监管方法的第一个实施例包括:
101、获取预置加密密钥对,并将加密密钥对同步至预设的监管方,其中,加密密钥对中携带有加密私钥和加密公钥;
本实施例中,加密所用的密钥为SHA256密钥。SHA-256是一种单向散列算法,将要传送的明文通过一种Hash函数运算转换成报文摘要,不同的明文对应不同的报文摘要,报文摘要加密后与明文一起传送给接受方,接受方将接受的明文产生新的报文摘要与发送方的发来报文摘要解密比较,比较结果一致表示明文未被改动,如果不一致表示明文已被篡改。明文和密文是一一对应的关系,解密时,使用和加密密钥相同的密钥和上述对应的解密方法就可以对密文进行解密,得到解密密钥。
本实施例的加密密钥存储于加密设备中,对应的解密密钥也存储于加密设备中,扫描加密密钥的二维码后,使用和加密密钥相同的密钥和SHA-256解密方法就可以对密文进行解密,可获得加密密钥相对应的解密密钥。
102、通过加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;
本实施例中,为了保证区块链交易的私密性和交易者的隐秘性;对于该交易请求中的内容,可以是采用公私钥加密的方式进行预处理的,即该交易请求是具有一定格式。具体的,该交易请求中,包括了交易头、交易内容和密钥组;对于交易头,即包括了本次交易的交易类型信息;对于交易内容,包括了本次交易的具体交易细节和交易数据,这部分内容可能会涉及到商业隐私,因此对于这部分内容是经过加密的,而密钥组则包括加密所涉及到加密密钥。本实施例中对于交易内容的加密,采用了对称加密和非对称加密相结合的加密思想,对交易内容进行了多层加密。
本实施例中,其中对称加密是指发送和接收数据的双方使用相同的密钥(对称密钥)对明文进行加密和解密,其加解密速度快,适合对大量数据进行处理,但正由于加解密使用同一对称密钥,因此对于对称密钥的管理较为困难。而非对称加密则需要两个密钥:公开密钥(公钥)和私有密钥(私钥),公钥向其它方公开,私钥则自己保存;公钥与私钥是一对,如果用公钥对数据进行加密,只有用对应的私钥才能解密;如果用私钥对数据进行加密,那么只有用对应的公钥才能解密;由于非对称加密的算法复杂,使得加密解密速度没有对称加密解密的速度快,但由于加解密用的密钥不同,因此其安全性 优于对称加密。本实施例中,考虑到交易内容中的数据量较大,为了保证加解密的速度,交易内容部分将采用对称加密的方法进行加密,用于加密的密钥称为交易对称密钥;同时为了交易相关方能使用交易对称密钥进行解密,在发送交易请求时需将交易对称密钥同时发送。又考虑到交易对称密钥也有可能在传输过程中泄露,因此还需要对交易对称密钥进行加密;由于交易对称密钥对应的数据量较小,基于安全性和加密效率的双层考虑,对交易对称密钥的加密将采用非对称加密的方式进行,即采用非对称密钥组中的公钥进行加密,而这个公钥对应的私钥必须只存在于交易相关方,这样才能保证其它第三方无法对公钥加密的内容进行解密,从而提高了安全性,因此用于加密交易对称密钥所使用的加密公钥是交易相关方的真实公钥,而对应的用于解密的交易相关方的真实私钥仅存在于交易相关方处,从而保证了加密数据的安全性。虽然由于区块链的特性,交易请求可被区块链中的所有节点接收到,但是因为交易请求采用了多层加密的方法,其解密交易内容的关键、交易相关方的真实私钥只有交易相关方自己拥有,因此即使其它节点接收到了匿名握手请求,也无法对其解密和读取其交易内容,有效保护了商业隐私。当然,除了上述双层加密方式外,还可以根据具体使用情况采用其它的加密算法对交易请求进行加密。
103、通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;
本实施例中,加密密钥可以是预先设定好,且同步通知给监管方。这些密钥对也可以是从CA中心申请获得,监管方可凭自身的监管身份去CA中心申请获知密钥对。将交易信息划分为交易业务数据和交易内容数据,例如,交易业务数据为“A转账给B”,交易内容数据为“转账金额100”。交易发起方A获取预先设定好的本次交易的加密密钥对,或从CA中心申请获得本次交易的加密密钥对。交易发起方A利用申请到的加密密钥对中的加密私钥对本次交易的交易内容数据进行加密,生成加密交易内容数据,例如,对明文数据100进行加密,生成加密交易内容数据,并组成交易体,该交易体中包括交易业务数据和加密交易内容数据。
进一步地,利用交易接收方B自身的接收方公钥对交易发起方A从CA中心申请到的加密密钥对中的加密公钥进行加密,生成接收方加密公钥。利用第一知情方节点的第一公钥对交易发起方A从CA中心申请到的加密密钥对中的加密公钥进行加密,生成第一加密公钥。将接收方加密公钥、第一加密公钥添加至交易体中,则新的交易体包括交易业务数据、加密交易内容数据、接收方加密公钥和第一加密公钥。
交易发起方A对整个交易体使用散列算法,算出对应的hash值,利用从CA中心申请的签名私钥对整个交易体运算出的hash值进行加密,得到加密hash值,并将该加密hash值添加至交易体中,则最终形成的交易体包括五部分,分别为交易业务数据、加密交易内容数据、接收方加密公钥、第一加密公钥和加密hash值。
104、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在所述区块链上发起交易请求;
本实施例中,所述将所述加密交易数据和所述接收方加密公钥组成交易体包括:
将交易业务数据、加密交易内容数据、接收方加密公钥组成交易体。
本实施例中所述区块链上还包括除了交易双方之外的预设第三方知情方节点(包括可完全知晓或部分知晓此次交易的节点),如可利用所述区块链上预设第三方知情方节点的知情方公钥对所述加密密钥对中的加密公钥进行加密,生成知情方加密公钥;将交易业务数据、加密交易内容数据、接收方加密公钥和知情方加密公钥组成交易体。
进一步地,本实施例中还包括签名认证的步骤,首先,获取预先设定的签名密钥对;对整个所述交易体利用散列算法算出对应的哈希值,并利用所述签名密钥对中的签名私钥对整个所述交易体算出 的哈希值进行加密,得到加密哈希值,并将该加密哈希值添加至所述交易体中。在交易接收方收到区块链上的交易体后,首先进行签名认证,如利用所述签名密钥对中的签名公钥对所述交易接收方收到的加密哈希值进行解密,得到解密的哈希值;对所述交易接收方收到的交易体利用散列算法算出对应的哈希值,将算出的哈希值与解密的哈希值进行比对;若算出的哈希值与解密的哈希值相同,则基于所述交易体完成所述交易接收方与所述交易发起方的交易;若算出的哈希值与解密的哈希值不同,则结束交易流程。
105、根据交易请求完成交易,并将交易对应的交易相关数据保存至区块链;
本实施例中,根据交易请求完成发起的交易,并将本次交易相关的所有数据信息存储至区块链。
本实施例中,区块链又叫数据结构,是一个信息技术领域的术语。从本质上讲,它是一个共享数据库,存储于其中的数据或信息,具有“不可伪造”“全程留痕”“可以追溯”“公开透明”“集体维护”等特征。基于这些特征,区块链技术奠定了坚实的“信任”基础,创造了可靠的“合作”机制,具有广阔的运用前景。同时,区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),是比特币的一个重要概念,它本质上是一个去中心化的数据库,同时作为比特币的底层技术,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次比特币网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。
本实施例中,区块链的一个特点是信息难以修改,因此将加密后的交易数据存储在所有区块链节点中,保证交易数据不被修改(例如黑客攻击造成的恶意修改)。
106、监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。
本实施例中,通过预先设定的加密密钥对中的加密私钥对区块链上交易发起方确定好的交易信息进行加密,生成加密交易数据;利用交易接收方预设的接收方公钥对所述加密密钥对中的加密公钥进行加密,生成接收方加密公钥;将所述加密交易数据和所述接收方加密公钥组成交易体;基于所述交易体在所述区块链上发起交易。由于能通过将所述加密交易数据和所述接收方加密公钥组成交易体的方式在区块链上进行交易,区块链上的交易接收方可通过预设的接收方私钥对所述接收方加密公钥进行解密得到所述加密密钥对中的加密公钥,并利用解密出的加密公钥对所述加密交易数据进行解密得到确定好的交易信息,完成与所述交易发起方的交易;由于在交易体中仅有接收方加密公钥,区块链上的其他节点无法解密获取到所述加密密钥对中的加密公钥,无法对加密交易数据进行解密,从而保证了区块链中交易数据的私密性。
同时,监管方可根据同步得到的所述加密密钥对中的加密公钥对所述加密交易数据进行解密得到确定好的交易信息,对交易信息进行展示。实现了既能保证交易数据的私密性,又能让监管机构对交易进行有效的监管。
本实施方式利用区块链的信息难改篡改的特性,保证了交易数据的真实性。其中可由任意一个区块链节点中存储的所述加密交易数据进行解密而得的解密交易数据;也可以由任意多个区块链节点中存储的所述加密交易数据进行解密而得的解密交易数据;也可以由所有区块链节点中存储的所述加密交易数据进行解密而得的解密交易数据。若电子交易数据与区域链节点中经过解密的存储的交易数据相同,则可认为所述电子交易数据是真的,否则为假,从而防止恶意的理赔要求。具体地对比方法包括:将所述电子交易数据与所述解密交易数据按照字节进行异或操作,得到所述电子交易数据与所述解密交易数据的重复字节;若所述重复字节数量超过第一阈值,即所述解密交易数据与所述电子交易数据的相似度大于第一阈值,则判定所述电子交易数据与所述解密交易数据相同,从而判断所述电子交易数据为真。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私 钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
请参阅图2,本申请实施例中基于区块链的数据监管方法的第二个实施例包括:
201、建立创世块并确定区块链的共识机制,以同意共识机制的终端作为区块链节点,建立区块链交易网络;
本实施例中,实现了将所交易相关的数据发送给所述区块链节点。其中同意所述共识机制的终端可以为任意终端,优选是本公司的金融产品营业网点的计算机,也可以是其他公司的金融产品营业网点的计算机(即多个金融公司同时构建成的区块链)。其中所述区块链的建立方法可采用现有的任意建立方法,在此不再赘述。
预先搭建的区块链可以是任意类型的区块链,例如采用类似于比特币区块链中的共识协议来构建区块链网络。接收网页访问申请的是网页服务器,优选保险网页服务器,本实施方式以保险网页服务器为例进行说明。其中,保险保单优选车险保单。其中,所述预先搭建的区块链网络,可由任一端作为区块链网络发起者,例如以接收网页访问申请的网页服务器为发起者,具体的过程包括:以任一可行语言创建一个Blockchain类,在构造函数中创建用于储存区块链的列表;将所述Blockchain实例化后,建立创世块(没有区块前的第一个区块);确定区块链的共识机制(例如工作量证明机制、权益证明机制、股份授权证明机制和Pool验证池);接收同意所述共识机制的终端作为所述区块链网络的节点,从而获得所述预先搭建的区块链网络。其中,所述区块链网络的节点(相互交互的主体)可为任意同意所述共识机制的终端,优选保险公司的各个保险营业网点的计算机为节点。其中,各节点间互相连接,可相互验证数据是否被篡改(利用哈希值与区块链中的非对称加密技术)。
202、获取预置加密密钥对,并将加密密钥对同步至预设的监管方;
203、通过加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;
204、通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;
205、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在区块链上发起交易请求;
206、根据交易请求完成交易,并将交易对应的交易相关数据存储至区块链;
207、监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。
本实施例中步骤203-207与第一实施例中的步骤101-106类似,此处不再赘述。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
请参阅图3,本申请实施例中基于区块链的数据监管方法的第三个实施例包括:
301、获取预置加密密钥对,并将加密密钥对同步至预设的监管方;
302、接收待传输的区块链交易网络上目标客户的交易信息;
本实施例中,当需要将目标客户的相关数据发送至区块链交易网络上时,该待发送的数据可以是目标客户的交易信息和目标客户的个人数据信息。所述数据例如可以是源端和目的端在进行双端握手 时传输的数据,也可以是双端在进行数据传输时交互的数据。该原始数据可以被数据加密装置接收,并可以被所述数据加密装置进行加密。
303、生成指定长度的随机数据,并将生成的随机数据添加至交易信息中,以形成新数据;
本实施例中,数据加密装置在接收到原始数据后,为了去除原始数据中的固定特征,可以在原始数据中添加指定长度的随机数据。通常而言,数据的固定特征往往是通过数据包头中的字符串来体现的,因此,在本实施方式中,可以通过将随机数据拼接在原始数据的前部,以去除原始数据的数据包头的固定特征。
在本实施方式中,可以预先根据时间戳和上述的预设冗余数据,确定该随机数据的指定长度。具体地,所述原始数据在发送时,源端可以在发送该原始数据时一并发送该原始数据时的时间戳,这样,数据加密装置在接收到该原始数据的同时,接收到对应的时间戳。此外,在实际应用中,源端发出的原始数据中,也可以不携带对应的时间戳,数据加密装置可以将接收到原始数据的时刻作为该原始数据对应的时间戳。
在本实施方式中,在获取到原始数据对应的时间戳之后,可以将所述时间戳与所述预设冗余数据拼接作为特征数据;然后,可以利用预设的散列算法,计算所述特征数据的哈希值,该预设的散列算法例如可以是SHA1(Secure Hash Algorithm,安全散列算法)算法。在计算得到该特征数据的哈希值之后,可以基于所述哈希值确定所述随机数据的指定长度,具体地,可以取该哈希值前两个字节的内容,然后用该前两个字节的内容除以256之后,将得到的结果取整,从而可以作为该随机数据的指定长度。可以理解的是,基于哈希值来确定指定长度的具体方式可根据实际设定而修改。
在本实施方式中,在确定了该指定长度之后,便可以生成具备该指定长度的随机数据。例如,在Linux系统中,可以通过/dev/random的指令生成具备指定长度的随机数据。
304、基于新数据的长度以及预设冗余数据,生成新数据的加密密钥;
本实施例中,在原始数据中拼接随机数据后,可以得到新数据。为了保证该新数据在传输过程中的安全性,可以对该新数据进行加密处理。数据加密装置可以生成针对该新数据的加密密钥。具体地,数据加密装置可以识别该新数据的长度L,并可以通过预设散列算法计算所述新数据的长度L对应的长度散列值。例如,该预设散列算法可以是SHA512算法,通过SHA512(L)便可以计算得到上述的长度散列值。然后,数据加密装置可以将所述长度散列值和所述预设冗余数据拼接为目标数据,并通过所述预设散列算法计算所述目标数据的散列值。利用公式便可以表示为:SHA512(SHA512(L)+salt)。其中,salt可以表示所述预设冗余数据,“+”可以表示将SHA512(L)与预设冗余数据进行拼接。SHA512(*)则表示该预设散列算法。最终,可以将所述目标数据的散列值作为所述新数据的加密密钥。
305、利用加密密钥对新数据进行加密;
本实施例中,在得到上述的加密密钥之后,可以将所述新数据与所述加密密钥进行异或运算,从而完成对该新数据的加密过程。异或运算后的数据便可以作为加密后的数据。该加密后的数据可以由数据加密装置通过预先建立的安全通道,发送至数据解密装置处。
在一个实施方式中,为了便于数据解密装置对加密后的数据进行解密,数据加密装置在得到加密后的数据后,还可以将计算指定长度的过程中使用的时间戳添加至加密后的数据中。这样,数据解密装置接收到携带该时间戳的加密数据后,便可以基于所述预设冗余数据以及从该加密数据中识别出的所述时间戳,按照同样的方式计算得到所述指定长度。后续,数据解密装置便可以从解密得到的数据中去除所述指定长度的内容,从而还原得到原始数据。
具体而言,在加密数据中添加时间戳的方式可以包含直接将预设长度的时间戳添加在加密数据的固定位置,其中该预设长度及固定位置是加密、解密装置相互协商好的,或者初始设置的。例如,将 时间戳添加在加密数据的前部、尾部或中间。如此一来,解密装置在接收到来自加密装置发送的数据之后,可基于时间戳的添加位置及长度,从接收到的数据中截取出时间戳,而被截取后的数据,则为需要通过密钥进行解密的数据。通过这种方式的处理,当传输过程中的数据被非法劫持后,也会增加数据被破解的难度。
306、通过加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;
307、通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;
308、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在区块链上发起交易请求;
309、根据交易请求完成交易,并将交易对应的交易相关数据存储至区块链;
310、监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。
本实施例中步骤301、306-310与第一实施例中的步骤101-106类似,此处不再赘述。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
请参阅图4,本申请实施例中基于区块链的数据监管方法的第四个实施例包括:
401、获取预置加密密钥对,并将加密密钥对同步至预设的监管方;
402、通过加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;
403、通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;
404、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在区块链上发起交易请求;
405、在接收到目标客户以预设格式发送的交易请求时,调用预设智能合约,并基于预设智能合约判断交易请求对应的交易是否需要引入监管方;
本实施例中,区块链技术具有去中心化、信息不可篡改性等特点,运用区块链技术可实现多方参与的交易事件。在区块链交易中,某些交易是需要监管方参与并对交易进行监管;但是在交易过程中,为了保护交易相关方(或称为参与方)的隐私,交易者的身份和交易数据通常会进行加密(例如采用零知识证明方式匿名保护);在这样的情况下,非交易相关方可以看到交易发生,但却不知道交易者的真实身份和具体交易内容;此时,如果交易发起方不邀请监管方加入交易过程,监管方就无法在区块链平台中正常地执行监管机能,从而对区块链交易平台的有序性和稳定性造成不利影响。
本实施例中,区块链交易平台中预先设置有智能合约,智能合约可理解为是代码和数据的集合,寄存与区块链平台的节点中;智能合约在时间或事件的驱动下能自动执行一些功能,如可以在相互之间传递信息,修改区块链的状态(账户信息等),以及图灵完备计算(可以用图灵机做到的所有事情,通俗来说就是一般编程语言可以做的所有事情)。
406、当交易需要引入监管方时,对交易请求进行解析,判断交易请求中的交易相关方中是否包括所述监管方;
本实施例中,区块链平台执行的每个交易,会调用智能合约执行交易;其中,智能合约中设置有相关的交易监管事件,当区块链中平台中接收到某个用户(可称为交易发起方)发送的交易请求时,将自动调用该智能合约,并对该交易请求进行解析和识别,确定该交易请求对应的交易的交易类型,并判断交易发起方希望进行的交易是否需要引入监管方进行监管。
本实施例中,如果交易发起方希望发起的交易需要引入监管方,则将对该交易请求进行解析,判 断该交易请求中是否已将监管方作为了该笔交易中的其中一个交易相关方。如果该交易请求中的交易相关方包括了监管方,则说明此时交易发起方在发起交易的同时,也向监管方发出了交易邀请,以将该监管方引入到本次交易中。
本实施例中,对于该交易相关方中是否包括监管方的判断,可以是通过对加密算法的分析得到的。具体的,由于监管方在区块链平台中是可信、且可知的存在,因而监管方的监管公钥需要预先公布在区块链平台中。而当交易发起方发送交易请求时,若希望引入监管方,即可在交易请求中添加入监管方作为一个“特殊的”的交易相关方(监管方主要起监管职能);换而言之,用于加密的交易内容的交易对称密钥中,有一份交易对称密钥是用监管方的监管公钥进行加密;从而使得监管方可以通过自己的监管私钥解密交易对称密钥,并用该解密后的交易对称密钥获取交易内容,从而对交易过程进行监管。基于上述原理,在判断所述交易请求中的交易相关方是否包括所述监管方时,即为判断所述交易请求中是否存在被监管方的真实公钥加密的交易对称密钥(若交易请求中有多份被加密的交易对称密钥,则判断其中是否至少有一份是被监管方的真实公钥加密);若交易请求中存在被监管方的真实公钥加密的交易对称密钥,则说明交易请求中的交易相关方包括监管方;若交易请求中存在被监管方的真实公钥加密的交易对称密钥,则说明交易请求中的交易相关方不包括监管方。
407、当交易请求中的交易相关方包括监管方时,在区块链网络中发送交易请求,以供交易相关方对交易请求进行确认;
本实施例中,如果该交易请求中的交易相关方包括了监管方,则说明交易发起方在发起交易的同时,也向监管方发出了交易邀请,以将监管方引入到交易过程中。根据智能合约的相关设定,可认为本次的交易请求是符合初步的监管要求的,则此时可将在区块链平台中广播该交易请求,以供该交易请求中的各相关方(包括监管方)都可以获取到该交易请求,并对其中的内容进行查看和确认。而对于应用了双层加密的交易请求,监管方在作为相关方加入交易后,可以通过自己的监管私钥解密交易对称密钥,并用该解密后的交易对称密钥获取交易内容,正确看到交易的实际情况;监管方可根据监管策略,针对交易进行检查,对于符合监管策略的交易,自动批准;不符合交易监管策略的交易,自动拒绝;根据监管策略无法判定的,则可预警,并推送给相关人员,请监管人员进行人工二次判断。
408、当交易请求中的交易相关方不包括监管方时,拒绝交易请求;
本实施例中,如果该交易请求中的交易相关方不包括了监管方,则说明交易发起方在发起交易的同时,没有向监管方发出交易邀请。此时,由于交易发起方在发起交易时,没有按照智能合约中的规定邀请监管方参与到交易中,因此可认为该交易请求是不可信的;此时不会将该交易请求在区块链平台中进行广播,而是直接拒绝(否决)该交易请求。
本实施例中,通过在接收到交易发起方以预设格式发送的交易请求时,调用预设智能合约,并基于所述预设智能合约判断所述交易请求对应的交易是否需要引入监管方;若所述交易需要引入监管方,则对所述交易请求进行解析,判断所述交易请求中的交易相关方中是否包括所述监管方;若所述交易请求中的交易相关方包括所述监管方,则在区块链平台中广播所述交易请求,以供所述交易相关方对所述交易请求进行确认;若所述交易请求中的交易相关方不包括所述监管方,则拒绝所述交易请求。通过以上方式,本实施例中在交易发起方发送交易请求时,通过智能合约判断该交易是否需要引入监管方,若该交易需要引入监管方,则再根据该交易请求的具体邀请对象是确定是否将该交易请求广播至区块链平台中;从而实现了区块链交易中对于交易请求的把控,有利于监控方在区块链交易中能够正常地实现其监管机能,有效地保证区块链交易平台中交易有序性和稳定性。
409、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在区块链上发起交易请求;
410、根据交易请求完成交易,并将交易对应的交易相关数据存储至区块链;
411、监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。
本实施例中步骤401-404、409-411与第一实施例中的步骤101-106类似,此处不再赘述。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
请参阅图5,本申请实施例中基于区块链的数据监管方法的第五个实施例包括:
501、获取预置加密密钥对,并将加密密钥对同步至预设的监管方;
502、通过加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;
503、通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;
504、将加密交易数据和接收方加密公钥组成交易体,并基于交易体在区块链上发起交易请求;
505、根据交易请求完成交易,并将交易对应的交易相关数据存储至区块链;
506、获取各个监管方发送至区块链中的交易数据;
本实施例中,本申请的执行主体可以是监管区块链中的节点。所述交易数据可以包括客户个人数据、交易双方的交易信息、交易状态、交易时间等参数,区块链监管方包括交易个人、金融机构等。上述监管方创建进行交易监管的区块链。客户在交易完成后,将交易相关的数据发送至区块链对应的区块链节点,以使得对应的区块链节点接收交易记录数据,并将接收到的数据写入区块链中;进行监管的金融机构在可以在交易双方签订监管协议后,基于实际交易进度以及双方签订的监管协议将交易双方的交易信息等参数发送至区块链节,以使得区块链节点将接收到的数据写入区块链中。
507、根据交易数据中的监管协议,构建运行在区块链中的智能合约,其中,智能合约中包括有交易状态的判定条件;
本实施例中,在获得交易数据之后,即可根据所述交易数据中的监管协议构建运行在区块链系统中的智能合约,构建智能合约也可以称为部署智能合约,构建智能合约的过程就是根据交易需要初始化交易数据。
构建智能合约的同时会生成智能合约的合约名称,可以理解的是合约名称也是根据具体的交易需要来设定的。由于合约名称是根据具体的交易需要来设定的,所以合约名称中包含有描述该智能合约的交易用途。当然,在描述合约名称的交易用途时,尽量采用统一的格式,然后提取交易数据中的监管协议,作为智能合约的函数,将交易数据中的其他数据,比如资金信息、交易时间、交易产品类型等作为智能合约的数据,使用solc进行编译,形成智能合约。可以理解的是,由于在构建智能合约的过程中,将交易数据中的监管协议,作为智能合约的函数,因此智能合约中设置有交易状态的判定条件,具体实施过程中需要先将监管协议进行转换,才能作为智能合约的函数。在具体实施方式中,智能合约在整个周期内分为项目形成、项目发布以及验证和执行,智能合约由多个章节组成,其执行也分段落执行。
508、监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示;
509、接收交易数据及对交易数据的真实性判断请求;
本实施例中,实现了判断所述交易数据是否真实。在保险欺诈中会出现伪造交易数据的可能。本实施方式利用区块链的信息难改篡改的特性,保证了交易数据的真实性。其中可由任意一个区块链节点中存储的所述加密交易数据进行解密而得的解密交易数据;也可以由任意多个区块链节点中存储的 所述加密交易数据进行解密而得的解密交易数据;也可以由所有区块链节点中存储的所述加密交易数据进行解密而得的解密交易数据。
510、将交易数据与对区块链节点中存储的加密后的交易数据进行解密而得的解密交易数据进行对比;当解密交易数据与交易数据的相似度大于第一阈值,确定交易数据为真。
本实施例中,若交易数据与区域链节点中经过解密的存储的交易数据相同,则可认为所述交易数据是真的,否则为假,从而防止恶意的理赔要求。具体地对比方法包括:将所述交易数据与所述解密交易数据按照字节进行异或操作,得到所述交易数据与所述解密交易数据的重复字节;若所述重复字节数量超过第一阈值,即所述解密交易数据与所述交易数据的相似度大于第一阈值,则判定所述交易数据与所述解密交易数据相同,从而判断所述交易数据为真。比如,在保险欺诈中会出现伪造保单的可能。本实施方式利用区块链的信息难改篡改的特性,保证了保单的真实性。若电子保单与区域链节点中经过解密的存储的保单相同,则可认为所述电子保单是真的,否则为假,从而防止恶意的理赔要求。
本实施例中步骤501-505、508与第一实施例中的101-105、106类似,此处不再赘述。
在本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
上面对本申请实施例中基于区块链的数据监管方法进行了描述,下面对本申请实施例中基于区块链的数据监管装置进行描述,请参阅图6,本申请实施例中基于区块链的数据监管装置的第一个实施例包括:
第一获取模块601,用于获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
加密模块602,用于通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
生成模块603,用于通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
发起模块604,用于将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
存储模块605,用于根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
解密模块606,用于所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
请参阅图7,本申请实施例中基于区块链的数据监管装置的第二个实施例,该基于区块链的数据 监管装置具体包括:
第一获取模块601,用于获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
加密模块602,用于通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
生成模块603,用于通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
发起模块604,用于将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
存储模块605,用于根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
解密模块606,用于所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
本实施例中,所述基于区块链的数据监管装置还包括:
搭建模块607,用于建立创世块并确定区块链的共识机制,以同意所述共识机制的终端作为区块链节点,搭建区块链交易网络。
本实施例中,所述加密模块602包括:
接收单元6021,用于接收待传输的区块链交易网络上目标客户的交易信息;
生成单元6022,用于生成指定长度的随机数据,并将生成的所述随机数据添加至所述交易信息中,以形成新数据;基于所述新数据的长度以及所述预设冗余数据,生成所述新数据的加密密钥;
加密单元6023,用于利用所述加密密钥对所述新数据进行加密。
本实施例中,所述基于区块链的数据监管装置,还包括:
判断模块608,用于在接收到目标客户以预设格式发送的交易请求时,调用预设智能合约,并基于所述预设智能合约判断所述交易请求对应的交易是否需要引入监管方;
解析模块609,用于当所述交易需要引入监管方时,对所述交易请求进行解析,判断所述交易请求中的交易相关方中是否包括所述监管方;
确认模块610,用于当所述交易请求中的交易相关方包括所述监管方时,在区块链网络中发送所述交易请求,以供所述交易相关方对所述交易请求进行确认;
拒绝模块611,用于当所述交易请求中的交易相关方不包括所述监管方时,拒绝所述交易请求。
本实施例中,所述基于区块链的数据监管装置,还包括:
第二获取模块612,用于获取各个监管方发送至区块链中的交易数据;
构建模块613,用于根据所述交易数据中的监管协议,构建运行在所述区块链中的智能合约,其中,所述智能合约中包括有交易状态的判定条件。
本实施例中,所述基于区块链的数据监管装置还包括:
接收模块614,用于接收交易数据及对所述交易数据的真实性判断请求;
比对模块615,用于将所述交易数据与对所述区块链节点中存储的所述加密后的交易数据进行解密而得的解密交易数据进行对比;若所述解密交易数据与所述交易数据的相似度大于第一阈值,确定所述交易数据为真。
本申请实施例中,通过获取预置加密密钥对,并将加密密钥对同步至预设的监管方;通过加密私钥对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据;通过预设接收方公钥对加密公钥进行加密,生成接收方加密公钥;基于加密交易数据和接收方加密公钥组成的交易体在区块链 上发起交易请求;根据交易请求完成交易,并将交易数据存储至区块链;监管方根据加密公钥对加密交易数据进行解密得到交易信息,并对交易信息进行展示。利用区块链的去中心化的特性解决了数据监管效率低下的技术问题。
上面图6和图7从模块化功能实体的角度对本申请实施例中的基于区块链的数据监管装置进行详细描述,下面从硬件处理的角度对本申请实施例中基于区块链的数据监管设备进行详细描述。
图8是本申请实施例提供的一种基于区块链的数据监管设备的结构示意图,该基于区块链的数据监管设备800可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上处理器(central processing units,CPU)810(例如,一个或一个以上处理器)和存储器820,一个或一个以上存储应用程序833或数据832的存储介质830(例如一个或一个以上海量存储设备)。其中,存储器820和存储介质830可以是短暂存储或持久存储。存储在存储介质830的程序可以包括一个或一个以上模块(图示没标出),每个模块可以包括对基于区块链的数据监管设备800中的一系列指令操作。更进一步地,处理器810可以设置为与存储介质830通信,在基于区块链的数据监管设备800上执行存储介质830中的一系列指令操作,以实现上述各方法实施例提供的基于区块链的数据监管方法的步骤。
基于区块链的数据监管设备800还可以包括一个或一个以上电源840,一个或一个以上有线或无线网络接口850,一个或一个以上输入输出接口860,和/或,一个或一个以上操作系统831,例如Windows Serve,Mac OS X,Unix,Linux,FreeBSD等等。本领域技术人员可以理解,图8示出的基于区块链的数据监管设备结构并不构成对本申请提供的基于区块链的数据监管设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
本申请还提供一种计算机可读存储介质,该计算机可读存储介质可以为非易失性计算机可读存储介质,该计算机可读存储介质也可以为易失性计算机可读存储介质,所述计算机可读存储介质中存储有指令,当所述指令在计算机上运行时,使得计算机执行上述基于区块链的数据监管方法的步骤。
本申请所指区块链是分布式数据存储、点对点传输、共识机制、加密算法等计算机技术的新型应用模式。区块链(Blockchain),本质上是一个去中心化的数据库,是一串使用密码学方法相关联产生的数据块,每一个数据块中包含了一批次网络交易的信息,用于验证其信息的有效性(防伪)和生成下一个区块。区块链可以包括区块链底层平台、平台产品服务层以及应用服务层等。
所述领域的技术人员可以清楚地了解到,为描述的方便和简洁,上述描述的系统,装置和单元的具体工作过程,可以参考前述方法实施例中的对应过程,在此不再赘述。
所述集成的单元如果以软件功能单元的形式实现并作为独立的产品销售或使用时,可以存储在一个计算机可读取存储介质中。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分或者该技术方案的全部或部分可以以软件产品的形式体现出来,该计算机软件产品存储在一个存储介质中,包括若干指令用以使得一台计算机设备(可以是个人计算机,服务器,或者网络设备等)执行本申请各个实施例所述方法的全部或部分步骤。而前述的存储介质包括:U盘、移动硬盘、只读存储器(read-only memory,ROM)、随机存取存储器(random access memory,RAM)、磁碟或者光盘等各种可以存储程序代码的介质。
以上所述,以上实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的精神和范围。

Claims (20)

  1. 一种基于区块链的数据监管方法,其中,所述基于区块链的数据监管方法包括:
    获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
    通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
    通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
    将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
    根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
    根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
  2. 根据权利要求1所述的基于区块链的数据监管方法,其中,在所述获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方之前,还包括:
    建立创世块并确定区块链的共识机制,以同意所述共识机制的终端作为区块链节点,搭建区块链交易网络。
  3. 根据权利要求1所述的基于区块链的数据监管方法,其中,所述通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据包括:
    接收待传输的区块链交易网络上目标客户的交易信息;
    生成指定长度的随机数据,并将生成的所述随机数据添加至所述交易信息中,以形成新数据;
    基于所述新数据的长度以及所述预设冗余数据,生成所述新数据的加密密钥;
    利用所述加密密钥对所述新数据进行加密。
  4. 根据权利要求1所述的基于区块链的数据监管方法,其中,在所述将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求之后,还包括:
    在接收到目标客户以预设格式发送的交易请求时,调用预设智能合约,并基于所述预设智能合约判断所述交易请求对应的交易是否需要引入监管方;
    若所述交易需要引入监管方,则对所述交易请求进行解析,判断所述交易请求中的交易相关方中是否包括所述监管方;
    若所述交易请求中的交易相关方包括所述监管方,则在区块链网络中发送所述交易请求,以供所述交易相关方对所述交易请求进行确认;
    若所述交易请求中的交易相关方不包括所述监管方,则拒绝所述交易请求。
  5. 根据权利要求1所述的基于区块链的数据监管方法,其中,在所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示之前,还包括:
    获取各个监管方发送至区块链中的交易数据;
    根据所述交易数据中的监管协议,构建运行在所述区块链中的智能合约,其中,所述智能合约中包括有交易状态的判定条件。
  6. 根据权利要求1所述的基于区块链的数据监管方法,其中,在所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示之后,还包括:
    接收交易数据及对所述交易数据的真实性判断请求;
    将所述交易数据与对所述区块链节点中存储的所述加密后的交易数据进行解密而得的解密交易 数据进行对比;
    若所述解密交易数据与所述交易数据的相似度大于第一阈值,确定所述交易数据为真。
  7. 一种基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备包括:存储器和至少一个处理器,所述存储器中存储有指令;
    所述至少一个处理器调用所述存储器中的所述指令,以使得所述基于区块链的数据监管设备执行如下所述的基于区块链的数据监管方法的步骤:
    获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
    通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
    通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
    将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
    根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
    根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
  8. 根据权利要求7所述的基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备执行所述获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方的步骤之前,还包括如下步骤:
    建立创世块并确定区块链的共识机制,以同意所述共识机制的终端作为区块链节点,搭建区块链交易网络。
  9. 根据权利要求7所述的基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备执行所述通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据的步骤时,包括:
    接收待传输的区块链交易网络上目标客户的交易信息;
    生成指定长度的随机数据,并将生成的所述随机数据添加至所述交易信息中,以形成新数据;
    基于所述新数据的长度以及所述预设冗余数据,生成所述新数据的加密密钥;
    利用所述加密密钥对所述新数据进行加密。
  10. 根据权利要求7所述的基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备执行所述将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求的步骤之后,还包括如下步骤:
    在接收到目标客户以预设格式发送的交易请求时,调用预设智能合约,并基于所述预设智能合约判断所述交易请求对应的交易是否需要引入监管方;
    若所述交易需要引入监管方,则对所述交易请求进行解析,判断所述交易请求中的交易相关方中是否包括所述监管方;
    若所述交易请求中的交易相关方包括所述监管方,则在区块链网络中发送所述交易请求,以供所述交易相关方对所述交易请求进行确认;
    若所述交易请求中的交易相关方不包括所述监管方,则拒绝所述交易请求。
  11. 根据权利要求7所述的基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备执行所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进 行展示的步骤之前,还包括如下步骤:
    获取各个监管方发送至区块链中的交易数据;
    根据所述交易数据中的监管协议,构建运行在所述区块链中的智能合约,其中,所述智能合约中包括有交易状态的判定条件。
  12. 根据权利要求7所述的基于区块链的数据监管设备,其中,所述基于区块链的数据监管设备执行所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示的步骤之后,还包括如下步骤:
    接收交易数据及对所述交易数据的真实性判断请求;
    将所述交易数据与对所述区块链节点中存储的所述加密后的交易数据进行解密而得的解密交易数据进行对比;
    若所述解密交易数据与所述交易数据的相似度大于第一阈值,确定所述交易数据为真。
  13. 一种计算机可读存储介质,所述计算机可读存储介质上存储有计算机程序,其中,所述计算机程序被处理器执行时实现如下所述的基于区块链的数据监管方法的步骤:
    获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
    通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
    通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
    将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
    根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
    根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
  14. 根据权利要求13所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时实现所述获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方的步骤之前,还包括如下步骤:
    建立创世块并确定区块链的共识机制,以同意所述共识机制的终端作为区块链节点,搭建区块链交易网络。
  15. 根据权利要求13所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时实现所述通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据的步骤,包括:
    接收待传输的区块链交易网络上目标客户的交易信息;
    生成指定长度的随机数据,并将生成的所述随机数据添加至所述交易信息中,以形成新数据;
    基于所述新数据的长度以及所述预设冗余数据,生成所述新数据的加密密钥;
    利用所述加密密钥对所述新数据进行加密。
  16. 根据权利要求13所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时实现所述将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求的步骤之后,还包括如下步骤:
    在接收到目标客户以预设格式发送的交易请求时,调用预设智能合约,并基于所述预设智能合约判断所述交易请求对应的交易是否需要引入监管方;
    若所述交易需要引入监管方,则对所述交易请求进行解析,判断所述交易请求中的交易相关方中 是否包括所述监管方;
    若所述交易请求中的交易相关方包括所述监管方,则在区块链网络中发送所述交易请求,以供所述交易相关方对所述交易请求进行确认;
    若所述交易请求中的交易相关方不包括所述监管方,则拒绝所述交易请求。
  17. 根据权利要求13所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时实现所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示的步骤之前,还包括如下步骤:
    获取各个监管方发送至区块链中的交易数据;
    根据所述交易数据中的监管协议,构建运行在所述区块链中的智能合约,其中,所述智能合约中包括有交易状态的判定条件。
  18. 根据权利要求17所述的计算机可读存储介质,其中,所述计算机程序被处理器执行时实现所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示的步骤之后,还包括如下步骤:
    接收交易数据及对所述交易数据的真实性判断请求;
    将所述交易数据与对所述区块链节点中存储的所述加密后的交易数据进行解密而得的解密交易数据进行对比;
    若所述解密交易数据与所述交易数据的相似度大于第一阈值,确定所述交易数据为真。
  19. 一种基于区块链的数据监管装置,其中,所述基于区块链的数据监管装置包括:
    第一获取模块,用于获取预置加密密钥对,并将所述加密密钥对同步至预设的监管方,其中,所述加密密钥对中携带有加密私钥和加密公钥;
    加密模块,用于通过所述加密私钥,对区块链交易网络上目标客户的交易信息进行加密,生成加密交易数据,其中,所述加密交易数据携带有所述目标客户的隐私信息;
    生成模块,用于通过预设接收方公钥对所述加密公钥进行加密,生成接收方加密公钥;
    发起模块,用于将所述加密交易数据和所述接收方加密公钥组成交易体,并基于所述交易体在所述区块链上发起交易请求;
    存储模块,用于根据所述交易请求完成所述交易,并将所述交易对应的交易相关数据存储至所述区块链,其中,所述交易相关数据包括用户信息、行为信息、交易信息、合同信息;
    解密模块,用于所述监管方根据所述加密公钥对所述加密交易数据进行解密得到交易信息,并对所述交易信息进行展示。
  20. 根据权利要求19所述的基于区块链的数据监管装置,其中,所述基于区块链的数据监管装置还包括:
    搭建模块,用于建立创世块并确定区块链的共识机制,以同意所述共识机制的终端作为区块链节点,搭建区块链交易网络。
PCT/CN2021/090219 2020-12-15 2021-04-27 基于区块链的数据监管方法、装置、设备及存储介质 WO2022126967A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011472818.5A CN112507363A (zh) 2020-12-15 2020-12-15 基于区块链的数据监管方法、装置、设备及存储介质
CN202011472818.5 2020-12-15

Publications (1)

Publication Number Publication Date
WO2022126967A1 true WO2022126967A1 (zh) 2022-06-23

Family

ID=74973262

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/090219 WO2022126967A1 (zh) 2020-12-15 2021-04-27 基于区块链的数据监管方法、装置、设备及存储介质

Country Status (2)

Country Link
CN (1) CN112507363A (zh)
WO (1) WO2022126967A1 (zh)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664769A (zh) * 2022-10-20 2023-01-31 牛津(海南)区块链研究院有限公司 一种基于区块链承诺的数据传输方法、系统、设备及介质
CN116308210A (zh) * 2023-05-08 2023-06-23 广东粤电信息科技有限公司 一种基于二维码的电厂监管方法及系统
CN116760651A (zh) * 2023-08-22 2023-09-15 中国航空结算有限责任公司 一种数据加密方法、装置、电子设备和可读存储介质

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112507363A (zh) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 基于区块链的数据监管方法、装置、设备及存储介质
CN113094432B (zh) * 2021-04-06 2022-06-03 湖北央中巨石信息技术有限公司 基于相同预制规则的多方异步共识方法及系统
CN113065170A (zh) * 2021-04-21 2021-07-02 山大地纬软件股份有限公司 一种基于动态识别的区块链监管数据的方法、系统及装置
CN113206744B (zh) * 2021-04-29 2024-04-02 杭州趣链科技有限公司 跨链交易监管方法、装置、设备和存储介质
CN113516475A (zh) * 2021-05-14 2021-10-19 数字印记(北京)科技有限公司 数据交付方法、装置、系统、电子设备和存储介质
CN114244534A (zh) * 2021-12-21 2022-03-25 杭州趣链科技有限公司 数据存储方法、装置、设备和存储介质
CN114398206B (zh) * 2022-01-06 2022-11-11 北京德风新征程科技有限公司 信息存储方法、装置、电子设备和计算机可读介质
CN114881781B (zh) * 2022-05-11 2023-07-18 河南省中视新科文化产业有限公司 一种基于区块链技术的安全交易系统及方法
CN115022377A (zh) * 2022-07-22 2022-09-06 国网浙江省电力有限公司电力科学研究院 高弹性电网数据传输方法、装置、设备及介质
CN115550026B (zh) * 2022-09-26 2023-07-04 建信金融科技有限责任公司 基于区块链交易的多重监管方法、系统及存储介质
CN117454437B (zh) * 2023-12-22 2024-03-22 北京天润基业科技发展股份有限公司 交易处理方法、存储介质及电子设备

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108242013A (zh) * 2017-12-25 2018-07-03 招商银行股份有限公司 基于区块链的交易监管方法、设备及计算机可读存储介质
CN109034796A (zh) * 2018-06-15 2018-12-18 重庆金融资产交易所有限责任公司 基于联盟链的交易监管方法、电子装置及可读存储介质
CN109150512A (zh) * 2018-08-22 2019-01-04 网宿科技股份有限公司 一种数据加密、解密方法、系统及数据加密、解密装置
KR20190063796A (ko) * 2017-11-30 2019-06-10 주식회사 베프스 블록체인 시스템을 위한 생체 정보 기반의 인증 장치 및 방법
CN112507363A (zh) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 基于区块链的数据监管方法、装置、设备及存储介质

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107196989B (zh) * 2017-03-21 2019-08-09 阿里巴巴集团控股有限公司 一种业务请求的处理方法及装置
CN109918451B (zh) * 2019-03-28 2021-06-25 中国联合网络通信集团有限公司 基于区块链的数据库管理方法及系统
JP6880255B2 (ja) * 2020-01-14 2021-06-02 アドバンスド ニュー テクノロジーズ カンパニー リミテッド ブロックチェーン機密トランザクションの管理

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20190063796A (ko) * 2017-11-30 2019-06-10 주식회사 베프스 블록체인 시스템을 위한 생체 정보 기반의 인증 장치 및 방법
CN108242013A (zh) * 2017-12-25 2018-07-03 招商银行股份有限公司 基于区块链的交易监管方法、设备及计算机可读存储介质
CN109034796A (zh) * 2018-06-15 2018-12-18 重庆金融资产交易所有限责任公司 基于联盟链的交易监管方法、电子装置及可读存储介质
CN109150512A (zh) * 2018-08-22 2019-01-04 网宿科技股份有限公司 一种数据加密、解密方法、系统及数据加密、解密装置
CN112507363A (zh) * 2020-12-15 2021-03-16 平安科技(深圳)有限公司 基于区块链的数据监管方法、装置、设备及存储介质

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115664769A (zh) * 2022-10-20 2023-01-31 牛津(海南)区块链研究院有限公司 一种基于区块链承诺的数据传输方法、系统、设备及介质
CN116308210A (zh) * 2023-05-08 2023-06-23 广东粤电信息科技有限公司 一种基于二维码的电厂监管方法及系统
CN116308210B (zh) * 2023-05-08 2023-09-15 广东粤电信息科技有限公司 一种基于二维码的电厂监管方法及系统
CN116760651A (zh) * 2023-08-22 2023-09-15 中国航空结算有限责任公司 一种数据加密方法、装置、电子设备和可读存储介质

Also Published As

Publication number Publication date
CN112507363A (zh) 2021-03-16

Similar Documents

Publication Publication Date Title
WO2022126967A1 (zh) 基于区块链的数据监管方法、装置、设备及存储介质
TWI831760B (zh) 用以基於證明驗證認證鏈外資料之系統及方法
US11356285B2 (en) Distributed key management for trusted execution environments
EP3685334B1 (en) Improving integrity of communications between blockchain networks and external data sources
CN110602138B (zh) 区块链网络的数据处理方法、装置、电子设备及存储介质
WO2022042301A1 (zh) 一种数据处理方法、装置、智能设备及存储介质
CN111046352B (zh) 一种基于区块链的身份信息安全授权系统与方法
CN108683688B (zh) 一种基于数字信封技术实现信息传输安全的方法
US11341466B2 (en) Transferring digital tickets based on blockchain networks
CN109889504B (zh) 去中心化数据访问权交易方法及系统
WO2022037596A1 (zh) 组合签名及验证签名方法、系统及存储介质
CN109447647A (zh) 一种基于区块链的安全支付系统
US20230284027A1 (en) Method for establishing communication channel, and user terminal
US11436597B1 (en) Biometrics-based e-signatures for pre-authorization and acceptance transfer
JP2022546470A (ja) トランスポート層セキュリティおよび他のコンテキストでのデータの検証のための非集中型技術
EP3933641A1 (en) Managing transactions in multiple blockchain networks
WO2023071751A1 (zh) 一种认证方法和通信装置
WO2021057124A1 (zh) 基于fpga实现隐私区块链的方法及装置
CN114266069A (zh) 一种基于区块链技术的房屋交易电子数据共享系统及方法
CN113328854B (zh) 基于区块链的业务处理方法及系统
CN112419021B (zh) 电子发票验证方法、系统、存储介质、计算机设备、终端
CN113302612B (zh) 一种用于跨链和跨网络数据传输的计算机实现方法、系统及装置
Mohammed et al. Secure Smart Contract Based on Blockchain to Prevent the Non-Repudiation Phenomenon
CN112926983A (zh) 一种基于区块链的存证交易加密系统及方法
CN114282251A (zh) 一种数据求交集方法、系统及数据加密方法

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21904906

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21904906

Country of ref document: EP

Kind code of ref document: A1