WO2022179008A1 - Plateforme d'entrepôt d'algorithmes de service daas d'intelligence artificielle à chaîne d'approvisionnement basée sur une chaîne de blocs - Google Patents

Plateforme d'entrepôt d'algorithmes de service daas d'intelligence artificielle à chaîne d'approvisionnement basée sur une chaîne de blocs Download PDF

Info

Publication number
WO2022179008A1
WO2022179008A1 PCT/CN2021/101105 CN2021101105W WO2022179008A1 WO 2022179008 A1 WO2022179008 A1 WO 2022179008A1 CN 2021101105 W CN2021101105 W CN 2021101105W WO 2022179008 A1 WO2022179008 A1 WO 2022179008A1
Authority
WO
WIPO (PCT)
Prior art keywords
algorithm
data
module
visualization
blockchain
Prior art date
Application number
PCT/CN2021/101105
Other languages
English (en)
Chinese (zh)
Inventor
刘天琼
Original Assignee
深圳市爱云信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳市爱云信息科技有限公司 filed Critical 深圳市爱云信息科技有限公司
Publication of WO2022179008A1 publication Critical patent/WO2022179008A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/545Interprogram communication where tasks reside in different layers, e.g. user- and kernel-space
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/547Remote procedure calls [RPC]; Web services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/04Forecasting or optimisation specially adapted for administrative or management purposes, e.g. linear programming or "cutting stock problem"
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02PCLIMATE CHANGE MITIGATION TECHNOLOGIES IN THE PRODUCTION OR PROCESSING OF GOODS
    • Y02P80/00Climate change mitigation technologies for sector-wide applications
    • Y02P80/10Efficient use of energy, e.g. using compressed air or pressurized fluid as energy carrier

Definitions

  • the invention relates to the field of supply chain finance of blockchain, in particular to a supply chain finance AI DaaS algorithm warehouse platform based on blockchain.
  • DaaS Data as a Service
  • DaaS provides a new way for enterprises to share data with other enterprises through centralized management of data resources and scene-based data; in today's era of data explosion, no enterprise can collect With the DaaS service, you can purchase all the data you need from other companies, and improve the competitiveness of the enterprise through division of labor and collaboration.
  • the financial AI DaaS algorithm warehouse platform solves the problem of algorithm integration and sharing of blockchain supply chain finance.
  • the purpose of the present invention is to provide a blockchain-based supply chain finance AI DaaS algorithm warehouse platform to solve the problem of algorithm fusion and sharing of blockchain-based supply chain finance.
  • the present invention provides a supply chain finance AI DaaS algorithm warehouse platform based on blockchain, including an application layer, an open interface layer, an algorithm warehouse service layer, A data layer and an infrastructure layer, the application layer is used to provide blockchain-based supply chain financial services, the open interface layer is used to provide the application layer with a service connecting the algorithm warehouse service layer, the data The layer is used to provide data service support for the algorithm warehouse service layer, and the infrastructure layer is used to provide development support for the data layer;
  • the application layer includes a letter of credit module, a non-recourse financing module, a supply chain finance module, a smart retail module, a link management module, a smart contract script module, a smart contract template module, and a smart contract management platform. It is used to provide a letter of credit business function, the non-recourse financing module is used to provide a non-recourse financing business function, the supply chain financial module is used to provide support services for trusted credit transfer, and the smart retail module is used for In order to provide smart retail business functions, the link management module is used to provide data link management functions, the smart contract script module is used to provide the automatic writing function of smart contract scripts, and the smart contract template module is used to provide intelligent The function of the contract, the smart contract management platform is used to provide the management function of the smart contract;
  • the open interface layer includes a chain code protocol interface, a blockchain API service interface, an identity authentication service interface, and a light client interface.
  • the chain code protocol interface is a blockchain access interface
  • the blockchain API service interface uses
  • the identity authentication service interface is used to provide the function of verifying user information
  • the light client interface is used to Provide users with a secure and decentralized way to access and interact with the blockchain without synchronizing the entire blockchain;
  • the algorithm warehouse service layer includes a data visualization algorithm module, a KYC verification algorithm module, a trusted identity system algorithm module, a consensus mechanism algorithm module, a privacy protection algorithm module, and a ledger maintenance algorithm module, and the data visualization algorithm module is used for data visualization algorithms.
  • the KYC verification algorithm module is used for the storage and application of the KYC verification algorithm
  • the trusted identity system algorithm module is used for the storage and application of the trusted identity system algorithm
  • the consensus mechanism algorithm module is used for consensus
  • the privacy protection algorithm module is used for the storage and application of the privacy protection algorithm
  • the account book maintenance algorithm module is used for the storage and application of the account book maintenance algorithm;
  • the data layer includes a block data sharing module, a block data governance module, and a block data development module.
  • the block data sharing module is used to provide data sharing functions for different modules
  • the block data governance module is used to provide different modules.
  • Data governance function, the block data development module is used to provide data development function for different modules;
  • the infrastructure layer includes Docker, Docker-compose, K8S
  • the Docker is an open source application container engine
  • the Docker-compose is an application tool for defining and running multi-container Docker
  • the K8S is a container-based cluster management
  • the platform is used to manage Docker and containers.
  • the data visualization algorithm includes a parallel visualization algorithm, an in-situ visualization algorithm, and a time series data visualization algorithm;
  • the parallel visualization algorithm includes a task parallel algorithm, a pipeline parallel algorithm, and a data parallel algorithm; the task parallel algorithm divides the visualization process into independent subtasks, and there is no data dependency between the running subtasks; the pipeline The parallel algorithm uses streaming to read data fragments, divides the visualization process into multiple stages, and executes each stage in parallel by the computer to speed up the processing process; the data parallel algorithm is a single-program multiple-data method, which divides the data into multiple subsets, and then use the subset as the granularity to execute the program in parallel to process the different subsets;
  • the in-situ visualization algorithm is to generate visualization in the process of numerical simulation and is used to alleviate the output bottleneck of large-scale numerical simulation, including image in-situ visualization algorithm, distributed data in-situ visualization algorithm, compressed data in-situ visualization algorithm and feature in-situ visualization.
  • the in-situ visualization algorithm of the image is to map the data into visualization during the numerical simulation process and save it as an image; the in-situ visualization algorithm of the distribution data is calculated according to the statistical index defined by the user during the numerical simulation Statistical indicators are saved, followed by statistical data visualization; the in-situ visualization of the compressed data adopts a compression algorithm to reduce the output scale of the numerical simulation data, and the compressed data is used as the input of the subsequent visualization processing; the feature in-situ visualization algorithm is in the numerical simulation process. Extract features and save them, and use feature data as input for subsequent visualization processing;
  • the time series data visualization algorithm is used to establish a prediction model, perform predictive analysis and user behavior analysis, including an area chart algorithm, a bubble chart algorithm, a Gantt chart algorithm, a heat map algorithm, a histogram algorithm, a line chart algorithm, and a spiral chart algorithm.
  • stacked area chart algorithm quantitative waveform chart algorithm
  • the area chart algorithm is used to display the change and development of the quantitative value within a specified time period
  • the bubble chart algorithm sets the variable of one of the axes to time or the data variable Animated over time
  • the Gantt chart algorithm is used as an organizational tool for project management
  • the heat map algorithm is used to display data by color changes
  • the histogram algorithm is used to display data at successive intervals or at specified times the distribution of data within segments
  • the line chart algorithm for displaying quantitative values over successive intervals or time spans to show trends and relationships
  • the helix chart algorithm for plotting time-based data along an Archimedes spiral
  • the stacking The quantized area chart algorithm works on the same principle as the simple area chart algorithm to display multiple data series at the same time, and the quantized waveform chart algorithm is used to display changes in different categories of data over time.
  • the KYC verification algorithm used in the process of verifying the identity of customers and customers before or during the conduct of business, uses AI-OCR tools to automatically capture, extract and create editable and searchable copies of customer data .
  • the trusted identity system algorithm uses Ethereum for key distribution and management, IPFS for content addressing, ENS for human-readable information analysis, and whisper for secure data transmission channels.
  • the consensus mechanism algorithm includes a workload proof algorithm, an equity proof algorithm, a share authorization proof mechanism algorithm, a Ripple consensus algorithm, and a practical Byzantine fault-tolerant algorithm;
  • the proof-of-work algorithm calculates a random number that satisfies the rules through AND-OR operation, that is, obtains the accounting right this time, sends out the data that needs to be recorded in this round, and stores it together after verification by other nodes in the entire network;
  • the proof-of-stake algorithm uses proof of equity to replace the proof of computing power, and the accounting right is obtained by the node with the highest equity, not the node with the highest computing power, thereby speeding up the speed of finding random numbers;
  • the said share authorization proof mechanism algorithm votes to select relatively reliable nodes through the proportion of assets, which can greatly reduce the number of nodes participating in verification and accounting, and can achieve consensus verification at the second level;
  • the Ripple consensus algorithm occurs between verification nodes.
  • Each verification node is preconfigured with a list of trusted nodes. The nodes on the trusted node list vote for transaction completion, and each verification node will continue to receive messages from the network. After the sent transactions are verified with the local ledger data, the illegal transactions are directly discarded, and the legal transactions will be aggregated into a transaction candidate set.
  • Each verification node sends its own transaction candidate set as a proposal to other verification nodes. After the verification node receives the proposal from other nodes, if it is not from the node on the trusted node list, it will ignore the proposal. If it is Nodes from the list of trusted nodes will compare the transaction in the proposal with the local candidate set of transactions. If there is the same transaction, the transaction will get one vote.
  • the transaction In a certain period of time, when the transaction receives more than 50% of the votes. When there are more than 50% of the votes, the transaction will enter the next round. If there are no more than 50% of the transactions, it will be confirmed by the next consensus process.
  • the verification node will send the transaction with more than 50% of the votes to other nodes as a proposal, and at the same time increase the threshold of the required number of votes. To 60%, repeat the calculation of proposals received by the verification node from other nodes until the threshold reaches 80%, and the verification node officially writes the transactions confirmed by the nodes in the 80% trusted node list into the local ledger data , called the last closed ledger, that is, the final state of the ledger;
  • the practical Byzantine fault-tolerant algorithm is a state machine replica replication algorithm, that is, a service is modeled as a state machine, and the state machine is replicated in different nodes of the distributed system. Each copy of the state machine holds the state of the service and also implements the operation of the service.
  • the privacy protection algorithm includes a differential privacy algorithm, an Apriori algorithm, and a k-anonymity algorithm;
  • the differential privacy algorithm is a mathematical model that quantifies the privacy loss in the data set when data is released;
  • the Apriori algorithm is used to detect rare The original data is added with noise to form data, and then the algorithm code is added to submit it to an untrusted external platform, and the algorithm is used to eliminate the noise when it is finally returned;
  • the k-anonymous algorithm is implemented by generalization technology and concealment technology.
  • the generalization technique refers to a more general and abstract description of the data, making it impossible to distinguish specific values.
  • the concealment technique refers to not publishing certain information, and by reducing the accuracy of the published data, each record is at least as good as other K in the data table. -1 records have exactly the same quasi-identifier attribute value, thereby reducing the risk of privacy leakage caused by chaining attacks.
  • the ledger maintenance algorithm includes an endorsement stage, a sorting stage and a verification stage;
  • the endorsement node checks the legitimacy of the transaction plan sent by the client, simulates the execution of the chain code to obtain the transaction result, and finally judges whether the transaction plan is supported according to the set endorsement logic; if the endorsement logic decides to support the transaction plan, The signature of the plan will be sent back to the client; by default, the endorsement logic of the endorsement node is to support the plan and sign, but the endorsement node can set the endorsement logic according to the business rules, so as to enter the team to serve the business needs.
  • the transaction is endorsed; if the endorsement node determines that the transaction is not supported, an error message is returned to the client;
  • the sorting stage sorts the transactions for the sorting service and determines the time sequence relationship between the transactions; the sorting service sorts the transactions received within a period of time, and then packs the transactions after the transaction into blocks, and then divides the transactions into blocks.
  • the block is broadcast to the members in the channel, thus ensuring the consistency of the data of all nodes;
  • the verification phase is to confirm that the node performs a series of verifications on the sorted transactions, including the integrity check of the transaction data, whether the transaction is repeated, whether the endorsement signature meets the requirements of the endorsement policy, and whether the transaction read-write set meets the multi-version control. All confirmation nodes verify transactions in the same order, and write legal transactions into the ledger at one time.
  • the Docker is an advanced container engine based on LXC
  • the source code is hosted on Github, based on the go language and open sourced in compliance with the Apache2.0 protocol.
  • the K8S includes a master node and a computing node;
  • the master node includes API Server, Scheduler, Controller manager, and the API Server is the external interface of the entire system for client and other components to call, and the Scheduler is responsible for The resources inside the cluster are scheduled, and the Controller manager is responsible for managing the controller;
  • the computing node includes the Docker, kubelet, kube-proxy, Fluentd, and Pod, and the Pod is the most basic operation unit of the K8S.
  • Pod represents a process running in the cluster and encapsulates one or more closely related containers.
  • the Kubelet is responsible for monitoring the Pod assigned to the computing node where the Kubelet is located, including creating, modifying, monitoring, Delete, etc., the Kube-proxy is used to provide a proxy for the Pod, and the Fluentd is used for log collection, storage and query.
  • the beneficial effect of the present invention is that the blockchain-based supply chain finance AI DaaS algorithm warehouse platform provided by the present invention includes an application layer, an open interface layer, an algorithm warehouse service layer, and a data layer that are connected in sequence.
  • the application layer is used to provide supply chain financial services based on blockchain
  • the open interface layer is used to provide the application layer with services to connect the algorithm warehouse service layer
  • the data layer is used to provide data service support for the algorithm warehouse service layer.
  • the infrastructure layer is used to provide development support for the data layer; the invention solves the problem of algorithm fusion and sharing of the supply chain finance of the blockchain. .
  • FIG. 1 is a system structure diagram of a blockchain-based supply chain finance AI DaaS algorithm warehouse platform provided by an embodiment of the present invention.
  • the blockchain-based supply chain finance AI DaaS algorithm warehouse platform includes an application layer, an open interface layer, an algorithm warehouse service layer, a data layer and an infrastructure layer that are sequentially connected.
  • the open interface layer is used to provide the application layer with the service of connecting the algorithm warehouse service layer
  • the data layer is used to provide data for the algorithm warehouse service layer.
  • service support the infrastructure layer is used to provide development support for the data layer;
  • the application layer includes a letter of credit module, a non-recourse financing module, a supply chain finance module, a smart retail module, a link management module, a smart contract script module, a smart contract template module, and a smart contract management platform. It is used to provide a letter of credit business function, the non-recourse financing module is used to provide a non-recourse financing business function, the supply chain financial module is used to provide support services for trusted credit transfer, and the smart retail module is used for In order to provide smart retail business functions, the link management module is used to provide data link management functions, the smart contract script module is used to provide the automatic writing function of smart contract scripts, and the smart contract template module is used to provide intelligent The function of the contract, the smart contract management platform is used to provide the management function of the smart contract;
  • the open interface layer includes a chain code protocol interface, a blockchain API service interface, an identity authentication service interface, and a light client interface.
  • the chain code protocol interface is a blockchain access interface
  • the blockchain API service interface uses
  • the identity authentication service interface is used to provide the function of verifying user information
  • the light client interface is used to Provide users with a secure and decentralized way to access and interact with the blockchain without synchronizing the entire blockchain;
  • the algorithm warehouse service layer includes a data visualization algorithm module, a KYC verification algorithm module, a trusted identity system algorithm module, a consensus mechanism algorithm module, a privacy protection algorithm module, and a ledger maintenance algorithm module, and the data visualization algorithm module is used for data visualization algorithms.
  • the KYC verification algorithm module is used for the storage and application of the KYC verification algorithm
  • the trusted identity system algorithm module is used for the storage and application of the trusted identity system algorithm
  • the consensus mechanism algorithm module is used for consensus
  • the privacy protection algorithm module is used for the storage and application of the privacy protection algorithm
  • the account book maintenance algorithm module is used for the storage and application of the account book maintenance algorithm;
  • the data layer includes a block data sharing module, a block data governance module, and a block data development module.
  • the block data sharing module is used to provide data sharing functions for different modules
  • the block data governance module is used to provide different modules.
  • Data governance function, the block data development module is used to provide data development function for different modules;
  • the infrastructure layer includes Docker, Docker-compose, K8S
  • the Docker is an open source application container engine
  • the Docker-compose is an application tool for defining and running multi-container Docker
  • the K8S is a container-based cluster management
  • the platform is used to manage Docker and containers.
  • the blockchain-based supply chain finance AI DaaS algorithm warehouse platform provided by the above technical solution includes an application layer, an open interface layer, an algorithm warehouse service layer, a data layer and an infrastructure layer that are connected in sequence.
  • the supply chain financial service of the chain, the open interface layer is used to provide the application layer with the service of connecting the algorithm warehouse service layer
  • the data layer is used to provide data service support for the algorithm warehouse service layer
  • the infrastructure layer is used to provide development support for the data layer;
  • the invention solves the problem of algorithm fusion and sharing of supply chain finance of block chain.
  • the data visualization algorithm includes a parallel visualization algorithm, an in-situ visualization algorithm, and a time series data visualization algorithm;
  • the parallel visualization algorithm includes a task parallel algorithm, a pipeline parallel algorithm, and a data parallel algorithm; the task parallel algorithm divides the visualization process into independent subtasks, and there is no data dependency between the running subtasks; the pipeline The parallel algorithm uses streaming to read data fragments, divides the visualization process into multiple stages, and executes each stage in parallel by the computer to speed up the processing process; the data parallel algorithm is a single-program multiple-data method, which divides the data into multiple subsets, and then use the subset as the granularity to execute the program in parallel to process the different subsets;
  • the in-situ visualization algorithm is to generate visualization in the process of numerical simulation and is used to alleviate the output bottleneck of large-scale numerical simulation, including image in-situ visualization algorithm, distributed data in-situ visualization algorithm, compressed data in-situ visualization algorithm and feature in-situ visualization.
  • the in-situ visualization algorithm of the image is to map the data into visualization during the numerical simulation process and save it as an image; the in-situ visualization algorithm of the distribution data is calculated according to the statistical index defined by the user during the numerical simulation Statistical indicators are saved, followed by statistical data visualization; the in-situ visualization of the compressed data adopts a compression algorithm to reduce the output scale of the numerical simulation data, and the compressed data is used as the input of the subsequent visualization processing; the feature in-situ visualization algorithm is in the numerical simulation process. Extract features and save them, and use feature data as input for subsequent visualization processing;
  • the time series data visualization algorithm is used to establish a prediction model, perform predictive analysis and user behavior analysis, including an area chart algorithm, a bubble chart algorithm, a Gantt chart algorithm, a heat map algorithm, a histogram algorithm, a line chart algorithm, and a spiral chart algorithm.
  • stacked area chart algorithm quantitative waveform chart algorithm
  • the area chart algorithm is used to display the change and development of the quantitative value within a specified time period
  • the bubble chart algorithm sets the variable of one of the axes to time or the data variable Animated over time
  • the Gantt chart algorithm is used as an organizational tool for project management
  • the heat map algorithm is used to display data by color changes
  • the histogram algorithm is used to display data at successive intervals or at specified times the distribution of data within segments
  • the line chart algorithm for displaying quantitative values over successive intervals or time spans to show trends and relationships
  • the helix chart algorithm for plotting time-based data along an Archimedes spiral
  • the stacking The quantized area chart algorithm works on the same principle as the simple area chart algorithm to display multiple data series at the same time, and the quantized waveform chart algorithm is used to display changes in different categories of data over time.
  • the KYC verification algorithm is used in the process of verifying customers and customer identities before or during the conduct of business, and the KYC verification algorithm uses AI-OCR tools to automatically capture, extract and create editable and Searchable copy of customer data.
  • the trusted identity system algorithm uses Ethereum for key distribution and management, IPFS for content addressing, ENS for human-readable information parsing, and whisper as a secure data transmission channel.
  • the consensus mechanism algorithm includes a workload proof algorithm, a rights proof algorithm, a share authorization proof mechanism algorithm, a Ripple consensus algorithm, and a practical Byzantine fault-tolerant algorithm;
  • the proof-of-work algorithm calculates a random number that satisfies the rules through AND-OR operation, that is, obtains the accounting right this time, sends out the data that needs to be recorded in this round, and stores it together after verification by other nodes in the entire network;
  • the proof-of-stake algorithm uses proof of equity to replace the proof of computing power, and the accounting right is obtained by the node with the highest equity, not the node with the highest computing power, thereby speeding up the speed of finding random numbers;
  • the said share authorization proof mechanism algorithm votes to select relatively reliable nodes through the proportion of assets, which can greatly reduce the number of nodes participating in verification and accounting, and can achieve consensus verification at the second level;
  • the Ripple consensus algorithm occurs between verification nodes.
  • Each verification node is preconfigured with a list of trusted nodes. The nodes on the trusted node list vote for transaction completion, and each verification node will continue to receive messages from the network. After the sent transactions are verified with the local ledger data, the illegal transactions are directly discarded, and the legal transactions will be aggregated into a transaction candidate set.
  • Each verification node sends its own transaction candidate set as a proposal to other verification nodes. After the verification node receives the proposal from other nodes, if it is not from the node on the trusted node list, it will ignore the proposal. If it is Nodes from the list of trusted nodes will compare the transaction in the proposal with the local candidate set of transactions. If there is the same transaction, the transaction will get one vote.
  • the transaction In a certain period of time, when the transaction receives more than 50% of the votes. When there are more than 50% of the votes, the transaction will enter the next round. If there are no more than 50% of the transactions, it will be confirmed by the next consensus process.
  • the verification node will send the transaction with more than 50% of the votes to other nodes as a proposal, and at the same time increase the threshold of the required number of votes. To 60%, repeat the calculation of proposals received by the verification node from other nodes until the threshold reaches 80%, and the verification node officially writes the transactions confirmed by the nodes in the 80% trusted node list into the local ledger data , called the last closed ledger, that is, the final state of the ledger;
  • the practical Byzantine fault-tolerant algorithm is a state machine replica replication algorithm, that is, a service is modeled as a state machine, and the state machine is replicated in different nodes of the distributed system. Each copy of the state machine holds the state of the service and also implements the operation of the service.
  • the privacy protection algorithm includes a differential privacy algorithm, an Apriori algorithm, and a k-anonymity algorithm;
  • the differential privacy algorithm is a mathematical model that quantifies the privacy loss in a data set when data is released;
  • the The Apriori algorithm is used to detect rare data classes, add noise to the original data to form data, then add the algorithm code and submit it to an untrusted external platform, and use the algorithm to eliminate the noise when it finally returns;
  • the k-anonymous algorithm uses generalization technology and It is realized by concealment technology.
  • the generalization technology refers to a more general and abstract description of the data, making it impossible to distinguish specific values.
  • the concealment technology means that certain information is not released, and by reducing the accuracy of the released data, each record is at least as good as the one.
  • the other K-1 records in the data table have exactly the same quasi-identifier attribute value, thereby reducing the risk of privacy leakage caused by chaining attacks.
  • the ledger maintenance algorithm includes an endorsement phase, a sorting phase, and a verification phase;
  • the endorsement node checks the legitimacy of the transaction plan sent by the client, simulates the execution of the chain code to obtain the transaction result, and finally judges whether the transaction plan is supported according to the set endorsement logic; if the endorsement logic decides to support the transaction plan, The signature of the plan will be sent back to the client; by default, the endorsement logic of the endorsement node is to support the plan and sign, but the endorsement node can set the endorsement logic according to the business rules, so as to enter the team to serve the business needs.
  • the transaction is endorsed; if the endorsement node determines that the transaction is not supported, an error message is returned to the client;
  • the sorting stage sorts the transactions for the sorting service and determines the time sequence relationship between the transactions; the sorting service sorts the transactions received within a period of time, and then packs the transactions after the transaction into blocks, and then divides the transactions into blocks.
  • the block is broadcast to the members in the channel, thus ensuring the consistency of the data of all nodes;
  • the verification phase is to confirm that the node performs a series of verifications on the sorted transactions, including the integrity check of the transaction data, whether the transaction is repeated, whether the endorsement signature meets the requirements of the endorsement policy, and whether the transaction read-write set meets the multi-version control. All confirmation nodes verify transactions in the same order, and write legal transactions into the ledger at one time.
  • the Docker is an advanced container engine based on LXC
  • the source code is hosted on Github, based on the go language and open sourced in compliance with the Apache2.0 protocol.
  • the K8S includes a master node and a computing node;
  • the master node includes an API Server, a Scheduler, and a Controller manager, and the API Server is the external interface of the entire system, which is called by clients and other components, and the Scheduler is responsible for The resources inside the cluster are scheduled, and the Controller manager is responsible for managing the controller;
  • the computing node includes the Docker, kubelet, kube-proxy, Fluentd, and Pod, and the Pod is the most basic operation unit of the K8S.
  • Pod represents a process running in the cluster and encapsulates one or more closely related containers.
  • the Kubelet is responsible for monitoring the Pod assigned to the computing node where the Kubelet is located, including creating, modifying, monitoring, Delete, etc., the Kube-proxy is used to provide a proxy for the Pod, and the Fluentd is used for log collection, storage and query.
  • the functions and business processes of all modules involved in the present invention adopt existing and public functions and business processes; the architectures of all modules involved in the present invention adopt existing and public architectures.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Human Resources & Organizations (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Accounting & Taxation (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computing Systems (AREA)
  • Tourism & Hospitality (AREA)
  • Operations Research (AREA)
  • Game Theory and Decision Science (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne une plate-forme d'entrepôt d'algorithmes de services DaaS d'intelligence artificielle basée sur une chaîne de blocs, de financement de chaîne d'approvisionnement basée sur une chaîne de blocs, la plate-forme d'entrepôt d'algorithmes de services DaaS d'intelligence artificielle comprenant une couche application, une couche interface ouverte, une couche service d'entrepôt d'algorithmes, une couche de données et une couche infrastructure, qui sont connectées en séquence, la couche application étant utilisée pour fournir un service de financement de chaîne d'approvisionnement sur la base d'une chaîne de blocs; la couche interface ouverte étant utilisée pour fournir, à la couche application, un service destiné à être connecté à la couche service d'entrepôt d'algorithmes; la couche de données étant utilisée pour fournir un support de service de données à la couche service d'entrepôt d'algorithmes; et la couche infrastructure étant utilisée pour fournir un support de développement à la couche de données. Les problèmes de fusion d'algorithmes et de partage de finances de chaîne d'alimentation basés sur une chaîne de blocs peuvent être résolus.
PCT/CN2021/101105 2021-02-24 2021-06-19 Plateforme d'entrepôt d'algorithmes de service daas d'intelligence artificielle à chaîne d'approvisionnement basée sur une chaîne de blocs WO2022179008A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110210261.6 2021-02-24
CN202110210261.6A CN112883116A (zh) 2021-02-24 2021-02-24 基于区块链的供应链金融AI DaaS算法仓库平台

Publications (1)

Publication Number Publication Date
WO2022179008A1 true WO2022179008A1 (fr) 2022-09-01

Family

ID=76054456

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/101105 WO2022179008A1 (fr) 2021-02-24 2021-06-19 Plateforme d'entrepôt d'algorithmes de service daas d'intelligence artificielle à chaîne d'approvisionnement basée sur une chaîne de blocs

Country Status (2)

Country Link
CN (1) CN112883116A (fr)
WO (1) WO2022179008A1 (fr)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115422262A (zh) * 2022-10-31 2022-12-02 国网浙江省电力有限公司金华供电公司 基于区块链智能合约下全链物资采供数据处理方法及系统
CN115618429A (zh) * 2022-12-20 2023-01-17 北京理工大学 一种基于平行区块链的产品全生命周期管理系统
CN116245622A (zh) * 2023-05-06 2023-06-09 布比(北京)网络技术有限公司 一种基于区块链的产融服务系统、方法以及电子设备
CN116796352A (zh) * 2023-07-18 2023-09-22 中路高科交通科技集团有限公司 联程客运一体化信息服务开发支持平台及其实施方法

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112883116A (zh) * 2021-02-24 2021-06-01 深圳市爱云信息科技有限公司 基于区块链的供应链金融AI DaaS算法仓库平台
CN114693220B (zh) * 2022-05-30 2022-09-20 深圳市爱云信息科技有限公司 基于数字孪生DaaS平台的算法仓库管理方法及系统
CN115065690A (zh) * 2022-06-13 2022-09-16 四川省自主可控电子信息产业有限责任公司 一种基于不同异构指令集的去中心化系统及方法
CN115495714B (zh) * 2022-09-14 2023-07-07 湖南大学 基于区块链的金融人工智能算法集成方法及系统
CN115392914B (zh) * 2022-10-27 2023-01-06 河北省科学院应用数学研究所 基于区块链的供应链金融平台及数据处理方法
CN116910816B (zh) * 2023-09-12 2023-12-05 北京迅京科技有限公司 一种提高隐私保护下的多方资产协同管理方法及装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (fr) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Plateforme de transactions de réseau électrique de confiance basée sur une technologie de chaîne de blocs
CN110135860A (zh) * 2019-04-17 2019-08-16 中山大学 一种基于区块链技术的农作物种子安全溯源系统
CN111210331A (zh) * 2020-01-04 2020-05-29 链农(深圳)信息科技有限公司 一种基于区块链的农业供应链金融服务平台
CN112883116A (zh) * 2021-02-24 2021-06-01 深圳市爱云信息科技有限公司 基于区块链的供应链金融AI DaaS算法仓库平台

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018032372A1 (fr) * 2016-08-13 2018-02-22 深圳市樊溪电子有限公司 Plateforme de transactions de réseau électrique de confiance basée sur une technologie de chaîne de blocs
CN110135860A (zh) * 2019-04-17 2019-08-16 中山大学 一种基于区块链技术的农作物种子安全溯源系统
CN111210331A (zh) * 2020-01-04 2020-05-29 链农(深圳)信息科技有限公司 一种基于区块链的农业供应链金融服务平台
CN112883116A (zh) * 2021-02-24 2021-06-01 深圳市爱云信息科技有限公司 基于区块链的供应链金融AI DaaS算法仓库平台

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115422262A (zh) * 2022-10-31 2022-12-02 国网浙江省电力有限公司金华供电公司 基于区块链智能合约下全链物资采供数据处理方法及系统
CN115618429A (zh) * 2022-12-20 2023-01-17 北京理工大学 一种基于平行区块链的产品全生命周期管理系统
CN116245622A (zh) * 2023-05-06 2023-06-09 布比(北京)网络技术有限公司 一种基于区块链的产融服务系统、方法以及电子设备
CN116796352A (zh) * 2023-07-18 2023-09-22 中路高科交通科技集团有限公司 联程客运一体化信息服务开发支持平台及其实施方法
CN116796352B (zh) * 2023-07-18 2024-03-01 中路高科交通科技集团有限公司 联程客运一体化信息服务开发支持平台及其实施方法

Also Published As

Publication number Publication date
CN112883116A (zh) 2021-06-01

Similar Documents

Publication Publication Date Title
WO2022179008A1 (fr) Plateforme d'entrepôt d'algorithmes de service daas d'intelligence artificielle à chaîne d'approvisionnement basée sur une chaîne de blocs
US11397744B2 (en) Systems and methods for data storage and processing
US7574379B2 (en) Method and system of using artifacts to identify elements of a component business model
US11823072B2 (en) Customer behavior predictive modeling
US8533235B2 (en) Infrastructure and architecture for development and execution of predictive models
EP3850557A1 (fr) Chaîne de blocs pour données et gouvernance de modèles
Solomon et al. A knowledge based approach for handling supply chain risk management
Chen et al. Knowing what is going on—A smart contract for modular construction
CN113342418A (zh) 基于区块链的分布式机器学习任务卸载方法
US20200387802A1 (en) Dynamically adaptable rules and communication system for managing process controls
US20140149186A1 (en) Method and system of using artifacts to identify elements of a component business model
US20220311595A1 (en) Reducing transaction aborts in execute-order-validate blockchain models
TWI698768B (zh) 具備防竄改能力的企業社會責任資料認證系統、相關的認證子系統、電腦程式產品、與資料認證方法
Zhang et al. Financial System Design for High‐Tech Enterprise Based on Cloud Service and Task Scheduling Algorithm
Kukreja et al. Data Engineering with Apache Spark, Delta Lake, and Lakehouse: Create scalable pipelines that ingest, curate, and aggregate complex data in a timely and secure way
Spencer-Hicken et al. Blockchain feasibility assessment: a quantitative approach
US20230267518A1 (en) Intelligently managing invoice processing using blockchain and mixed reality applications
Serag A proposed framework for integrating XBRL and blockchain to improve financial reporting transparency and integrity: XBRL Chain
Wang et al. A Big Data Stream-Driven Risk Recognition Approach for Hospital Accounting Management Systems
Liu et al. Research on Financial Digitization and Information Quality Improvement
Li Design and Optimized Application of Online Financial Management System Based on Internet of Things
CN117668124A (zh) 大数据治理方法及相关装置、设备和存储介质
Gong et al. Database Storage Security Analysis of Enterprise Financial Management System
Bautista Villalpando A performance measurement model for cloud computing applications
CN114218220A (zh) 数据处理方法及装置、存储介质及电子设备

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21927440

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 190124)