CN110457957A - Information processing method, device, electronic equipment and the medium of electronic bill - Google Patents
Information processing method, device, electronic equipment and the medium of electronic bill Download PDFInfo
- Publication number
- CN110457957A CN110457957A CN201910778771.6A CN201910778771A CN110457957A CN 110457957 A CN110457957 A CN 110457957A CN 201910778771 A CN201910778771 A CN 201910778771A CN 110457957 A CN110457957 A CN 110457957A
- Authority
- CN
- China
- Prior art keywords
- field
- written
- sensitive information
- server
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 230000010365 information processing Effects 0.000 title claims abstract description 43
- 238000003672 processing method Methods 0.000 title claims abstract description 32
- 238000001514 detection method Methods 0.000 claims abstract description 57
- 238000001629 sign test Methods 0.000 claims abstract description 48
- 238000012545 processing Methods 0.000 claims description 26
- 230000005540 biological transmission Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 10
- 235000013399 edible fruits Nutrition 0.000 claims description 6
- 238000000034 method Methods 0.000 abstract description 43
- 238000012544 monitoring process Methods 0.000 abstract description 6
- 230000031016 anaphase Effects 0.000 abstract description 4
- 230000008569 process Effects 0.000 description 23
- 238000004891 communication Methods 0.000 description 18
- 230000007246 mechanism Effects 0.000 description 13
- 238000012790 confirmation Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 7
- 230000004048 modification Effects 0.000 description 7
- 230000004075 alteration Effects 0.000 description 6
- 230000008859 change Effects 0.000 description 5
- 230000006835 compression Effects 0.000 description 4
- 238000007906 compression Methods 0.000 description 4
- 238000010586 diagram Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 3
- 230000000694 effects Effects 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000007689 inspection Methods 0.000 description 3
- 230000003993 interaction Effects 0.000 description 3
- 230000035945 sensitivity Effects 0.000 description 3
- 238000000638 solvent extraction Methods 0.000 description 3
- 238000012360 testing method Methods 0.000 description 3
- 238000013473 artificial intelligence Methods 0.000 description 2
- 230000006837 decompression Effects 0.000 description 2
- 230000005611 electricity Effects 0.000 description 2
- 239000012634 fragment Substances 0.000 description 2
- 230000006872 improvement Effects 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- GOLXNESZZPUPJE-UHFFFAOYSA-N spiromesifen Chemical compound CC1=CC(C)=CC(C)=C1C(C(O1)=O)=C(OC(=O)CC(C)(C)C)C11CCCC1 GOLXNESZZPUPJE-UHFFFAOYSA-N 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000001960 triggered effect Effects 0.000 description 2
- 238000012795 verification Methods 0.000 description 2
- 229910002056 binary alloy Inorganic materials 0.000 description 1
- 230000000903 blocking effect Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000010295 mobile communication Methods 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
- 230000009467 reduction Effects 0.000 description 1
- 238000009877 rendering Methods 0.000 description 1
- 239000007787 solid Substances 0.000 description 1
- 238000011895 specific detection Methods 0.000 description 1
- 230000001052 transient effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Bioethics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Health & Medical Sciences (AREA)
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application discloses a kind of information processing method of electronic bill, device, electronic equipment and media, this method is after obtaining the field to be written for blank bill to be written, judge whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned field to be written does not include sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, obtained Hash result is stored on block chain.It can be seen that the embodiment of the present application is to store the corresponding field of electronic bill by block chain network so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when authenticity.In addition, before cochain, the detection of sensitive information is also carried out to above-mentioned field, effectively prevent include sensitive information field cochain after the problem of can not modifying, while also reducing the risk that more problem bill is stored in block chain network.
Description
Technical field
This application involves block chain technical fields, more particularly to the information processing method, device, electricity of a kind of electronic bill
Sub- equipment and medium.
Background technique
Traditional paper-bill, for example, invoice, exists and is easily lost, the risk of damage, and paper is wasted, with mutual
The rapid development of networking, makes it possible the use of electronic bill.
Currently, electronic bill is universal increasingly wider, although electronic bill and paper-bill are two entirely different letters
Bearing mode is ceased, still, being protected to the information on electronic bill to prevent information at par to be tampered is also to carve not allowing
Slow problem.
It can be seen that how to prevent the information of electronic bill to be tampered is those skilled in the art's urgent problem to be solved.
Summary of the invention
The purpose of the application is to provide information processing method, device, electronic equipment and the medium of a kind of electronic bill, is used for
It prevents the information of electronic bill to be tampered and sensitive information detection can be carried out to field to be written in advance.
In order to solve the above technical problems, the application provides a kind of information processing method of electronic bill, comprising:
The access path of non-sensitive information database is obtained in advance, includes sensitive information in the non-sensitive information database;
The field to be written that server is sent is obtained to judge whether comprising the sensitive information;The field to be written is
For the field of blank bill to be written;
When the field to be written does not include the sensitive information, the signed data returned to the server is tested
Label;The signed data is generated particular by the private key of the corresponding Hash result of field to be written and the server;
Sign test stores the field to be written to block chain after passing through.
Preferably, further includes:
Judge whether the field of cochain stored on the block chain includes the sensitive information;
If it is, the label corresponding bill of cochain field.
Preferably, the label that when the field to be written does not include the sensitive information, the server is returned
Name data carry out sign test and specifically include:
Judge whether the field to be written includes the sensitive information;
If do not included, Hash operation is carried out to obtain the Hash result to the field to be written;
To the server send the Hash result so as to the server according to the private key to the Hash result
It is encrypted to obtain the signed data;
Receive the signed data that the server returns;
Sign test is carried out to the signed data using the public key of the server.
Preferably, described to judge whether the field of cochain stored on the block chain includes that the sensitive information specifically wraps
It includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field.
Preferably, the label that when the field to be written does not include the sensitive information, the server is returned
Name data carry out sign test and specifically include:
Hash operation is carried out to the field to be written to obtain the Hash result, Xiang Suoshu server sends the Kazakhstan
Uncommon result encrypts the Hash result according to the private key to obtain the signed data so as to the server, and judges
Whether the field to be written includes the sensitive information;
Receive the signed data that the server returns;
Judge whether there is the corresponding judging result of the field to be written;
If there is the judging result, then judge whether the judging result characterizes the field to be written not comprising institute
State sensitive information;
If not including the sensitive information, sign test is carried out to the signed data using the public key of the server;
If there is no the judging result, then judge whether to reach preset delay time;
If not up to, return described in the step of judging whether there is the field to be written corresponding judging result;
If reached, enter the step of public key using the server carries out sign test to the signed data.
Preferably, described to judge whether the field of cochain stored on the block chain includes that the sensitive information specifically wraps
It includes:
Obtain current block height;Wherein, using the corresponding block height of a upper detection cycle as starting altitude;
Cochain field is obtained described in whole bills from the corresponding block of current block height;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field;And
Judge whether to reach current maximum block height;
If current block height not up to, is increased a height, and return described corresponding from current block height
Block in the step of obtaining the field of cochain of whole bills;
If reached, current maximum block height is recorded using the starting altitude as next detection cycle;
If not including the sensitive information, judge whether to reach current maximum block height;
If current block height not up to, is increased a height into described, and return described from current block
The step of field of cochain of whole bills is obtained in highly corresponding block;
If reached, enter the current maximum block height of the record using the starting altitude as next detection cycle
The step of.
Preferably, further includes:
Preset sensitive information white list;
Judge whether the field to be written includes information in the sensitive information white list;
It is right into described when the field to be written, which does not include, pre-set sensitive information if do not included
The signed data that server returns carries out the step of sign test;
If comprising being directly entered the step of signed data returned to server carries out sign test.
Preferably, when the field to be written includes the sensitive information, further includes:
The field to be written is intercepted, and generates interception record.
In order to solve the above technical problems, the application also provides a kind of information processing unit of electronic bill, comprising:
First obtains module, for obtaining the access path of non-sensitive information database, the non-sensitive information database in advance
In include sensitive information;
Second obtains module, for obtaining the field to be written of server transmission to judge whether comprising the sensitive letter
Breath;The field to be written is the field for blank bill to be written;
Message processing module, for being returned to the server when the field to be written does not include the sensitive information
The signed data returned carries out sign test;The signed data is particular by the corresponding Hash result of the field to be written and described
The private key of server generates;
Information uploading module stores the field to be written to block chain after passing through for sign test.
In order to solve the above technical problems, the application also provides a kind of electronic equipment, including memory, for storing computer
Program;
Processor realizes the step of the information processing method of electronic bill as mentioned when for executing the computer program
Suddenly.
In order to solve the above technical problems, the application also provides a kind of computer readable storage medium, it is described computer-readable
Computer program is stored on storage medium, the computer program realizes electronic bill as mentioned when being executed by processor
The step of information processing method.
The information processing method of electronic bill provided herein is obtaining the word to be written for blank bill to be written
Duan Hou judges whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned to be written
When entering field not comprising sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, the Kazakhstan that will be obtained
Uncommon result is stored on block chain.It can be seen that the embodiment of the present application is to store electronic bill by block chain network to correspond to
Field so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when it is true
Property.In addition, also carrying out the detection of sensitive information to above-mentioned field before cochain, effectivelying prevent the field comprising sensitive information
The problem of can not being modified after cochain, while also reducing the risk that more problem bill is stored in block chain network.
In addition, the information processing unit of electronic bill provided herein, electronic equipment and medium and electronic bill
Information processing method is corresponding, and effect is as above.
Detailed description of the invention
In ord to more clearly illustrate embodiments of the present application, attached drawing needed in the embodiment will be done simply below
It introduces, it should be apparent that, the drawings in the following description are only some examples of the present application, for ordinary skill people
For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of structure composed figure of the information processing system of electronic bill provided by the present application;
Fig. 2 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 3 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 4 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 5 is the flow chart of the information processing method of another electronic bill provided by the embodiments of the present application;
Fig. 6 is a kind of process of detection method that sensitive information is carried out to cochain field provided by the embodiments of the present application
Figure;
Fig. 7 is a kind of schematic diagram of application scenarios embodiment provided by the present application;
Fig. 8 is a kind of structure chart of the information processing unit of electronic bill provided by the present application;
Fig. 9 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
Electronic bill is widely used in e-commerce, solid shop.Currently, electronic bill according to bill class
Type can be divided into ordinary bill and special bill, wherein ordinary bill is mainly the bill for not needing to pay the expenses of taxation, for example, can be with
It is the super purchase receipts of quotient (being commonly called as shopping receipt);Special bill is mainly the bill for needing to pay the expenses of taxation, for example, it may be hair
Ticket red rushes invoice etc..It for electronic bill, is typically maintained in long-range centralized server, realizes unified management.
Since centralized server is usually to be protected with electronic bill of certain cipher mode to preservation, it is easy to
It is managed illegally distorting and destroy for personnel, once information is difficult to restore by criminal's rogue attacks, even if there is information standby
The safeguard measures such as part, the risk for still thering is information to lose.In addition, being usually on electronic bill includes multiple fields, each word
The meaning of segment table sign is different, these fields constitute the element of electronic bill, for describing the transaction knot of corresponding electronic bill
Fruit.It is to be understood that the quantity for the field that different types of electronic bill is included, the type of field may be different,
Such as electronic invoice, field can for title, cargo or the dutiable service of purchaser, service name, specifications and models, quantity,
Unit price, the amount of money, the tax rate, the amount of tax to be paid, the title of seller, the Taxpayer Identification Number of seller, the bank of deposit of seller and account are opened
Ticket people, payee etc..The above field constitutes the complete information of entire electronic bill, protects if these fields are not audited
There are centralized servers, then are easy to bring into some sensitive informations.The sensitive information mentioned in the application can be pornographic
Information, information of specific crowd (name) that category information, illegal activity are related to etc..Once these sensitive informations are brought into, then
Lead to the presence of a large amount of unqualified electronic bills.
It will be apparent that above-mentioned electronic bill is stored in long-range centralized server, the data which is saved
In the presence of the risk for being tampered or destroying, also, due to not carrying out sensitive letter to each field to be written before electronic bill generates
The detection of breath will lead to the underproof probability of electronic bill and increase, and frequently modifies and undoubtedly again increase electronic bill quilt
The risk distorted or destroyed.
In view of presently, there are the above problem, present applicant proposes the information processing technologies based on block chain to electronic bill
Scheme can prevent the information of electronic bill to be tampered or destroy by the technical solution, while improve the qualification of electronic bill
Rate.
In order to make it easy to understand, the system architecture being applicable in below the technical solution of the application is introduced.Referring to Fig. 1 institute
A kind of structure composed of the information processing system of electronic bill provided by the present application shown.
As shown in Figure 1, the information processing system of the electronic bill of the application may include personal user's terminal 11, enterprise's use
Family terminal 12, server 13 and block chain network 14 and inquiry terminal 15.
In specific implementation, personal user's terminal 11 can issue billing information interface by the application itself installed
It is upper to provide information input interface and information transmitting unit for personal user (the initiation user that bill is issued in request).Specifically, a
People's user terminal 11 gets the field to be written of personal user's input by information input interface, these fields to be written are
The field that blank bill is written needs to be explanation, and write-in here is not equal to hand-written write-in, only described in table name to
The mode that project in write-in field and the blank bill matches.Personal user's terminal 11 is only to obtain the word to be written
Section can not achieve operation of really making out an invoice.After information transmitting unit is triggered, personal user's terminal 11 passes through the first communication
The field to be written obtained by information input interface is sent to enterprise UE terminal 12 by network.It is to be understood that
Personal user's terminal 11 in the application include but is not limited to the smart phone for being mounted with application mentioned above, tablet computer,
Desktop computer and wearable device etc..
Enterprise UE terminal 12 is to realize the tie communicated between personal user's terminal and server 13, enterprise UE terminal
12 are authenticated by server 13.Enterprise UE terminal 12 will not only receive the field to be written of personal user's terminal transmission,
Also needing to receive enterprise customer (has and provides the user of bill obligation for personal user, for example, it may be selling businessman) input
Field to be written.Server 13 is that enterprise UE terminal 12 is reserved with corresponding information input interface, passes through enterprise customer's end
End 12 can directly access server 13, detailed process are as follows: enterprise UE terminal 12 leads to according to the request of personal user's terminal 11
The second communication network access server 13 is crossed, so that the solicited message for carrying the field to be written be connect by information input
Mouth is input to server 13.Since different enterprise UE terminals 12 is corresponding with different information input interfaces, enterprise uses
Family terminal 12 can not need to send the identity information of itself again, certainly, even if no need to send certainly for enterprise UE terminal 12
The identity information of body, server 13 need the interface message and enterprise according to information input interface in follow-up treatment process
The corresponding relationship of the identity information of industry user terminal obtains the identity information of enterprise UE terminal 12, and participates in subsequent information
Processing is to be traced.It should be noted that enterprise UE terminal 12 is also not the real terminal for generating bill, also it is
Play the role of intermediary.It is to be understood that the enterprise UE terminal 12 in the application includes but is not limited to have by taking
Smart phone, tablet computer, desktop computer and the wearable device of information input interface etc. that business device 13 provides.
Server 13 can be the private server for specially realizing a certain single business, and being also possible to one can be real
The generic server of existing multiple business, does not influence the realization of technical scheme.Under normal conditions, server 13 is dedicated
Server is only used for realizing the function of access block chain network 14.In the application, personal user's terminal 11 and enterprise customer are whole
End 12 all cannot directly access block chain network, need by server 13, that is to say, that block chain network 14 licenses to service
Device 13, each enterprise UE terminal 12, which is required to just to be written into field by server 13, is transmitted to block chain network 14, and
Cannot data interaction individually be carried out with block chain network 14.Server 13 is usually to have multiple, each server and multiple enterprises
These fields are sent to block chain to receive the field to be written that each enterprise UE terminal 12 is sent by the communication of user terminal 12
Network 14.In specific implementation, server 13 obtains being sent by enterprise UE terminal 12 to be written by the second communication network
Field.
Server 13 has private key with the legal identity for authentication server 13, before being written into field cochain, needs
Server 13 is wanted to be encrypted to obtain signed data to the corresponding Hash result of field to be written by the private key of itself, then again
Signed data is back to block chain network 14.Block chain network 14 can carry out signed data using the public key of the server 13
Decryption, to obtain Hash result, then judges whether the Hash result is consistent with the Hash result for being sent to server 13, such as
Fruit is consistent, show that the field to be written of wanted cochain is correct, and is sent by legal server, is completed with this to label
The sign test of name data.It will be apparent that the process of sign test not only ensure that the accuracy of field to be written also assures field to be written
Source legitimacy.
In addition, server 13 can also carry out the detection of sensitive information to field to be written, it is equivalent to a kind of detection in advance,
If detect that field to be written does not include sensitive information, then it is written into field and is sent to block chain network 14.It can manage
Solution ground is that non-sensitive information database used in server 13 can be with non-sensitive information database used in block chain network 14
It is identical, in addition, the database can be local data base, it is also possible to third party database.It is to be understood that the present embodiment
In server 13 include but is not limited to Cloud Server, physical server and virtual server etc..
Block chain network 14 be usually include multiple block chain nodes 140, each block chain node includes multiple areas
Block chain, for storing data.In fact, can individually be deposited by a target block chain node 141 in block chain network 14
The operation except data is stored up, for example, communicating with server 13 and the detection of sensitive information.The target block chain node 141 is clothes
Business device 13 is reserved with interface of making out an invoice, and is used for issued notes, and target block chain node 141 obtains server by third communication network
13 fields to be written sent by interface of making out an invoice.Target block chain node 141 after getting the field to be written, firstly,
The detection that sensitive information is carried out to the field to be written, then carries out sign test to the signed data of server 13 again, finally, testing
Label carry out uplink operation after passing through, so that the field to be written comprising sensitive information be avoided to store to block chain network 14.In
Used non-sensitive information database can be the local data base established in block chain network 14 in detection process, can also be with
It is to be obtained from third party database by target block chain node 141.
The process of sign test is specifically included that when target block chain node 141 judges that field to be written does not include sensitive information
When, Hash operation can be carried out to field to be written and obtain Hash result, Hash result is then back to server 13 again, is serviced
Device 13 encrypts Hash result to obtain signed data after receiving Hash result by the private key of itself.Server 13
Signed data is back to target block chain node 141, target block chain node 141 is by the public key of server 13 to number of signature
According to being decrypted to obtain the Hash result in signed data, and judge the Hash result the phase one whether Hash result issues with it
It causes, if unanimously, illustrating that current server 13 is legal server and field to be written is not tampered with, sign test passes through.
After sign test passes through, the Hash result that target block chain node 141 can be written into field is committed to any area
Block chain node 140, for the Hash operation result submitted after the success cochain of either block chain node 140, the Hash result will
It is quickly transferred to other block chain nodes 140 within grade period second to be saved, each block chain node 140 passes through collaboration
Cooperation, maintains full dose director data, this process is considered as success of making out an invoice.Under normal conditions, target block chain node 141 will also
The successful information of cochain is back to server 13, can also be back to enterprise UE terminal 12, enterprise customer by server 13 again
Terminal 12 is back to personal user's terminal 11.
In the application, in addition to can recorde block-identified symbol, the information of bill, ticket in the either block of block chain network 14
According to generate operation note, binary tree root Hash and with except Hash result, can also further record block chain mark and
The information such as block chain account address.
After the block-identified symbol is mentioned above either referring to the block head progress Hash processing to a upper block
Obtained identifier may also mean that the block height of current block;The information of bill may include the field to be written, ticket
According to unique ID, the unique ID of enterprise UE terminal, server ip address, server public key etc.;The bill generates operation note
It may include personal user, enterprise customer, the corresponding operation of server and corresponding timestamp etc.;The binary tree specifically can be with
It is Merkle tree;The block chain identifies the mark for characterizing current block chain, can be adapted for that there are a variety of different blocks
The needs of chain apply the scene across chain technology;The block chain account address is that registration user obtains after registering block chain account
Address information, registration process can specifically include: after the Account Registration information for getting registration user, for registration user's creation
Account private key, and account public key corresponding with account private key is generated using elliptic curve, then calculated using uni-directional hash
Method carries out operation to account public key, to obtain block chain account address.
It is to be understood that the node device type of target block chain node 141 and block chain node 140 in the application
Including but not limited to various types of servers, personal computer, handheld terminal etc..
In the application, target block chain node 141, which has, to be collected block chain data, provides block chain browsing data inquiry function
Can, the function of private key generation service, account executive be provided for user.The application user can be with by target block chain node 141
View the profile information of block chain.
In addition, target block chain node 141, which can use the 4th communication network, obtains being directed to for the inquiry initiation of terminal 15
Then the inquiry request of cochain field inquires the information being collected into from block chain network 14, accordingly to obtain
State cochain field.Specifically, inquiry terminal 15 obtains block height, the transaction of user's input by the search box on interface
The search keys such as cryptographic Hash or block cryptographic Hash, electronic bill number, then send to target block chain node 141 comprising upper
State the inquiry request of search key.After target block chain node 141 gets inquiry request, found out from block chain network
Cochain field corresponding with above-mentioned inquiry request, and be back on the terminal interface of inquiry terminal 15.
It should be noted that since the sensitive information in non-sensitive information database is variation, it is the possible a certain moment, a certain
Field to be written, which does not include, a sensitive information, and success cochain, but with the variation of sensitive information, at another moment, this
It is possible to include sensitive information in field to be written.Therefore, it is based on the situation, target block chain node 141 further includes secondary
Detect sensitive information.If target block chain node 141 in secondary detection sensitive information, confirms that a certain field of cochain includes
There is sensitive information, then when target block chain node 141 and inquiry terminal 15 carry out data interaction, if the bill being queried
This corresponding bill of cochain field, then target block chain node 141 be back to inquiry terminal 15 terminal interface on it
Before, it needs to pre-process the field of cochain for including sensitive information, can be shielding processing or block processing, it e.g., can
" * " number is replaced with the field of cochain that will include sensitive information, so that can only show on the terminal interface of inquiry terminal 15
Show the other fields for not including in the bill and having sensitive information.
It is to be understood that inquiry terminal 15 is the terminal that monitoring party is held, the effect of supervision is implemented.Wherein, it supervises
Guan Fangwei to electronic bill carry out examination verification manager, inquiry terminal 15 include but is not limited to smart phone, tablet computer,
Wearable device and desktop computer etc..If enterprise customer needs to inquire, enterprise customer by enterprise UE terminal 12 with
It inquires terminal 15 and establishes communication, query result is sent to enterprise UE terminal 12 by inquiry terminal 15.If it is personal user
It needs to inquire, then personal user is established by personal user's terminal 11 and enterprise UE terminal 12 and communicated, and then enterprise customer is whole
End 12 is established with inquiry terminal 15 and is communicated, and query result is sent to enterprise UE terminal 12 by inquiry terminal 15, finally by looking forward to
Query result is sent to personal user's terminal 11 by industry user terminal 12.In a specific embodiment, it is back to enterprise's use
The query result of family terminal 12 or personal user's terminal 11 can be presented using the file of PDF format.
It should be noted that above-mentioned first communication network, the second communication network, the third communication network, the 4th of the application
Communication network can according in actual application Network status and application demand determine, either radio communication network
Network, such as mobile communication network or WIFI network, are also possible to wire communication network;Either wide area network, allows in situation
When can also use local area network.
In the structure composed of the information processing system of electronic bill shown in FIG. 1, block chain network 14 is in addition to for treating
Field is written to carry out outside the detection of sensitive information, also has the function of to save corresponding electronic bill of field to be written etc..
In order to make those skilled in the art more fully understand application scheme, with reference to the accompanying drawings and detailed description
The application is described in further detail.
Fig. 2 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.As shown in Fig. 2,
This method comprises:
S101: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database
It include sensitive information.
In the embodiment of the present application, non-sensitive information database can be the database being locally created in block chain network, can
With by either block chain node or several block chain node maintenances, for example, target block chain node mentioned above, can also be
Third party database.The either non-sensitive information database established of which kind of mode, requires block chain network and its visit is known in advance
Diameter of asking the way accesses the database when in order to carry out sensitive information detection again.
By taking target block chain node mentioned above as an example, if non-sensitive information database is in the data being locally created
Library, then target block chain node also need to receive monitoring party to the increasing of non-sensitive information database, the operation such as delete, change, look into.It can manage
Solution ground is that user mainly increases sensitive information, user to non-sensitive information database to the increasing operation of non-sensitive information database
Deleting operation and mainly deleting sensitive information, user is mainly modification sensitive information, user to the operation that changes of non-sensitive information database
To the sensitive information of non-sensitive information database looked into operation mainly inquiry current database and include.
If non-sensitive information database is local data base, in order to improve the maintenance cost of non-sensitive information database, need
Deduplication operation periodically is carried out to sensitive information, to reject duplicate sensitive information.In addition, database is tampered in order to prevent
Or destroy, it needs to take non-sensitive information database and mostly back up, and be periodically compared.It is operated to non-sensitive information database
Before, it needs to carry out subscriber authentication, if identity is illegal, not to user's open operation permission.
S102: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing
Enter the field of blank bill.
In the embodiment of the present application, personal user's terminal can provide information input interface for personal user, pass through the information
Input interface, the field to be written of available personal user's input.Under normal conditions, personal user is according to personal user's terminal
The information input interface of offer inputs corresponding field to be written, for example, field to be written may include subscriber phone field, use
Family name field, station address field, bill type field, Taxpayer Identification Number, items list field etc..
In order to allow personal user more easily to provide field to be written, personal use can be established according to the type of bill
Family information database, to save corresponding field to be written.For example, being linked to individual according to the type of the bill of user's input
Then User Information Database directly extracts the field to be written saved in personal user information database.Personal user only needs
It not to be needed every time according to the part field to be written in the current desired bill modification personal user information database wanted
Identical field to be written is inputted, all so as to improve the efficiency of input.In addition, either local personal user information database
Or third party's personal user information database can be personal user information for the safety of personal user information database
The corresponding authentication mechanism of data lab setting, if it is legitimate user, is opened for verifying whether active user is legitimate user
The permission of database is accessed, for extracting the field to be written saved in personal user information database, or modification individual
The field to be written saved in User Information Database.If it is illegal user, access personal user information database is closed
Permission, to forbid extracting the field to be written that saves or modification personal user information data in personal user information database
The field to be written saved in library.
S103: the field to be written is sent to enterprise UE terminal by personal user's terminal.
Personal user's terminal be also used to receive personal user input confirmation message, for example, personal user confirmation respectively to
When write-in field is correct, in the display interface, confirmation key is clicked.Personal user's terminal, will when receiving confirmation message
The field to be written obtained is sent to enterprise UE terminal.
In the present embodiment, the communication of personal user's terminal and enterprise UE terminal, if it is communicating for the first time, then personal user
Terminal needs to send the identity information of personal user, in order to which enterprise UE terminal saves the information, facilitate it is subsequent again with it is a
When people's user terminal communicates, corresponding identity information is directly transferred.It is to be understood that enterprise UE terminal can will
The identity information of people user is stored in local.In addition, each field to be written is combined to obtain corresponding bill in order to subsequent,
Each field to be written has its unique attribute to be associated with it, and the two can be regarded as binding relationship, for example, for one
Subscriber phone field to be written, the attribute of the field to be written is subscriber phone, rather than station address.Therefore, personal user
Terminal is described to be written to the enterprise UE terminal transmission field to be written and enterprise UE terminal to server transmission
When field, information confusion will not be led to the problem of.
S104: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
It is to be understood that enterprise customer is that have to provide the user of bill obligation, therefore, billing information for personal user
On should include the identity information of enterprise customer and the Transaction Information of this bill.In the embodiment of the present application, enterprise customer is whole
End can provide information input interface for enterprise customer, by the information input interface, available enterprise customer input to
Field is written.
Under normal conditions, the information input interface input that enterprise customer provides according to enterprise UE terminal is corresponding to be written
Field, for example, field to be written may include drawer's field, auditor's field, memo field etc..
In addition, enterprise UE terminal is also used to receive the confirmation message of enterprise customer's input, for example, enterprise customer is confirming
When each field to be written is correct, in the display interface, confirmation key is clicked.Enterprise UE terminal is receiving confirmation message
When, all fields to be written are sent to server.
Further, each field to be written is combined to obtain corresponding bill, each field to be written in order to subsequent
There is its unique attribute to be associated with it, the two can be regarded as binding relationship, for example, for drawer's field, it should
The attribute of field is drawer, rather than auditor.Also, the field to be written attribute having the same in same bill with
It is the different field of same bill for identification.Therefore, enterprise UE terminal is sending the field to be written to server
When, it will not lead to the problem of information confusion.
It illegally makes out an invoice in order to prevent, corresponding authentication mechanism can be set for enterprise UE terminal, for verifying current use
Whether family is legitimate user, if it is legitimate user, the permission for operation of making out an invoice, with input make out an invoice it is required corresponding to be written
Enter field.If it is illegal user, the permission for operation of making out an invoice is closed, to forbid inputting required corresponding word to be written of making out an invoice
Section.In addition, drawer's erroneous input drawer field in order to prevent, authentication information that enterprise UE terminal is inputted also according to user
Type matching is to drawer corresponding with the type, and drawer's field to be written as enterprise customer's input.
S105: all fields to be written are sent to server by enterprise UE terminal.
In the present embodiment, the communication of enterprise UE terminal and server, if it is communicating for the first time, then enterprise UE terminal is needed
The identity information of enterprise customer is sent, in order to which server saves the information, is facilitated subsequent logical with enterprise UE terminal again
When news, corresponding identity information is directly transferred.It is to be understood that server can protect the identity information of enterprise customer
There are locals.
Since enterprise UE terminal and server communication are usually telecommunication, information is lost in transmission process in order to prevent
It becomes estranged the risk of leakage, in the application, whole fields to be written can also be encrypted in enterprise UE terminal, and will
Field to be written after encryption is sent to server.In addition, in order to improve the efficiency of transmission, enterprise UE terminal can be with
Compression processing is carried out to whole fields to be written, and the field to be written after compression processing is sent to server.
S106: server obtains the field to be written that enterprise UE terminal is sent.
In the present embodiment, server need according to the mode that enterprise UE terminal is sent determine the need for decryption processing or
Whether person needs decompression.It is to be understood that if enterprise UE terminal encrypts all fields to be written
Processing, then corresponding server needs are decrypted according to field to be written of the corresponding decryption method to encryption;Such as
Fruit enterprise UE terminal has carried out compression processing to all fields to be written, then corresponding server is needed according to corresponding decompression
Contracting method unzips it the field to be written that compression processing is crossed.
S107: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S108: block chain network judges whether the field to be written includes the sensitive information.
In the present embodiment, block chain network needs to carry out each field to be written the detection of sensitive information, prevent include
The problem of can not being modified after the field cochain to be written of sensitive information.
Non-sensitive information database can be locally created in block chain network, include multiple sensitive informations in the database,
When detecting sensitive information, a certain sensitive information or a certain field to be written are missed in order to prevent, can be using the side of double traversals
The whole fields to be written of formula, i.e. traversal and the mode for traversing whole sensitive informations, for example, in particular order, from first
A field to be written starts, and successively judges whether to include first sensitive information in non-sensitive information database, if comprising,
Then illustrate that current field to be written includes sensitive information, otherwise judges whether to include next in non-sensitive information database
Sensitive information, until each of non-sensitive information database sensitive information both participates in judgement, then the identical method of use is sentenced
Disconnected second field to be written, until all fields judgement to be written finishes.
It is to be understood that the mode of above-mentioned judgement is carried out to all fields to be written and whole sensitive informations
Judgement, be advantageous in that, detection sensitive information it is more accurate, still, workload be also it is huge, especially sensitive information compared with
When more, become apparent.Based on this, sensitive information can also be divided, be divided multiple sensitive informations according to partitioning standards
It for several sensitive information groups, and is the label information of each group of setting group, likewise, block chain network is obtaining word to be written
Duan Shi obtains the label information of each field to be written according to the partitioning standards being previously mentioned, and according to the mark of each field to be written
Information is signed, the filtering of sensitive information is carried out in corresponding sensitive information group, referring specifically to table 1.As shown in table 1, sensitivity is believed
Sensitive information in breath database is divided into 4 sensitive information groups, and each sensitive information group has the label information of itself, each
The quantity of sensitive information in sensitive information group may be identical, it is also possible to different.It is to be understood that table 3 is merely possible to one
Kind concrete application scene is described, and the listed quantity of sensitive information group and the quantity of sensitive information are not unique reality
Apply mode.In addition, different partitioning standards may cause the same sensitive information with two or more label informations, make
It obtains the sensitive information to occur in different sensitive information groups, this is also satisfactory, not the realization of influence technique scheme.
Table 1
Block chain network is when judging each field to be written, if any field to be written includes sensitive information,
Then illustrate that other fields to be written that same bill is constituted with the field to be written can not also participate in subsequent uplink operation, area
It includes quick that block chain network, which can return to the information of cochain failure to server to prompt field to be written involved in the bill,
Feel information, does not meet related request.The information of cochain failure can also be returned to enterprise UE terminal, enterprise customer's end by server
It is to be written involved in personal user's bill to prompt that the information of cochain failure can also be back to personal user's terminal by end
Entering field includes sensitive information, does not meet related request.In other embodiments, information of the block chain network in cochain failure
In carry instruction information, it includes sensitive information which, which is used to indicate specific field to be written,.When personal user is logical
Cross personal user's terminal get cochain failure information when, can be checked and be modified, and again to enterprise UE terminal
Send the new field to be written of write-in.
In specific implementation, some fields to be written comprising sensitive information are normal, in order to prevent this error detection
The problem of, as preferred embodiment, before S108, block chain network presets sensitive information white list;Then sentence
Whether the field to be written of breaking includes information in the sensitive information white list;If do not included, enter S108, it is no
Then, step corresponding to uplink operation is directly carried out.
It is to be understood that field to be written is magnanimity, if detected to each field, undoubtedly workload
Be it is huge, moreover, the sensitivity coefficient of not all field to be written be all it is high, therefore, in order to reduce workload, improve detection
Efficiency.Preferably embodiment, it is described judge whether the field to be written includes the sensitive information before also wrap
It includes:
Predefine the type of the field of screening;
Extract the target field to be written for meeting the type in the field to be written.
Judge whether field to be written includes the sensitive information it is to be understood that described specifically: judge the mesh
Mark whether field to be written includes the sensitive information.
Under normal conditions, the type includes but is not limited to: subscriber phone field, address name field, station address
Field, items list field, memo field, drawer's field, auditor's field.
It should be noted that the detection mentioned above for carrying out sensitive information to field to be written can directly carry out data
Splicing or jsonization or be formatted into other any forms (for example, binary system, hexadecimal etc.).
S109: when the field to be written does not include the sensitive information, block chain network is to the field to be written
Hash operation is carried out to obtain the Hash result.
S110: block chain network sends the Hash result to server.
It is to be understood that the data for needing to treat cochain carry out Hash operation before carrying out uplink operation to data
With digital signature processing, in this application, the data to cochain are exactly field to be written.
In a specific embodiment, the mode that block chain network carries out Hash operation to field to be written has following two
Kind:
The first: the field to be written detection of an each pair of bill of block chain network finishes, just at once in the bill
Information carries out Hash operation in order to carry out uplink operation.It is to be understood that the method is not necessarily to record testing result, so that right
The bill answered can rapid chain loading in the shortest time, can substantially shorten the time window of extraneous altered data in this way, increase
The difficulty and cost of data tampering.
Second: after block chain network has detected the field to be written of multiple bills, the ticket for having sensitive information will not included
Hash operation is carried out according to corresponding field to be written.It is to be understood that the method can effectively reduce detection sensitive information and
The switching times of Hash operation, but need to record the testing result of every bill.More specifically, block chain network can be set
The quantity of the bill detected every time after reaching this quantity, then carries out Hash operation, such as this quantity can be 10, i.e.,
Field to be written corresponding to 10 bills carries out the detection of sensitive information, after detect, by not comprising sensitive information to
Word is written and carries out Hash operation.
S111: server encrypts the Hash result to obtain the signed data according to the private key of itself.
S112: the signed data is sent to block chain network by server.
Server used private key when carrying out above-mentioned digital signature, can save in the server, work as service in this way
When device is needed using private key, directly transferred from local, naturally it is also possible to be to be saved by third party tube platform, work as server
When needing, third party tube platform is accessed.
In order to improve the safety of private key in server, server is in addition to needing to avoid that any protection processing will not be carried out
Private key is stored directly in local, it is also necessary to avoid to be stored in by conventionally known coding or the processed private key of encryption technology
It is local.In the embodiment of the present application, a set of customized private key protection mechanism can be created on server local, wherein this is made by oneself
Adopted private key protection mechanism includes but is not limited to customized private key encoding mechanism or customized private key encryption mechanism.Server is to private
Before key is saved, first with above-mentioned customized private key protection mechanism, respective handling is carried out to private key, then by treated
As a result it is stored in local.When subsequent server needs to call private key, can based on above-mentioned customized private key protection mechanism come
Restore private key.It is a kind of unknown private key protection machine for the external world since above-mentioned private key protection mechanism is customized
System, and for the external world, server use which kind of protection mechanism on earth carry out private key protection be also it is unknown, lead in this way
Above-mentioned private key protection scheme is crossed, the probability that private key is intercepted and captured by the external world can be effectively reduced, greatly improve local private key
Safety.
It is to be understood that in actual application, related technical personnel customized according to actual needs can meet
The private key protection mechanism of actual operation requirements.According to customized private key protection mechanism, server can be before saving private key
Corresponding protection processing first is carried out to private key.For example, in a specific embodiment, if private key can be divided by server
Dry is assigned with the segment of serial number, then modifies according to private key segment of the different segment alteration rulers to different serial numbers,
And the private key segment after all modifications is saved respectively to multiple and different storage locations of local periodically dynamic change.Example
Such as, private key is divided into 3 segments, wherein the corresponding segment alteration ruler of the 1st segment is by n-th of word of the 1st segment
Symbol and n-th of character reciprocal exchange, and the corresponding segment alteration ruler of the 2nd segment is to add one to the tail portion of the 2nd segment
Preset characters, the corresponding segment alteration ruler of the 3rd segment are that the specific character in the 3rd segment is all changed to another kind
Preset characters, after obtaining 3 modified private key segments according to above-mentioned segment alteration ruler, just they are saved respectively to
The corresponding 3 different storage locations of current storage location change cycle.It is to be understood that the later period when restoring private key, needs
The characteristics of first periodically being changed according to segment storage location, determine the storage location of different private key segments, then according to not
With segment serial number, corresponding different fragments alteration ruler restores the script information of different fragments, then carries out piece based on numeric order
Section splicing, can restore private key.
Since block chain network is made of multiple block chain nodes, each block chain node can be carried out sign test, because
This, signed data can be sent to any one block chain node by server.It should be noted that server is in order to reduce area
The case where workload of certain block chain link points is excessive in block chain network or is chronically at idle state, in the application, service
The signed data is sent to the process of block chain network by device, may include: server according to current each block chain node
Information on load and location information screen the block chain link point in the block chain network, obtain destination node, then will
The signed data is uploaded to the destination node.That is, the server in the present embodiment can voluntarily select block chain node
As the node for directly acquiring uplink data, also, server can be according to the information on load and location information of block chain node
Screen current suitable block chain node, server can select that current loads are smaller and geographical position in this way
Moderate block chain node is set as the direct node for receiving uplink data.In a specific embodiment, server may be used also
Hash operation result and corresponding signed data are uploaded to by using random in a manner of randomly selecting block chain network node
Block chain network node.In another embodiment specific implementation mode, server can also be by the way of poll, successively selected block
Chain node is as destination node.
S113: block chain network receives the signed data that the server returns, and utilizes the public key of the server
Sign test is carried out to the signed data, and stores the field to be written to block chain after sign test passes through.
Sign test process in the present embodiment is that signed data is decrypted and is verified using public key in fact.Usual situation
Under, the public key of server is stored in local, and the equipment where any one block chain node in block chain network is all preserved
The public key of server.On the one hand the Hash result being encrypted by private key is restored by public key, on the other hand compare the Kazakhstan restored
Whether uncommon result and the Hash result for being sent to server are consistent, to determine whether the Hash result is tampered.In the present embodiment,
After arbitrary node in block chain network gets the signed data of server transmission, first the signed data can be tested
Label after sign test passes through, just generate the block for preserving the Hash result in the signed data on this node, then broadcast
Other nodes into block chain network, other nodes are received and are verified, and can chase after above-mentioned block after being verified
It adds on block chain.
The embodiment of the present application judges that above-mentioned field to be written is after obtaining the field to be written for blank bill to be written
The no detection realized comprising sensitive information to above-mentioned field to be written will when above-mentioned field to be written does not include sensitive information
Above-mentioned field to be written carries out Hash operation, and after sign test passes through, obtained Hash result is stored on block chain.Thus
As it can be seen that the embodiment of the present application is that the corresponding field of electronic bill is stored by block chain network, so that after each field cochain,
Just can not be tampered, be effectively ensured monitoring party anaphase nucleus check tickets according to when authenticity.In addition, before cochain, also to upper
State the detection that field carries out sensitive information, effectively prevent include sensitive information field cochain after the problem of can not modifying, together
When also reduce the risk that more problem bill is stored in block chain network.
Fig. 3 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.Referring to Fig. 3 institute
Show, wherein the description that the description of S201-S213 is implemented referring to upper one, this method further include:
S214: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information,
If it is, the label corresponding bill of cochain field.
It is to be understood that the sensitive information in non-sensitive information database is dynamic change, for cochain
Cochain field may still include sensitive information, therefore, in the present embodiment also need to carry out sensitive letter to cochain field again
The detection of breath.Specific detection process is identical as the detection mode before field cochain to be written, the description seen above.
In order to accelerate the speed of detection, used sensitive information when can mark detection before each field cochain to be written
The situation of change of the sensitive information of the version of database and each version, by comparing current non-sensitive information database with it is upper
The sensitive information that used non-sensitive information database is newly increased before chain, in this detection, it is only necessary to detect cochain
Whether field includes the sensitive information newly increased.
It is to be understood that cochain field is magnanimity, if detected to each field, undoubtedly workload
Be it is huge, moreover, the sensitivity coefficient of the not all field of cochain be all it is high, therefore, in order to reduce workload, improve secondary inspection
The efficiency of survey.Preferably embodiment judges whether the field of cochain stored on the block chain includes institute described
Before stating sensitive information further include:
Predefine the type of the field of screening;
It extracts and meets the target of type cochain field in the cochain field.
Judge whether the field of cochain stored on the block chain includes the sensitive information it is to be understood that described
Specifically: judge whether cochain field includes the sensitive information to the target stored on the block chain.
Under normal conditions, the type includes but is not limited to: subscriber phone field, address name field, station address
Field, items list field, memo field, drawer's field, auditor's field.
In the application, block chain network is synchronous with can be to server return Hash result for the detection of sensitive information
, it is also possible to asynchronous.So-called synchronization is exactly that block chain network first judges whether field to be written includes sensitive information,
When judging result shows not including sensitive information, then Hash operation is carried out to field to be written and obtains Hash result, and will be breathed out
Uncommon result is back to server, the process as shown in figure N.It is so-called asynchronous, it is exactly that block chain is judging the field to be written
While whether including the sensitive information, Hash operation is carried out to obtain the Hash result, so to the field to be written
The Hash result is sent to the server afterwards.
Synchronous process
Fig. 4 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.Institute referring to fig. 4
Show, this method comprises:
S301: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database
It include sensitive information.
S302: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing
Enter the field of blank bill.
S303: the field to be written is sent to enterprise UE terminal by personal user's terminal.
S304: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
S305: all fields to be written are sent to server by enterprise UE terminal.
S306: server obtains the field to be written that enterprise UE terminal is sent.
S307: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S308: block chain network judges whether the field to be written includes the sensitive information.
S309: when the field to be written does not include the sensitive information, block chain network is to the field to be written
Hash operation is carried out to obtain the Hash result.
S310: block chain network sends the Hash result to server.
S311: server encrypts the Hash result to obtain the signed data according to the private key of itself.
S312: the signed data is sent to block chain network by server.
S313: block chain network receives the signed data that the server returns, and utilizes the public key of the server
Sign test is carried out to the signed data, and stores the field to be written to block chain after sign test passes through.
S314: when the field to be written includes the sensitive information, block chain network intercepts the field to be written,
And generate interception record.
S315: block chain network sends the information for failure of making out an invoice to server.
S316: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information,
If it is, the label corresponding bill of cochain field.
In the present embodiment, block chain network first carries out the detection of sensitive information to field to be written, is not including sensitive letter
When breath, subsequent step is just carried out, avoids the field cochain to be written comprising sensitive information, but asking there is also low efficiency
Topic.
During due to synchronization, it is usually to take biggish inspection that cochain field, which includes that the probability of sensitive information is smaller,
Survey period progress secondary detection.For example, the period can be 6 months, 1 year etc..In order to adapt to the variation of non-sensitive information database,
And bill of finding the problem in time, in the present embodiment, sensitive information detection is carried out to the field of whole bills.
Preferably embodiment, it is described to judge whether the field of cochain stored on the block chain includes described quick
Sense information specifically includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the label corresponding bill of cochain field.
Asynchronous process
Fig. 5 is the flow chart of the information processing method of another electronic bill provided by the embodiments of the present application.Referring to Fig. 5 institute
Show, this method comprises:
S401: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database
It include sensitive information.
S402: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing
Enter the field of blank bill.
S403: the field to be written is sent to enterprise UE terminal by personal user's terminal.
S404: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
S405: all fields to be written are sent to server by enterprise UE terminal.
S406: server obtains the field to be written that enterprise UE terminal is sent.
S407: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S408: block chain network carries out Hash operation to the field to be written to obtain the Hash result, Xiang Suoshu
Server sends the Hash result, and judges whether the field to be written includes the sensitive information.
S409: server encrypts the Hash result to obtain the signed data according to the private key of itself;
S410: the signed data is sent to block chain network by server;
S411: block chain network receives the signed data that the server returns.
S412: block chain network judges whether there is the corresponding judging result of the field to be written.
S413: if there is the judging result, then block chain network judge the judging result whether characterize it is described to
Field is written and does not include the sensitive information.
S414: if there is no the judging result, then block chain network judges whether to reach preset delay time, such as
Fruit is not up to, then returns to S412.
S415: if reaching the preset delay time or not including the sensitive information, the server is utilized
Public key to the signed data carry out sign test.
S416: when the field to be written includes the sensitive information, block chain network intercepts the field to be written,
And generate interception record.
S417: block chain network sends the information for failure of making out an invoice to server.
S418: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information,
If it is, the label corresponding bill of cochain field.
In the present embodiment, block chain network carries out the detection and Hash operation of sensitive information simultaneously, so that server is not required to
Signed data can be sent to block chain network by waiting the judging result of sensitive information, save interaction to a certain extent
Efficiency.Although in S415, obtaining server it is worth noting that, asynchronous process can be improved interactive efficiency
After signed data, if judging result is still not present by default delay time, it is directly written into data cochain.It can
See, the step in, may there are problems that one or more fields to be written include sensitive information and cochain.In order to overcome
This problem, the application also provide corresponding measure, i.e., carry out secondary detection to cochain field.It is to be understood that for
What a upper embodiment was mentioned carries out secondary detection to cochain field, is especially adapted for use in the feelings by asynchronous mode cochain
Condition.
During asynchronous, it is usually to take lesser inspection that cochain field, which includes that the probability of sensitive information is larger,
Survey period progress secondary detection.For example, the period can be 1 month, 2 months etc..Since detection cycle is shorter, so if right
Whole blocks are detected, then workload is huge, so only the upper detection of detection is all in each detection cycle in the present embodiment
Phase is to current newly generated block.
Fig. 6 is a kind of process of detection method that sensitive information is carried out to cochain field provided by the embodiments of the present application
Figure.As a preferred embodiment, whether the field of cochain for judging to store on the block chain in the present embodiment
It is specifically included comprising the sensitive information:
S501: current block height is obtained;Wherein, high using the corresponding block height of a upper detection cycle as starting
Degree;
S502: cochain field is obtained described in whole bills from the corresponding block of current block height;
S503: whether the judgement cochain field includes the sensitive information, if comprising the sensitive information, into
Enter S504, otherwise enters S505;
S504: the label corresponding bill of cochain field, and enter S505;
S505: judging whether to reach current maximum block height, if not up to, entering S506, if reached, into
Enter S507;
S506: current block height is increased into a height, and returns to S502;
S507: the current maximum block height of record returns to S505 using the starting altitude as next detection cycle.
By the above process it is found that the detection mode only detects a upper detection cycle to current produced new cochain
Field.It is to be understood that needing all to detect whole cochain fields, as long as there is a cochain field in S503
Include sensitive information, then corresponding result be exactly include the sensitive information, into S504, if all do not included, correspond to
Result be exactly not include sensitive information, into S505.
Below by a specific application scenarios example to cochain of the electronic bill in block chain network and inquiry
Process is illustrated.Wherein, TrustSQL can be a kind of block chain bottom frame, can be compatible with Mysql and JsonRPC, and
Support a variety of common recognition algorithms.TrustSQL specifically uses Byzantine failure tolerance common recognition mechanism, allows Partial Block chain node delay machine, has
Conducive to reduction node cost of access and improve network reliability.The Digital Signature Algorithm of TrustSQL is digital signature of elliptic curve
Algorithm, private key can be generated by server oneself, so that the binding between the field to be written that server is sent and server
Relationship can not be tampered.
Fig. 7 is a kind of schematic diagram of application scenarios embodiment provided by the present application.As shown in fig. 7, personal user's terminal obtains
Get the field to be written of personal user's input, including username field, Taxpayer Identification Number field, bank of deposit and account word
Section, station address field, subscriber phone field, and above-mentioned field is sent to enterprise UE terminal, enterprise UE terminal is not only
The field to be written for receiving the input of personal user's terminal also receives the field to be written of enterprise customer's input, including items list word
Section, memo field, drawer's field, auditor's field etc..Above-mentioned whole field to be written, which is constituted, completes bill by enterprise customer
Terminal is sent to server, these fields to be written are sent to a block chain node of block chain network by server unification,
The node calls non-sensitive information database first to judge whether field to be written includes sensitive information.If field to be written
In a certain field include " AAA ", and one of non-sensitive information database sensitive information is " AAA ", then by sentencing
Disconnected, which includes sensitive information, otherwise, does not include sensitive information.When judging comprising sensitive information, then block
The field to be written is cut, and generates interception record, can be sent to server and intercept record to be prompted.Personal user is whole
End or enterprise UE terminal are modified according to prompt, execute the above process again.When judge field to be written do not include have
When sensitive information, the corresponding Hash result of field to be written is obtained by Hash operation, and Hash result is sent to server.
Server encrypts Hash result to obtain signed data according to the private key of itself, and one be sent in block chain network
Block chain node, which carries out carrying out sign test to signed data using the public key of server, subsequent if sign test passes through
To generate the block for including above-mentioned Hash result on the block chain node, and the block is broadcasted into its into block chain network
Above-mentioned block can be appended on block chain block chain node by he after other block chain node verifications pass through.It is subsequent such as
Fruit inquiry terminal needs to access to block chain network, then carries out looking into for corresponding bill by pre-set access mode
It askes, inquiry mode can be the number of electronic bill, Hash result etc..After obtaining query result, if including sensitive letter
Breath, then replace the field comprising sensitive information with " * ", and be back to inquiry terminal, thus which supervisor can determine
A little fields include sensitive information, which field is normal.
Fig. 8 is a kind of structure chart of the information processing unit of electronic bill provided by the present application.As shown in figure 8, the device
Include:
First obtains module 11, for obtaining the access path of non-sensitive information database, the sensitive information data in advance
It include sensitive information in library.
Second obtains module 12, for obtaining the field to be written of server transmission to judge whether comprising the sensitive letter
Breath;The field to be written is the field for blank bill to be written.
Message processing module 13 is used for when the field to be written does not include the sensitive information, to the server
The signed data of return carries out sign test;The signed data is particular by the corresponding Hash result of the field to be written and institute
The private key for stating server generates.
Information uploading module 14 stores the field to be written to block chain after passing through for sign test.
Mode, the information processing unit of electronic bill are preferably carried out as one kind further include:
First judgment module, whether the field of cochain for judging to store on the block chain includes the sensitive letter
Breath;
Mark module is when being for the result in the first judgment module, and the label cochain field is corresponding
Bill.
It is preferably carried out mode as one kind, message processing module 13 specifically includes:
First judging unit, for judging whether the field to be written includes the sensitive information;
When Hash operation unit for the judging result in the first judging unit is no, the field to be written is carried out
Hash operation is to obtain the Hash result;
Hash transmission unit, for sending the Hash result so that the server is according to the private to the server
Key encrypts the Hash result to obtain the signed data;
Receiving unit, the signed data returned for receiving the server;
First sign test unit carries out sign test to the signed data for the public key using the server.
It is preferably carried out mode as one kind, the first judgment module specifically includes:
First acquisition unit, for obtaining described in whole bills cochain field from block chain network;
Second judgment unit, for judging whether the cochain field includes the sensitive information, if comprising described
Sensitive information then triggers the mark module.
It is preferably carried out mode as one kind, the message processing module 12 specifically includes:
Processing unit, for carrying out Hash operation to obtain the Hash result, to the clothes to the field to be written
It is described so that the server according to the private key is encrypted to obtain to the Hash result that business device sends the Hash result
Signed data, and judge whether the field to be written includes the sensitive information;
Receiving unit, the signed data returned for receiving the server;
Third judging unit, for judging whether there is the corresponding judging result of the field to be written;
4th judging unit, for described to be written there are when the judging result, judging whether the judging result characterizes
Enter field not comprising the sensitive information;
5th judging unit, for judging whether to reach preset delay time there is no when the judging result, if
Not up to, then the third judging unit is triggered;
Second sign test unit utilizes institute when for not including the sensitive information or reach the preset delay time
The public key for stating server carries out sign test to the signed data.
It is preferably carried out mode as one kind, the first judgment module specifically includes:
Second acquisition unit, for obtaining current block height;Wherein, by the corresponding block height of a upper detection cycle
As starting altitude;
Third acquiring unit, for obtaining described in whole bills cochain word from the corresponding block of current block height
Section;
6th judging unit, for judging whether the cochain field includes the sensitive information, if comprising described
Sensitive information then triggers the mark module and triggers the 7th judging unit or do not include the sensitive information, then described in triggering
7th judging unit;
7th judging unit reaches current maximum block height for judging whether;
Current block height is increased a height, and touch when for not up to current maximum block height by adding unit
Send out third acquiring unit;
Recording unit when for reaching current maximum block height, records current maximum block height using as next
The starting altitude of detection cycle;
Mode, above-mentioned apparatus are preferably carried out as one kind further include:
Setup module, for presetting sensitive information white list;
Second judgment module, for judging whether the field to be written includes letter in the sensitive information white list
Breath, if do not included, triggers message processing module 13;If comprising directly triggering message processing module 13 is to service
The signed data that device returns carries out sign test.
Mode, above-mentioned apparatus are preferably carried out as one kind further include:
Blocking module, for intercepting the field to be written when the field to be written includes the sensitive information, and
It generates and intercepts record.
The information processing unit of electronic bill provided by the embodiments of the present application is being obtained for the to be written of blank bill to be written
After entering field, judge whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned
When field to be written does not include sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, will obtain
Hash result be stored on block chain.It can be seen that the embodiment of the present application is to store electronic bill by block chain network
Corresponding field so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when
Authenticity.In addition, also carrying out the detection of sensitive information to above-mentioned field before cochain, it effectively prevent comprising sensitive information
The problem of can not being modified after field cochain, while also reducing the risk that more problem bill is stored in block chain network.
Further, the embodiment of the present application also provides a kind of electronic equipment.Fig. 9 is a kind of electricity provided by the embodiments of the present application
The structural schematic diagram of sub- equipment.As shown in figure 9, the electronic equipment includes memory 51, for storing computer program;Processor
52, the step of the information processing method such as electronic bill provided by the above embodiment is realized when for executing the computer program
Suddenly.
Wherein, processor 52 may include one or more processing cores, such as 4 core processors, 8 core processors
Deng.Processor 52 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field-
Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed
Logic array) at least one of example, in hardware realize.Processor 61 also may include primary processor and coprocessor, main place
Reason device is the processor for being handled data in the awake state, also referred to as CPU (Central Processing
Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.In
In some embodiments, processor 52 can be integrated with GPU (Graphics Processing Unit, image processor), GPU
For being responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 52 can also include AI
(Artificial Intelligence, artificial intelligence) processor, the AI processor is for handling the calculating in relation to machine learning
Operation.
Memory 51 may include one or more computer readable storage mediums, which can be with
It is non-transient.Memory 51 may also include high-speed random access memory and nonvolatile memory, such as one or more
A disk storage equipment, flash memory device.In the present embodiment, memory 51 is at least used to store following computer program 521,
Wherein, after which is loaded and executed by processor 52, it is disclosed to electronics to can be realized aforementioned any embodiment
The correlation step of the information processing method of bill.In addition, the resource that memory 51 is stored can also include 512 He of operating system
Data 513 etc., storage mode can be of short duration storage or permanently store.Wherein, operating system 512 may include Windows,
Unix, Linux etc..Data 513 can include but is not limited to field to be written etc..
In some embodiments, electronic equipment, which may also include, display screen 53, power supply 54, communication interface 55, input and output
Interface 56, sensor 57 and communication bus 58.
It will be understood by those skilled in the art that structure shown in Fig. 9 does not constitute the restriction to electronic equipment, can wrap
It includes than illustrating more or fewer components.
Finally, the embodiment of the present application also discloses a kind of storage medium, computer is stored in the storage medium to be held
Row instruction when the computer executable instructions are loaded and executed by processor, realizes that aforementioned any embodiment is disclosed by area
The information processing method step for the electronic bill that block chain network executes.
It is to be understood that if the method in above-described embodiment is realized in the form of SFU software functional unit and as independence
Product when selling or using, can store in a computer readable storage medium.Based on this understanding, the application
Technical solution substantially all or part of the part that contributes to existing technology or the technical solution can be in other words
It is expressed in the form of software products, which is stored in a storage medium, and it is each to execute the application
The all or part of the steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory
(Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk
Etc. the various media that can store program code.
The information processing method of electronic bill provided herein, device, electronic equipment and medium are carried out above
It is discussed in detail.Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other
The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment
For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part
It is bright.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle,
Can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application
It is interior.
Also it should be noted that, in the present specification, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that
A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or
The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged
Except there is also other identical elements in the process, method, article or apparatus that includes the element.
Claims (11)
1. a kind of information processing method of electronic bill characterized by comprising
The access path of non-sensitive information database is obtained in advance, includes sensitive information in the non-sensitive information database;
The field to be written that server is sent is obtained to judge whether comprising the sensitive information;The field to be written be for
The field of blank bill is written;
When the field to be written does not include the sensitive information, sign test is carried out to the signed data that the server returns;
The signed data is generated particular by the private key of the corresponding Hash result of field to be written and the server;
Sign test stores the field to be written to block chain after passing through.
2. the information processing method of electronic bill according to claim 1, which is characterized in that further include:
Judge whether the field of cochain stored on the block chain includes the sensitive information;
If it is, the label corresponding bill of cochain field.
3. the information processing method of electronic bill according to claim 2, which is characterized in that described to work as the word to be written
When section does not include the sensitive information, sign test is carried out to the signed data that the server returns and is specifically included:
Judge whether the field to be written includes the sensitive information;
If do not included, Hash operation is carried out to obtain the Hash result to the field to be written;
The Hash result is sent so that the server carries out the Hash result according to the private key to the server
Encryption obtains the signed data;
Receive the signed data that the server returns;
Sign test is carried out to the signed data using the public key of the server.
4. the information processing method of electronic bill according to claim 3, which is characterized in that the judgement block chain
Whether the field of cochain of upper storage includes that the sensitive information specifically includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field.
5. the information processing method of electronic bill according to claim 2, which is characterized in that described to work as the word to be written
When section does not include the sensitive information, sign test is carried out to the signed data that the server returns and is specifically included:
Hash operation is carried out to the field to be written to obtain the Hash result, Xiang Suoshu server sends the Hash knot
Fruit encrypts the Hash result according to the private key to obtain the signed data so as to the server, and described in judgement
Whether field to be written includes the sensitive information;
Receive the signed data that the server returns;
Judge whether there is the corresponding judging result of the field to be written;
If there is the judging result, then judge whether the judging result characterizes the field to be written not comprising described quick
Feel information;
If not including the sensitive information, sign test is carried out to the signed data using the public key of the server;
If there is no the judging result, then judge whether to reach preset delay time;
If not up to, return described in the step of judging whether there is the field to be written corresponding judging result;
If reached, enter the step of public key using the server carries out sign test to the signed data.
6. the information processing method of electronic bill according to claim 5, which is characterized in that the judgement block chain
Whether the field of cochain of upper storage includes that the sensitive information specifically includes:
Obtain current block height;Wherein, using the corresponding block height of a upper detection cycle as starting altitude;
Cochain field is obtained described in whole bills from the corresponding block of current block height;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field;And judge
Whether current maximum block height is reached;
If current block height not up to, is increased a height, and return described from the corresponding area of current block height
The step of field of cochain of whole bills is obtained in block;
If reached, current maximum block height is recorded using the starting altitude as next detection cycle;
If not including the sensitive information, judge whether to reach current maximum block height;
If current block height not up to, is increased a height into described, and return described from current block height
The step of field of cochain of whole bills is obtained in corresponding block;
If reached, enter the current maximum block height of the record using the step of the starting altitude as next detection cycle
Suddenly.
7. the information processing method of electronic bill described in -6 any one according to claim 1, which is characterized in that further include:
Preset sensitive information white list;
Judge whether the field to be written includes information in the sensitive information white list;
If do not included, into described when the field to be written, which does not include, pre-set sensitive information, to service
The signed data that device returns carries out the step of sign test;
If comprising being directly entered the step of signed data returned to server carries out sign test.
8. the information processing method of electronic bill described in -6 any one according to claim 1, which is characterized in that when it is described to
When field is written comprising the sensitive information, further includes:
The field to be written is intercepted, and generates interception record.
9. a kind of information processing unit of electronic bill characterized by comprising
First acquisition module is wrapped in the non-sensitive information database for obtaining the access path of non-sensitive information database in advance
Contain sensitive information;
Second obtains module, for obtaining the field to be written of server transmission to judge whether comprising the sensitive information;Institute
Stating field to be written is the field for blank bill to be written;
Message processing module, for being returned to the server when the field to be written does not include the sensitive information
Signed data carries out sign test;The signed data is particular by the corresponding Hash result of field to be written and the service
The private key of device generates;
Information uploading module stores the field to be written to block chain after passing through for sign test.
10. a kind of electronic equipment, which is characterized in that including memory, for storing computer program;
Processor realizes the letter of electronic bill as claimed in any one of claims 1 to 8 when for executing the computer program
The step of ceasing processing method.
11. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium
Program, the computer program realize the information of electronic bill as claimed in any one of claims 1 to 8 when being executed by processor
The step of processing method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910778771.6A CN110457957B (en) | 2019-08-22 | 2019-08-22 | Information processing method and device of electronic bill, electronic equipment and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910778771.6A CN110457957B (en) | 2019-08-22 | 2019-08-22 | Information processing method and device of electronic bill, electronic equipment and medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110457957A true CN110457957A (en) | 2019-11-15 |
CN110457957B CN110457957B (en) | 2024-04-12 |
Family
ID=68488468
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910778771.6A Active CN110457957B (en) | 2019-08-22 | 2019-08-22 | Information processing method and device of electronic bill, electronic equipment and medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110457957B (en) |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111310205A (en) * | 2020-02-11 | 2020-06-19 | 平安科技(深圳)有限公司 | Sensitive information detection method and device, computer equipment and storage medium |
CN111343142A (en) * | 2020-01-22 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain network and storage medium |
CN111932326A (en) * | 2020-08-17 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Data processing method based on block chain network and related equipment |
CN112532709A (en) * | 2020-11-24 | 2021-03-19 | 杭州趣链科技有限公司 | Uplink request processing method and device and block link point equipment |
CN112559489A (en) * | 2020-12-11 | 2021-03-26 | 杭州趣链科技有限公司 | Block chain supervision method and equipment based on cross-chain and storage medium |
CN112800457A (en) * | 2021-01-13 | 2021-05-14 | 迅鳐成都科技有限公司 | Sensitive information supervision method and system for block chain network |
WO2021120628A1 (en) * | 2019-12-19 | 2021-06-24 | 深圳壹账通智能科技有限公司 | Blockchain-based sensitive word detection method and apparatus, computer device and computer-readable storage medium |
CN113033565A (en) * | 2021-03-10 | 2021-06-25 | 大象慧云信息技术有限公司 | Electronic invoice data processing method and system |
CN113434909A (en) * | 2021-06-25 | 2021-09-24 | 湖北央中巨石信息技术有限公司 | Data on-demand evidence storing method based on block chain |
CN113824565A (en) * | 2021-09-24 | 2021-12-21 | 广东卓启云链科技有限公司 | Block chain sensitive information management method and related device |
CN114461614A (en) * | 2022-04-12 | 2022-05-10 | 北京安华金和科技有限公司 | Sensitive data identification processing method and system |
WO2022126720A1 (en) * | 2020-12-15 | 2022-06-23 | 杭州趣链科技有限公司 | Blockchain-based information shielding method and apparatus, device, and readable storage medium |
CN114726561A (en) * | 2020-12-22 | 2022-07-08 | 京东科技信息技术有限公司 | Data processing method, device and system |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107018146A (en) * | 2017-05-09 | 2017-08-04 | 暨南大学 | A kind of public sentiment detection platform building method based on block chain technology |
CN108984625A (en) * | 2018-06-19 | 2018-12-11 | 平安科技(深圳)有限公司 | Information filtering method, device, computer equipment and storage medium |
CN109034924A (en) * | 2018-08-16 | 2018-12-18 | 腾讯科技(深圳)有限公司 | Electronic bill generation method, device, storage medium and computer equipment |
-
2019
- 2019-08-22 CN CN201910778771.6A patent/CN110457957B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107018146A (en) * | 2017-05-09 | 2017-08-04 | 暨南大学 | A kind of public sentiment detection platform building method based on block chain technology |
CN108984625A (en) * | 2018-06-19 | 2018-12-11 | 平安科技(深圳)有限公司 | Information filtering method, device, computer equipment and storage medium |
CN109034924A (en) * | 2018-08-16 | 2018-12-18 | 腾讯科技(深圳)有限公司 | Electronic bill generation method, device, storage medium and computer equipment |
Cited By (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2021120628A1 (en) * | 2019-12-19 | 2021-06-24 | 深圳壹账通智能科技有限公司 | Blockchain-based sensitive word detection method and apparatus, computer device and computer-readable storage medium |
CN111343142A (en) * | 2020-01-22 | 2020-06-26 | 腾讯科技(深圳)有限公司 | Data processing method and device based on block chain network and storage medium |
CN111310205A (en) * | 2020-02-11 | 2020-06-19 | 平安科技(深圳)有限公司 | Sensitive information detection method and device, computer equipment and storage medium |
CN111310205B (en) * | 2020-02-11 | 2024-05-10 | 平安科技(深圳)有限公司 | Sensitive information detection method, device, computer equipment and storage medium |
CN111932326B (en) * | 2020-08-17 | 2024-03-19 | 腾讯科技(深圳)有限公司 | Data processing method based on block chain network and related equipment |
CN111932326A (en) * | 2020-08-17 | 2020-11-13 | 腾讯科技(深圳)有限公司 | Data processing method based on block chain network and related equipment |
CN112532709A (en) * | 2020-11-24 | 2021-03-19 | 杭州趣链科技有限公司 | Uplink request processing method and device and block link point equipment |
WO2022110407A1 (en) * | 2020-11-24 | 2022-06-02 | 杭州趣链科技有限公司 | Uplink request processing method and apparatus, and blockchain node device |
CN112559489A (en) * | 2020-12-11 | 2021-03-26 | 杭州趣链科技有限公司 | Block chain supervision method and equipment based on cross-chain and storage medium |
CN112559489B (en) * | 2020-12-11 | 2023-07-07 | 杭州趣链科技有限公司 | Cross-chain-based blockchain supervision method, device and storage medium |
WO2022126720A1 (en) * | 2020-12-15 | 2022-06-23 | 杭州趣链科技有限公司 | Blockchain-based information shielding method and apparatus, device, and readable storage medium |
CN114726561B (en) * | 2020-12-22 | 2024-04-05 | 京东科技信息技术有限公司 | Data processing method, device and system |
CN114726561A (en) * | 2020-12-22 | 2022-07-08 | 京东科技信息技术有限公司 | Data processing method, device and system |
CN112800457A (en) * | 2021-01-13 | 2021-05-14 | 迅鳐成都科技有限公司 | Sensitive information supervision method and system for block chain network |
CN113033565A (en) * | 2021-03-10 | 2021-06-25 | 大象慧云信息技术有限公司 | Electronic invoice data processing method and system |
CN113434909B (en) * | 2021-06-25 | 2023-12-29 | 湖北央中巨石信息技术有限公司 | Data on-demand evidence-storing method based on blockchain |
CN113434909A (en) * | 2021-06-25 | 2021-09-24 | 湖北央中巨石信息技术有限公司 | Data on-demand evidence storing method based on block chain |
CN113824565B (en) * | 2021-09-24 | 2023-08-25 | 广东卓启云链科技有限公司 | Block chain sensitive information management method and related device |
CN113824565A (en) * | 2021-09-24 | 2021-12-21 | 广东卓启云链科技有限公司 | Block chain sensitive information management method and related device |
CN114461614B (en) * | 2022-04-12 | 2022-06-28 | 北京安华金和科技有限公司 | Sensitive data identification processing method and system |
CN114461614A (en) * | 2022-04-12 | 2022-05-10 | 北京安华金和科技有限公司 | Sensitive data identification processing method and system |
Also Published As
Publication number | Publication date |
---|---|
CN110457957B (en) | 2024-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110457957A (en) | Information processing method, device, electronic equipment and the medium of electronic bill | |
US20200294048A1 (en) | Blockchain-based data verification method and apparatus, and electronic device | |
US20220180375A1 (en) | Blockchain-based product authentication system | |
AU2018374912B2 (en) | Model training system and method, and storage medium | |
CN109102269B (en) | Transfer method and device based on block chain, block chain node and storage medium | |
CN111177275A (en) | Block chain-based management method, terminal, device and storage medium | |
Choi et al. | RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting | |
WO2019157367A1 (en) | Scalable decentralized digital and programmatic advertising analytics system | |
CN105262779B (en) | Identity authentication method, device and system | |
KR20180115778A (en) | Integrated block chain-based data transfer control method and system | |
CN110245186A (en) | A kind of method for processing business and relevant device based on block chain | |
WO2021098274A1 (en) | Method and apparatus for evaluating risk of leakage of private data | |
CN111786994B (en) | Data processing method based on block chain and related equipment | |
CN112036995A (en) | Large-scale enterprise financial data management method and system based on block chain and readable storage medium | |
WO2020186726A1 (en) | Block chain-based blacklist data sharing method and system | |
CN110264325A (en) | A kind of invoice checking method and device based on block chain | |
CN109493224A (en) | A kind of block chain picture social intercourse system | |
CN109242666A (en) | Personal reference method, apparatus and computer equipment are obtained based on block chain | |
US11769146B1 (en) | Blockchain transactional identity verification | |
CN111008834A (en) | Block chain-based charitable donation management method, equipment and medium | |
CN110913397A (en) | Short message verification method and device, storage medium and computer equipment | |
Divya et al. | Blockvoting: an online voting system using block chain | |
CN111814193B (en) | Information sharing method, device and equipment | |
WO2019177788A1 (en) | Detecting alterations of journal data structures | |
CN110599211A (en) | Ticket information processing method and device and computer equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |