CN110457957A - Information processing method, device, electronic equipment and the medium of electronic bill - Google Patents

Information processing method, device, electronic equipment and the medium of electronic bill Download PDF

Info

Publication number
CN110457957A
CN110457957A CN201910778771.6A CN201910778771A CN110457957A CN 110457957 A CN110457957 A CN 110457957A CN 201910778771 A CN201910778771 A CN 201910778771A CN 110457957 A CN110457957 A CN 110457957A
Authority
CN
China
Prior art keywords
field
written
sensitive information
server
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910778771.6A
Other languages
Chinese (zh)
Other versions
CN110457957B (en
Inventor
唐子超
藏军
张建俊
郑罗海
戴传兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910778771.6A priority Critical patent/CN110457957B/en
Publication of CN110457957A publication Critical patent/CN110457957A/en
Application granted granted Critical
Publication of CN110457957B publication Critical patent/CN110457957B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This application discloses a kind of information processing method of electronic bill, device, electronic equipment and media, this method is after obtaining the field to be written for blank bill to be written, judge whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned field to be written does not include sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, obtained Hash result is stored on block chain.It can be seen that the embodiment of the present application is to store the corresponding field of electronic bill by block chain network so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when authenticity.In addition, before cochain, the detection of sensitive information is also carried out to above-mentioned field, effectively prevent include sensitive information field cochain after the problem of can not modifying, while also reducing the risk that more problem bill is stored in block chain network.

Description

Information processing method, device, electronic equipment and the medium of electronic bill
Technical field
This application involves block chain technical fields, more particularly to the information processing method, device, electricity of a kind of electronic bill Sub- equipment and medium.
Background technique
Traditional paper-bill, for example, invoice, exists and is easily lost, the risk of damage, and paper is wasted, with mutual The rapid development of networking, makes it possible the use of electronic bill.
Currently, electronic bill is universal increasingly wider, although electronic bill and paper-bill are two entirely different letters Bearing mode is ceased, still, being protected to the information on electronic bill to prevent information at par to be tampered is also to carve not allowing Slow problem.
It can be seen that how to prevent the information of electronic bill to be tampered is those skilled in the art's urgent problem to be solved.
Summary of the invention
The purpose of the application is to provide information processing method, device, electronic equipment and the medium of a kind of electronic bill, is used for It prevents the information of electronic bill to be tampered and sensitive information detection can be carried out to field to be written in advance.
In order to solve the above technical problems, the application provides a kind of information processing method of electronic bill, comprising:
The access path of non-sensitive information database is obtained in advance, includes sensitive information in the non-sensitive information database;
The field to be written that server is sent is obtained to judge whether comprising the sensitive information;The field to be written is For the field of blank bill to be written;
When the field to be written does not include the sensitive information, the signed data returned to the server is tested Label;The signed data is generated particular by the private key of the corresponding Hash result of field to be written and the server;
Sign test stores the field to be written to block chain after passing through.
Preferably, further includes:
Judge whether the field of cochain stored on the block chain includes the sensitive information;
If it is, the label corresponding bill of cochain field.
Preferably, the label that when the field to be written does not include the sensitive information, the server is returned Name data carry out sign test and specifically include:
Judge whether the field to be written includes the sensitive information;
If do not included, Hash operation is carried out to obtain the Hash result to the field to be written;
To the server send the Hash result so as to the server according to the private key to the Hash result It is encrypted to obtain the signed data;
Receive the signed data that the server returns;
Sign test is carried out to the signed data using the public key of the server.
Preferably, described to judge whether the field of cochain stored on the block chain includes that the sensitive information specifically wraps It includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field.
Preferably, the label that when the field to be written does not include the sensitive information, the server is returned Name data carry out sign test and specifically include:
Hash operation is carried out to the field to be written to obtain the Hash result, Xiang Suoshu server sends the Kazakhstan Uncommon result encrypts the Hash result according to the private key to obtain the signed data so as to the server, and judges Whether the field to be written includes the sensitive information;
Receive the signed data that the server returns;
Judge whether there is the corresponding judging result of the field to be written;
If there is the judging result, then judge whether the judging result characterizes the field to be written not comprising institute State sensitive information;
If not including the sensitive information, sign test is carried out to the signed data using the public key of the server;
If there is no the judging result, then judge whether to reach preset delay time;
If not up to, return described in the step of judging whether there is the field to be written corresponding judging result;
If reached, enter the step of public key using the server carries out sign test to the signed data.
Preferably, described to judge whether the field of cochain stored on the block chain includes that the sensitive information specifically wraps It includes:
Obtain current block height;Wherein, using the corresponding block height of a upper detection cycle as starting altitude;
Cochain field is obtained described in whole bills from the corresponding block of current block height;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field;And Judge whether to reach current maximum block height;
If current block height not up to, is increased a height, and return described corresponding from current block height Block in the step of obtaining the field of cochain of whole bills;
If reached, current maximum block height is recorded using the starting altitude as next detection cycle;
If not including the sensitive information, judge whether to reach current maximum block height;
If current block height not up to, is increased a height into described, and return described from current block The step of field of cochain of whole bills is obtained in highly corresponding block;
If reached, enter the current maximum block height of the record using the starting altitude as next detection cycle The step of.
Preferably, further includes:
Preset sensitive information white list;
Judge whether the field to be written includes information in the sensitive information white list;
It is right into described when the field to be written, which does not include, pre-set sensitive information if do not included The signed data that server returns carries out the step of sign test;
If comprising being directly entered the step of signed data returned to server carries out sign test.
Preferably, when the field to be written includes the sensitive information, further includes:
The field to be written is intercepted, and generates interception record.
In order to solve the above technical problems, the application also provides a kind of information processing unit of electronic bill, comprising:
First obtains module, for obtaining the access path of non-sensitive information database, the non-sensitive information database in advance In include sensitive information;
Second obtains module, for obtaining the field to be written of server transmission to judge whether comprising the sensitive letter Breath;The field to be written is the field for blank bill to be written;
Message processing module, for being returned to the server when the field to be written does not include the sensitive information The signed data returned carries out sign test;The signed data is particular by the corresponding Hash result of the field to be written and described The private key of server generates;
Information uploading module stores the field to be written to block chain after passing through for sign test.
In order to solve the above technical problems, the application also provides a kind of electronic equipment, including memory, for storing computer Program;
Processor realizes the step of the information processing method of electronic bill as mentioned when for executing the computer program Suddenly.
In order to solve the above technical problems, the application also provides a kind of computer readable storage medium, it is described computer-readable Computer program is stored on storage medium, the computer program realizes electronic bill as mentioned when being executed by processor The step of information processing method.
The information processing method of electronic bill provided herein is obtaining the word to be written for blank bill to be written Duan Hou judges whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned to be written When entering field not comprising sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, the Kazakhstan that will be obtained Uncommon result is stored on block chain.It can be seen that the embodiment of the present application is to store electronic bill by block chain network to correspond to Field so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when it is true Property.In addition, also carrying out the detection of sensitive information to above-mentioned field before cochain, effectivelying prevent the field comprising sensitive information The problem of can not being modified after cochain, while also reducing the risk that more problem bill is stored in block chain network.
In addition, the information processing unit of electronic bill provided herein, electronic equipment and medium and electronic bill Information processing method is corresponding, and effect is as above.
Detailed description of the invention
In ord to more clearly illustrate embodiments of the present application, attached drawing needed in the embodiment will be done simply below It introduces, it should be apparent that, the drawings in the following description are only some examples of the present application, for ordinary skill people For member, without creative efforts, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is a kind of structure composed figure of the information processing system of electronic bill provided by the present application;
Fig. 2 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 3 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 4 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application;
Fig. 5 is the flow chart of the information processing method of another electronic bill provided by the embodiments of the present application;
Fig. 6 is a kind of process of detection method that sensitive information is carried out to cochain field provided by the embodiments of the present application Figure;
Fig. 7 is a kind of schematic diagram of application scenarios embodiment provided by the present application;
Fig. 8 is a kind of structure chart of the information processing unit of electronic bill provided by the present application;
Fig. 9 is the structural schematic diagram of a kind of electronic equipment provided by the embodiments of the present application.
Specific embodiment
Electronic bill is widely used in e-commerce, solid shop.Currently, electronic bill according to bill class Type can be divided into ordinary bill and special bill, wherein ordinary bill is mainly the bill for not needing to pay the expenses of taxation, for example, can be with It is the super purchase receipts of quotient (being commonly called as shopping receipt);Special bill is mainly the bill for needing to pay the expenses of taxation, for example, it may be hair Ticket red rushes invoice etc..It for electronic bill, is typically maintained in long-range centralized server, realizes unified management.
Since centralized server is usually to be protected with electronic bill of certain cipher mode to preservation, it is easy to It is managed illegally distorting and destroy for personnel, once information is difficult to restore by criminal's rogue attacks, even if there is information standby The safeguard measures such as part, the risk for still thering is information to lose.In addition, being usually on electronic bill includes multiple fields, each word The meaning of segment table sign is different, these fields constitute the element of electronic bill, for describing the transaction knot of corresponding electronic bill Fruit.It is to be understood that the quantity for the field that different types of electronic bill is included, the type of field may be different, Such as electronic invoice, field can for title, cargo or the dutiable service of purchaser, service name, specifications and models, quantity, Unit price, the amount of money, the tax rate, the amount of tax to be paid, the title of seller, the Taxpayer Identification Number of seller, the bank of deposit of seller and account are opened Ticket people, payee etc..The above field constitutes the complete information of entire electronic bill, protects if these fields are not audited There are centralized servers, then are easy to bring into some sensitive informations.The sensitive information mentioned in the application can be pornographic Information, information of specific crowd (name) that category information, illegal activity are related to etc..Once these sensitive informations are brought into, then Lead to the presence of a large amount of unqualified electronic bills.
It will be apparent that above-mentioned electronic bill is stored in long-range centralized server, the data which is saved In the presence of the risk for being tampered or destroying, also, due to not carrying out sensitive letter to each field to be written before electronic bill generates The detection of breath will lead to the underproof probability of electronic bill and increase, and frequently modifies and undoubtedly again increase electronic bill quilt The risk distorted or destroyed.
In view of presently, there are the above problem, present applicant proposes the information processing technologies based on block chain to electronic bill Scheme can prevent the information of electronic bill to be tampered or destroy by the technical solution, while improve the qualification of electronic bill Rate.
In order to make it easy to understand, the system architecture being applicable in below the technical solution of the application is introduced.Referring to Fig. 1 institute A kind of structure composed of the information processing system of electronic bill provided by the present application shown.
As shown in Figure 1, the information processing system of the electronic bill of the application may include personal user's terminal 11, enterprise's use Family terminal 12, server 13 and block chain network 14 and inquiry terminal 15.
In specific implementation, personal user's terminal 11 can issue billing information interface by the application itself installed It is upper to provide information input interface and information transmitting unit for personal user (the initiation user that bill is issued in request).Specifically, a People's user terminal 11 gets the field to be written of personal user's input by information input interface, these fields to be written are The field that blank bill is written needs to be explanation, and write-in here is not equal to hand-written write-in, only described in table name to The mode that project in write-in field and the blank bill matches.Personal user's terminal 11 is only to obtain the word to be written Section can not achieve operation of really making out an invoice.After information transmitting unit is triggered, personal user's terminal 11 passes through the first communication The field to be written obtained by information input interface is sent to enterprise UE terminal 12 by network.It is to be understood that Personal user's terminal 11 in the application include but is not limited to the smart phone for being mounted with application mentioned above, tablet computer, Desktop computer and wearable device etc..
Enterprise UE terminal 12 is to realize the tie communicated between personal user's terminal and server 13, enterprise UE terminal 12 are authenticated by server 13.Enterprise UE terminal 12 will not only receive the field to be written of personal user's terminal transmission, Also needing to receive enterprise customer (has and provides the user of bill obligation for personal user, for example, it may be selling businessman) input Field to be written.Server 13 is that enterprise UE terminal 12 is reserved with corresponding information input interface, passes through enterprise customer's end End 12 can directly access server 13, detailed process are as follows: enterprise UE terminal 12 leads to according to the request of personal user's terminal 11 The second communication network access server 13 is crossed, so that the solicited message for carrying the field to be written be connect by information input Mouth is input to server 13.Since different enterprise UE terminals 12 is corresponding with different information input interfaces, enterprise uses Family terminal 12 can not need to send the identity information of itself again, certainly, even if no need to send certainly for enterprise UE terminal 12 The identity information of body, server 13 need the interface message and enterprise according to information input interface in follow-up treatment process The corresponding relationship of the identity information of industry user terminal obtains the identity information of enterprise UE terminal 12, and participates in subsequent information Processing is to be traced.It should be noted that enterprise UE terminal 12 is also not the real terminal for generating bill, also it is Play the role of intermediary.It is to be understood that the enterprise UE terminal 12 in the application includes but is not limited to have by taking Smart phone, tablet computer, desktop computer and the wearable device of information input interface etc. that business device 13 provides.
Server 13 can be the private server for specially realizing a certain single business, and being also possible to one can be real The generic server of existing multiple business, does not influence the realization of technical scheme.Under normal conditions, server 13 is dedicated Server is only used for realizing the function of access block chain network 14.In the application, personal user's terminal 11 and enterprise customer are whole End 12 all cannot directly access block chain network, need by server 13, that is to say, that block chain network 14 licenses to service Device 13, each enterprise UE terminal 12, which is required to just to be written into field by server 13, is transmitted to block chain network 14, and Cannot data interaction individually be carried out with block chain network 14.Server 13 is usually to have multiple, each server and multiple enterprises These fields are sent to block chain to receive the field to be written that each enterprise UE terminal 12 is sent by the communication of user terminal 12 Network 14.In specific implementation, server 13 obtains being sent by enterprise UE terminal 12 to be written by the second communication network Field.
Server 13 has private key with the legal identity for authentication server 13, before being written into field cochain, needs Server 13 is wanted to be encrypted to obtain signed data to the corresponding Hash result of field to be written by the private key of itself, then again Signed data is back to block chain network 14.Block chain network 14 can carry out signed data using the public key of the server 13 Decryption, to obtain Hash result, then judges whether the Hash result is consistent with the Hash result for being sent to server 13, such as Fruit is consistent, show that the field to be written of wanted cochain is correct, and is sent by legal server, is completed with this to label The sign test of name data.It will be apparent that the process of sign test not only ensure that the accuracy of field to be written also assures field to be written Source legitimacy.
In addition, server 13 can also carry out the detection of sensitive information to field to be written, it is equivalent to a kind of detection in advance, If detect that field to be written does not include sensitive information, then it is written into field and is sent to block chain network 14.It can manage Solution ground is that non-sensitive information database used in server 13 can be with non-sensitive information database used in block chain network 14 It is identical, in addition, the database can be local data base, it is also possible to third party database.It is to be understood that the present embodiment In server 13 include but is not limited to Cloud Server, physical server and virtual server etc..
Block chain network 14 be usually include multiple block chain nodes 140, each block chain node includes multiple areas Block chain, for storing data.In fact, can individually be deposited by a target block chain node 141 in block chain network 14 The operation except data is stored up, for example, communicating with server 13 and the detection of sensitive information.The target block chain node 141 is clothes Business device 13 is reserved with interface of making out an invoice, and is used for issued notes, and target block chain node 141 obtains server by third communication network 13 fields to be written sent by interface of making out an invoice.Target block chain node 141 after getting the field to be written, firstly, The detection that sensitive information is carried out to the field to be written, then carries out sign test to the signed data of server 13 again, finally, testing Label carry out uplink operation after passing through, so that the field to be written comprising sensitive information be avoided to store to block chain network 14.In Used non-sensitive information database can be the local data base established in block chain network 14 in detection process, can also be with It is to be obtained from third party database by target block chain node 141.
The process of sign test is specifically included that when target block chain node 141 judges that field to be written does not include sensitive information When, Hash operation can be carried out to field to be written and obtain Hash result, Hash result is then back to server 13 again, is serviced Device 13 encrypts Hash result to obtain signed data after receiving Hash result by the private key of itself.Server 13 Signed data is back to target block chain node 141, target block chain node 141 is by the public key of server 13 to number of signature According to being decrypted to obtain the Hash result in signed data, and judge the Hash result the phase one whether Hash result issues with it It causes, if unanimously, illustrating that current server 13 is legal server and field to be written is not tampered with, sign test passes through.
After sign test passes through, the Hash result that target block chain node 141 can be written into field is committed to any area Block chain node 140, for the Hash operation result submitted after the success cochain of either block chain node 140, the Hash result will It is quickly transferred to other block chain nodes 140 within grade period second to be saved, each block chain node 140 passes through collaboration Cooperation, maintains full dose director data, this process is considered as success of making out an invoice.Under normal conditions, target block chain node 141 will also The successful information of cochain is back to server 13, can also be back to enterprise UE terminal 12, enterprise customer by server 13 again Terminal 12 is back to personal user's terminal 11.
In the application, in addition to can recorde block-identified symbol, the information of bill, ticket in the either block of block chain network 14 According to generate operation note, binary tree root Hash and with except Hash result, can also further record block chain mark and The information such as block chain account address.
After the block-identified symbol is mentioned above either referring to the block head progress Hash processing to a upper block Obtained identifier may also mean that the block height of current block;The information of bill may include the field to be written, ticket According to unique ID, the unique ID of enterprise UE terminal, server ip address, server public key etc.;The bill generates operation note It may include personal user, enterprise customer, the corresponding operation of server and corresponding timestamp etc.;The binary tree specifically can be with It is Merkle tree;The block chain identifies the mark for characterizing current block chain, can be adapted for that there are a variety of different blocks The needs of chain apply the scene across chain technology;The block chain account address is that registration user obtains after registering block chain account Address information, registration process can specifically include: after the Account Registration information for getting registration user, for registration user's creation Account private key, and account public key corresponding with account private key is generated using elliptic curve, then calculated using uni-directional hash Method carries out operation to account public key, to obtain block chain account address.
It is to be understood that the node device type of target block chain node 141 and block chain node 140 in the application Including but not limited to various types of servers, personal computer, handheld terminal etc..
In the application, target block chain node 141, which has, to be collected block chain data, provides block chain browsing data inquiry function Can, the function of private key generation service, account executive be provided for user.The application user can be with by target block chain node 141 View the profile information of block chain.
In addition, target block chain node 141, which can use the 4th communication network, obtains being directed to for the inquiry initiation of terminal 15 Then the inquiry request of cochain field inquires the information being collected into from block chain network 14, accordingly to obtain State cochain field.Specifically, inquiry terminal 15 obtains block height, the transaction of user's input by the search box on interface The search keys such as cryptographic Hash or block cryptographic Hash, electronic bill number, then send to target block chain node 141 comprising upper State the inquiry request of search key.After target block chain node 141 gets inquiry request, found out from block chain network Cochain field corresponding with above-mentioned inquiry request, and be back on the terminal interface of inquiry terminal 15.
It should be noted that since the sensitive information in non-sensitive information database is variation, it is the possible a certain moment, a certain Field to be written, which does not include, a sensitive information, and success cochain, but with the variation of sensitive information, at another moment, this It is possible to include sensitive information in field to be written.Therefore, it is based on the situation, target block chain node 141 further includes secondary Detect sensitive information.If target block chain node 141 in secondary detection sensitive information, confirms that a certain field of cochain includes There is sensitive information, then when target block chain node 141 and inquiry terminal 15 carry out data interaction, if the bill being queried This corresponding bill of cochain field, then target block chain node 141 be back to inquiry terminal 15 terminal interface on it Before, it needs to pre-process the field of cochain for including sensitive information, can be shielding processing or block processing, it e.g., can " * " number is replaced with the field of cochain that will include sensitive information, so that can only show on the terminal interface of inquiry terminal 15 Show the other fields for not including in the bill and having sensitive information.
It is to be understood that inquiry terminal 15 is the terminal that monitoring party is held, the effect of supervision is implemented.Wherein, it supervises Guan Fangwei to electronic bill carry out examination verification manager, inquiry terminal 15 include but is not limited to smart phone, tablet computer, Wearable device and desktop computer etc..If enterprise customer needs to inquire, enterprise customer by enterprise UE terminal 12 with It inquires terminal 15 and establishes communication, query result is sent to enterprise UE terminal 12 by inquiry terminal 15.If it is personal user It needs to inquire, then personal user is established by personal user's terminal 11 and enterprise UE terminal 12 and communicated, and then enterprise customer is whole End 12 is established with inquiry terminal 15 and is communicated, and query result is sent to enterprise UE terminal 12 by inquiry terminal 15, finally by looking forward to Query result is sent to personal user's terminal 11 by industry user terminal 12.In a specific embodiment, it is back to enterprise's use The query result of family terminal 12 or personal user's terminal 11 can be presented using the file of PDF format.
It should be noted that above-mentioned first communication network, the second communication network, the third communication network, the 4th of the application Communication network can according in actual application Network status and application demand determine, either radio communication network Network, such as mobile communication network or WIFI network, are also possible to wire communication network;Either wide area network, allows in situation When can also use local area network.
In the structure composed of the information processing system of electronic bill shown in FIG. 1, block chain network 14 is in addition to for treating Field is written to carry out outside the detection of sensitive information, also has the function of to save corresponding electronic bill of field to be written etc..
In order to make those skilled in the art more fully understand application scheme, with reference to the accompanying drawings and detailed description The application is described in further detail.
Fig. 2 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.As shown in Fig. 2, This method comprises:
S101: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database It include sensitive information.
In the embodiment of the present application, non-sensitive information database can be the database being locally created in block chain network, can With by either block chain node or several block chain node maintenances, for example, target block chain node mentioned above, can also be Third party database.The either non-sensitive information database established of which kind of mode, requires block chain network and its visit is known in advance Diameter of asking the way accesses the database when in order to carry out sensitive information detection again.
By taking target block chain node mentioned above as an example, if non-sensitive information database is in the data being locally created Library, then target block chain node also need to receive monitoring party to the increasing of non-sensitive information database, the operation such as delete, change, look into.It can manage Solution ground is that user mainly increases sensitive information, user to non-sensitive information database to the increasing operation of non-sensitive information database Deleting operation and mainly deleting sensitive information, user is mainly modification sensitive information, user to the operation that changes of non-sensitive information database To the sensitive information of non-sensitive information database looked into operation mainly inquiry current database and include.
If non-sensitive information database is local data base, in order to improve the maintenance cost of non-sensitive information database, need Deduplication operation periodically is carried out to sensitive information, to reject duplicate sensitive information.In addition, database is tampered in order to prevent Or destroy, it needs to take non-sensitive information database and mostly back up, and be periodically compared.It is operated to non-sensitive information database Before, it needs to carry out subscriber authentication, if identity is illegal, not to user's open operation permission.
S102: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing Enter the field of blank bill.
In the embodiment of the present application, personal user's terminal can provide information input interface for personal user, pass through the information Input interface, the field to be written of available personal user's input.Under normal conditions, personal user is according to personal user's terminal The information input interface of offer inputs corresponding field to be written, for example, field to be written may include subscriber phone field, use Family name field, station address field, bill type field, Taxpayer Identification Number, items list field etc..
In order to allow personal user more easily to provide field to be written, personal use can be established according to the type of bill Family information database, to save corresponding field to be written.For example, being linked to individual according to the type of the bill of user's input Then User Information Database directly extracts the field to be written saved in personal user information database.Personal user only needs It not to be needed every time according to the part field to be written in the current desired bill modification personal user information database wanted Identical field to be written is inputted, all so as to improve the efficiency of input.In addition, either local personal user information database Or third party's personal user information database can be personal user information for the safety of personal user information database The corresponding authentication mechanism of data lab setting, if it is legitimate user, is opened for verifying whether active user is legitimate user The permission of database is accessed, for extracting the field to be written saved in personal user information database, or modification individual The field to be written saved in User Information Database.If it is illegal user, access personal user information database is closed Permission, to forbid extracting the field to be written that saves or modification personal user information data in personal user information database The field to be written saved in library.
S103: the field to be written is sent to enterprise UE terminal by personal user's terminal.
Personal user's terminal be also used to receive personal user input confirmation message, for example, personal user confirmation respectively to When write-in field is correct, in the display interface, confirmation key is clicked.Personal user's terminal, will when receiving confirmation message The field to be written obtained is sent to enterprise UE terminal.
In the present embodiment, the communication of personal user's terminal and enterprise UE terminal, if it is communicating for the first time, then personal user Terminal needs to send the identity information of personal user, in order to which enterprise UE terminal saves the information, facilitate it is subsequent again with it is a When people's user terminal communicates, corresponding identity information is directly transferred.It is to be understood that enterprise UE terminal can will The identity information of people user is stored in local.In addition, each field to be written is combined to obtain corresponding bill in order to subsequent, Each field to be written has its unique attribute to be associated with it, and the two can be regarded as binding relationship, for example, for one Subscriber phone field to be written, the attribute of the field to be written is subscriber phone, rather than station address.Therefore, personal user Terminal is described to be written to the enterprise UE terminal transmission field to be written and enterprise UE terminal to server transmission When field, information confusion will not be led to the problem of.
S104: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
It is to be understood that enterprise customer is that have to provide the user of bill obligation, therefore, billing information for personal user On should include the identity information of enterprise customer and the Transaction Information of this bill.In the embodiment of the present application, enterprise customer is whole End can provide information input interface for enterprise customer, by the information input interface, available enterprise customer input to Field is written.
Under normal conditions, the information input interface input that enterprise customer provides according to enterprise UE terminal is corresponding to be written Field, for example, field to be written may include drawer's field, auditor's field, memo field etc..
In addition, enterprise UE terminal is also used to receive the confirmation message of enterprise customer's input, for example, enterprise customer is confirming When each field to be written is correct, in the display interface, confirmation key is clicked.Enterprise UE terminal is receiving confirmation message When, all fields to be written are sent to server.
Further, each field to be written is combined to obtain corresponding bill, each field to be written in order to subsequent There is its unique attribute to be associated with it, the two can be regarded as binding relationship, for example, for drawer's field, it should The attribute of field is drawer, rather than auditor.Also, the field to be written attribute having the same in same bill with It is the different field of same bill for identification.Therefore, enterprise UE terminal is sending the field to be written to server When, it will not lead to the problem of information confusion.
It illegally makes out an invoice in order to prevent, corresponding authentication mechanism can be set for enterprise UE terminal, for verifying current use Whether family is legitimate user, if it is legitimate user, the permission for operation of making out an invoice, with input make out an invoice it is required corresponding to be written Enter field.If it is illegal user, the permission for operation of making out an invoice is closed, to forbid inputting required corresponding word to be written of making out an invoice Section.In addition, drawer's erroneous input drawer field in order to prevent, authentication information that enterprise UE terminal is inputted also according to user Type matching is to drawer corresponding with the type, and drawer's field to be written as enterprise customer's input.
S105: all fields to be written are sent to server by enterprise UE terminal.
In the present embodiment, the communication of enterprise UE terminal and server, if it is communicating for the first time, then enterprise UE terminal is needed The identity information of enterprise customer is sent, in order to which server saves the information, is facilitated subsequent logical with enterprise UE terminal again When news, corresponding identity information is directly transferred.It is to be understood that server can protect the identity information of enterprise customer There are locals.
Since enterprise UE terminal and server communication are usually telecommunication, information is lost in transmission process in order to prevent It becomes estranged the risk of leakage, in the application, whole fields to be written can also be encrypted in enterprise UE terminal, and will Field to be written after encryption is sent to server.In addition, in order to improve the efficiency of transmission, enterprise UE terminal can be with Compression processing is carried out to whole fields to be written, and the field to be written after compression processing is sent to server.
S106: server obtains the field to be written that enterprise UE terminal is sent.
In the present embodiment, server need according to the mode that enterprise UE terminal is sent determine the need for decryption processing or Whether person needs decompression.It is to be understood that if enterprise UE terminal encrypts all fields to be written Processing, then corresponding server needs are decrypted according to field to be written of the corresponding decryption method to encryption;Such as Fruit enterprise UE terminal has carried out compression processing to all fields to be written, then corresponding server is needed according to corresponding decompression Contracting method unzips it the field to be written that compression processing is crossed.
S107: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S108: block chain network judges whether the field to be written includes the sensitive information.
In the present embodiment, block chain network needs to carry out each field to be written the detection of sensitive information, prevent include The problem of can not being modified after the field cochain to be written of sensitive information.
Non-sensitive information database can be locally created in block chain network, include multiple sensitive informations in the database, When detecting sensitive information, a certain sensitive information or a certain field to be written are missed in order to prevent, can be using the side of double traversals The whole fields to be written of formula, i.e. traversal and the mode for traversing whole sensitive informations, for example, in particular order, from first A field to be written starts, and successively judges whether to include first sensitive information in non-sensitive information database, if comprising, Then illustrate that current field to be written includes sensitive information, otherwise judges whether to include next in non-sensitive information database Sensitive information, until each of non-sensitive information database sensitive information both participates in judgement, then the identical method of use is sentenced Disconnected second field to be written, until all fields judgement to be written finishes.
It is to be understood that the mode of above-mentioned judgement is carried out to all fields to be written and whole sensitive informations Judgement, be advantageous in that, detection sensitive information it is more accurate, still, workload be also it is huge, especially sensitive information compared with When more, become apparent.Based on this, sensitive information can also be divided, be divided multiple sensitive informations according to partitioning standards It for several sensitive information groups, and is the label information of each group of setting group, likewise, block chain network is obtaining word to be written Duan Shi obtains the label information of each field to be written according to the partitioning standards being previously mentioned, and according to the mark of each field to be written Information is signed, the filtering of sensitive information is carried out in corresponding sensitive information group, referring specifically to table 1.As shown in table 1, sensitivity is believed Sensitive information in breath database is divided into 4 sensitive information groups, and each sensitive information group has the label information of itself, each The quantity of sensitive information in sensitive information group may be identical, it is also possible to different.It is to be understood that table 3 is merely possible to one Kind concrete application scene is described, and the listed quantity of sensitive information group and the quantity of sensitive information are not unique reality Apply mode.In addition, different partitioning standards may cause the same sensitive information with two or more label informations, make It obtains the sensitive information to occur in different sensitive information groups, this is also satisfactory, not the realization of influence technique scheme.
Table 1
Block chain network is when judging each field to be written, if any field to be written includes sensitive information, Then illustrate that other fields to be written that same bill is constituted with the field to be written can not also participate in subsequent uplink operation, area It includes quick that block chain network, which can return to the information of cochain failure to server to prompt field to be written involved in the bill, Feel information, does not meet related request.The information of cochain failure can also be returned to enterprise UE terminal, enterprise customer's end by server It is to be written involved in personal user's bill to prompt that the information of cochain failure can also be back to personal user's terminal by end Entering field includes sensitive information, does not meet related request.In other embodiments, information of the block chain network in cochain failure In carry instruction information, it includes sensitive information which, which is used to indicate specific field to be written,.When personal user is logical Cross personal user's terminal get cochain failure information when, can be checked and be modified, and again to enterprise UE terminal Send the new field to be written of write-in.
In specific implementation, some fields to be written comprising sensitive information are normal, in order to prevent this error detection The problem of, as preferred embodiment, before S108, block chain network presets sensitive information white list;Then sentence Whether the field to be written of breaking includes information in the sensitive information white list;If do not included, enter S108, it is no Then, step corresponding to uplink operation is directly carried out.
It is to be understood that field to be written is magnanimity, if detected to each field, undoubtedly workload Be it is huge, moreover, the sensitivity coefficient of not all field to be written be all it is high, therefore, in order to reduce workload, improve detection Efficiency.Preferably embodiment, it is described judge whether the field to be written includes the sensitive information before also wrap It includes:
Predefine the type of the field of screening;
Extract the target field to be written for meeting the type in the field to be written.
Judge whether field to be written includes the sensitive information it is to be understood that described specifically: judge the mesh Mark whether field to be written includes the sensitive information.
Under normal conditions, the type includes but is not limited to: subscriber phone field, address name field, station address Field, items list field, memo field, drawer's field, auditor's field.
It should be noted that the detection mentioned above for carrying out sensitive information to field to be written can directly carry out data Splicing or jsonization or be formatted into other any forms (for example, binary system, hexadecimal etc.).
S109: when the field to be written does not include the sensitive information, block chain network is to the field to be written Hash operation is carried out to obtain the Hash result.
S110: block chain network sends the Hash result to server.
It is to be understood that the data for needing to treat cochain carry out Hash operation before carrying out uplink operation to data With digital signature processing, in this application, the data to cochain are exactly field to be written.
In a specific embodiment, the mode that block chain network carries out Hash operation to field to be written has following two Kind:
The first: the field to be written detection of an each pair of bill of block chain network finishes, just at once in the bill Information carries out Hash operation in order to carry out uplink operation.It is to be understood that the method is not necessarily to record testing result, so that right The bill answered can rapid chain loading in the shortest time, can substantially shorten the time window of extraneous altered data in this way, increase The difficulty and cost of data tampering.
Second: after block chain network has detected the field to be written of multiple bills, the ticket for having sensitive information will not included Hash operation is carried out according to corresponding field to be written.It is to be understood that the method can effectively reduce detection sensitive information and The switching times of Hash operation, but need to record the testing result of every bill.More specifically, block chain network can be set The quantity of the bill detected every time after reaching this quantity, then carries out Hash operation, such as this quantity can be 10, i.e., Field to be written corresponding to 10 bills carries out the detection of sensitive information, after detect, by not comprising sensitive information to Word is written and carries out Hash operation.
S111: server encrypts the Hash result to obtain the signed data according to the private key of itself.
S112: the signed data is sent to block chain network by server.
Server used private key when carrying out above-mentioned digital signature, can save in the server, work as service in this way When device is needed using private key, directly transferred from local, naturally it is also possible to be to be saved by third party tube platform, work as server When needing, third party tube platform is accessed.
In order to improve the safety of private key in server, server is in addition to needing to avoid that any protection processing will not be carried out Private key is stored directly in local, it is also necessary to avoid to be stored in by conventionally known coding or the processed private key of encryption technology It is local.In the embodiment of the present application, a set of customized private key protection mechanism can be created on server local, wherein this is made by oneself Adopted private key protection mechanism includes but is not limited to customized private key encoding mechanism or customized private key encryption mechanism.Server is to private Before key is saved, first with above-mentioned customized private key protection mechanism, respective handling is carried out to private key, then by treated As a result it is stored in local.When subsequent server needs to call private key, can based on above-mentioned customized private key protection mechanism come Restore private key.It is a kind of unknown private key protection machine for the external world since above-mentioned private key protection mechanism is customized System, and for the external world, server use which kind of protection mechanism on earth carry out private key protection be also it is unknown, lead in this way Above-mentioned private key protection scheme is crossed, the probability that private key is intercepted and captured by the external world can be effectively reduced, greatly improve local private key Safety.
It is to be understood that in actual application, related technical personnel customized according to actual needs can meet The private key protection mechanism of actual operation requirements.According to customized private key protection mechanism, server can be before saving private key Corresponding protection processing first is carried out to private key.For example, in a specific embodiment, if private key can be divided by server Dry is assigned with the segment of serial number, then modifies according to private key segment of the different segment alteration rulers to different serial numbers, And the private key segment after all modifications is saved respectively to multiple and different storage locations of local periodically dynamic change.Example Such as, private key is divided into 3 segments, wherein the corresponding segment alteration ruler of the 1st segment is by n-th of word of the 1st segment Symbol and n-th of character reciprocal exchange, and the corresponding segment alteration ruler of the 2nd segment is to add one to the tail portion of the 2nd segment Preset characters, the corresponding segment alteration ruler of the 3rd segment are that the specific character in the 3rd segment is all changed to another kind Preset characters, after obtaining 3 modified private key segments according to above-mentioned segment alteration ruler, just they are saved respectively to The corresponding 3 different storage locations of current storage location change cycle.It is to be understood that the later period when restoring private key, needs The characteristics of first periodically being changed according to segment storage location, determine the storage location of different private key segments, then according to not With segment serial number, corresponding different fragments alteration ruler restores the script information of different fragments, then carries out piece based on numeric order Section splicing, can restore private key.
Since block chain network is made of multiple block chain nodes, each block chain node can be carried out sign test, because This, signed data can be sent to any one block chain node by server.It should be noted that server is in order to reduce area The case where workload of certain block chain link points is excessive in block chain network or is chronically at idle state, in the application, service The signed data is sent to the process of block chain network by device, may include: server according to current each block chain node Information on load and location information screen the block chain link point in the block chain network, obtain destination node, then will The signed data is uploaded to the destination node.That is, the server in the present embodiment can voluntarily select block chain node As the node for directly acquiring uplink data, also, server can be according to the information on load and location information of block chain node Screen current suitable block chain node, server can select that current loads are smaller and geographical position in this way Moderate block chain node is set as the direct node for receiving uplink data.In a specific embodiment, server may be used also Hash operation result and corresponding signed data are uploaded to by using random in a manner of randomly selecting block chain network node Block chain network node.In another embodiment specific implementation mode, server can also be by the way of poll, successively selected block Chain node is as destination node.
S113: block chain network receives the signed data that the server returns, and utilizes the public key of the server Sign test is carried out to the signed data, and stores the field to be written to block chain after sign test passes through.
Sign test process in the present embodiment is that signed data is decrypted and is verified using public key in fact.Usual situation Under, the public key of server is stored in local, and the equipment where any one block chain node in block chain network is all preserved The public key of server.On the one hand the Hash result being encrypted by private key is restored by public key, on the other hand compare the Kazakhstan restored Whether uncommon result and the Hash result for being sent to server are consistent, to determine whether the Hash result is tampered.In the present embodiment, After arbitrary node in block chain network gets the signed data of server transmission, first the signed data can be tested Label after sign test passes through, just generate the block for preserving the Hash result in the signed data on this node, then broadcast Other nodes into block chain network, other nodes are received and are verified, and can chase after above-mentioned block after being verified It adds on block chain.
The embodiment of the present application judges that above-mentioned field to be written is after obtaining the field to be written for blank bill to be written The no detection realized comprising sensitive information to above-mentioned field to be written will when above-mentioned field to be written does not include sensitive information Above-mentioned field to be written carries out Hash operation, and after sign test passes through, obtained Hash result is stored on block chain.Thus As it can be seen that the embodiment of the present application is that the corresponding field of electronic bill is stored by block chain network, so that after each field cochain, Just can not be tampered, be effectively ensured monitoring party anaphase nucleus check tickets according to when authenticity.In addition, before cochain, also to upper State the detection that field carries out sensitive information, effectively prevent include sensitive information field cochain after the problem of can not modifying, together When also reduce the risk that more problem bill is stored in block chain network.
Fig. 3 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.Referring to Fig. 3 institute Show, wherein the description that the description of S201-S213 is implemented referring to upper one, this method further include:
S214: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information, If it is, the label corresponding bill of cochain field.
It is to be understood that the sensitive information in non-sensitive information database is dynamic change, for cochain Cochain field may still include sensitive information, therefore, in the present embodiment also need to carry out sensitive letter to cochain field again The detection of breath.Specific detection process is identical as the detection mode before field cochain to be written, the description seen above.
In order to accelerate the speed of detection, used sensitive information when can mark detection before each field cochain to be written The situation of change of the sensitive information of the version of database and each version, by comparing current non-sensitive information database with it is upper The sensitive information that used non-sensitive information database is newly increased before chain, in this detection, it is only necessary to detect cochain Whether field includes the sensitive information newly increased.
It is to be understood that cochain field is magnanimity, if detected to each field, undoubtedly workload Be it is huge, moreover, the sensitivity coefficient of the not all field of cochain be all it is high, therefore, in order to reduce workload, improve secondary inspection The efficiency of survey.Preferably embodiment judges whether the field of cochain stored on the block chain includes institute described Before stating sensitive information further include:
Predefine the type of the field of screening;
It extracts and meets the target of type cochain field in the cochain field.
Judge whether the field of cochain stored on the block chain includes the sensitive information it is to be understood that described Specifically: judge whether cochain field includes the sensitive information to the target stored on the block chain.
Under normal conditions, the type includes but is not limited to: subscriber phone field, address name field, station address Field, items list field, memo field, drawer's field, auditor's field.
In the application, block chain network is synchronous with can be to server return Hash result for the detection of sensitive information , it is also possible to asynchronous.So-called synchronization is exactly that block chain network first judges whether field to be written includes sensitive information, When judging result shows not including sensitive information, then Hash operation is carried out to field to be written and obtains Hash result, and will be breathed out Uncommon result is back to server, the process as shown in figure N.It is so-called asynchronous, it is exactly that block chain is judging the field to be written While whether including the sensitive information, Hash operation is carried out to obtain the Hash result, so to the field to be written The Hash result is sent to the server afterwards.
Synchronous process
Fig. 4 is a kind of flow chart of the information processing method of electronic bill provided by the embodiments of the present application.Institute referring to fig. 4 Show, this method comprises:
S301: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database It include sensitive information.
S302: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing Enter the field of blank bill.
S303: the field to be written is sent to enterprise UE terminal by personal user's terminal.
S304: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
S305: all fields to be written are sent to server by enterprise UE terminal.
S306: server obtains the field to be written that enterprise UE terminal is sent.
S307: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S308: block chain network judges whether the field to be written includes the sensitive information.
S309: when the field to be written does not include the sensitive information, block chain network is to the field to be written Hash operation is carried out to obtain the Hash result.
S310: block chain network sends the Hash result to server.
S311: server encrypts the Hash result to obtain the signed data according to the private key of itself.
S312: the signed data is sent to block chain network by server.
S313: block chain network receives the signed data that the server returns, and utilizes the public key of the server Sign test is carried out to the signed data, and stores the field to be written to block chain after sign test passes through.
S314: when the field to be written includes the sensitive information, block chain network intercepts the field to be written, And generate interception record.
S315: block chain network sends the information for failure of making out an invoice to server.
S316: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information, If it is, the label corresponding bill of cochain field.
In the present embodiment, block chain network first carries out the detection of sensitive information to field to be written, is not including sensitive letter When breath, subsequent step is just carried out, avoids the field cochain to be written comprising sensitive information, but asking there is also low efficiency Topic.
During due to synchronization, it is usually to take biggish inspection that cochain field, which includes that the probability of sensitive information is smaller, Survey period progress secondary detection.For example, the period can be 6 months, 1 year etc..In order to adapt to the variation of non-sensitive information database, And bill of finding the problem in time, in the present embodiment, sensitive information detection is carried out to the field of whole bills.
Preferably embodiment, it is described to judge whether the field of cochain stored on the block chain includes described quick Sense information specifically includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the label corresponding bill of cochain field.
Asynchronous process
Fig. 5 is the flow chart of the information processing method of another electronic bill provided by the embodiments of the present application.Referring to Fig. 5 institute Show, this method comprises:
S401: block chain network obtains the access path of non-sensitive information database in advance, in the non-sensitive information database It include sensitive information.
S402: personal user's terminal obtains the field to be written of personal user's input, and the field to be written is for writing Enter the field of blank bill.
S403: the field to be written is sent to enterprise UE terminal by personal user's terminal.
S404: enterprise UE terminal receives the field to be written of the field to be written and enterprise customer's input.
S405: all fields to be written are sent to server by enterprise UE terminal.
S406: server obtains the field to be written that enterprise UE terminal is sent.
S407: the field to be written is sent to block chain network by the interface of making out an invoice of block chain network by server.
S408: block chain network carries out Hash operation to the field to be written to obtain the Hash result, Xiang Suoshu Server sends the Hash result, and judges whether the field to be written includes the sensitive information.
S409: server encrypts the Hash result to obtain the signed data according to the private key of itself;
S410: the signed data is sent to block chain network by server;
S411: block chain network receives the signed data that the server returns.
S412: block chain network judges whether there is the corresponding judging result of the field to be written.
S413: if there is the judging result, then block chain network judge the judging result whether characterize it is described to Field is written and does not include the sensitive information.
S414: if there is no the judging result, then block chain network judges whether to reach preset delay time, such as Fruit is not up to, then returns to S412.
S415: if reaching the preset delay time or not including the sensitive information, the server is utilized Public key to the signed data carry out sign test.
S416: when the field to be written includes the sensitive information, block chain network intercepts the field to be written, And generate interception record.
S417: block chain network sends the information for failure of making out an invoice to server.
S418: block chain network judges whether the field of cochain stored on the block chain includes the sensitive information, If it is, the label corresponding bill of cochain field.
In the present embodiment, block chain network carries out the detection and Hash operation of sensitive information simultaneously, so that server is not required to Signed data can be sent to block chain network by waiting the judging result of sensitive information, save interaction to a certain extent Efficiency.Although in S415, obtaining server it is worth noting that, asynchronous process can be improved interactive efficiency After signed data, if judging result is still not present by default delay time, it is directly written into data cochain.It can See, the step in, may there are problems that one or more fields to be written include sensitive information and cochain.In order to overcome This problem, the application also provide corresponding measure, i.e., carry out secondary detection to cochain field.It is to be understood that for What a upper embodiment was mentioned carries out secondary detection to cochain field, is especially adapted for use in the feelings by asynchronous mode cochain Condition.
During asynchronous, it is usually to take lesser inspection that cochain field, which includes that the probability of sensitive information is larger, Survey period progress secondary detection.For example, the period can be 1 month, 2 months etc..Since detection cycle is shorter, so if right Whole blocks are detected, then workload is huge, so only the upper detection of detection is all in each detection cycle in the present embodiment Phase is to current newly generated block.
Fig. 6 is a kind of process of detection method that sensitive information is carried out to cochain field provided by the embodiments of the present application Figure.As a preferred embodiment, whether the field of cochain for judging to store on the block chain in the present embodiment It is specifically included comprising the sensitive information:
S501: current block height is obtained;Wherein, high using the corresponding block height of a upper detection cycle as starting Degree;
S502: cochain field is obtained described in whole bills from the corresponding block of current block height;
S503: whether the judgement cochain field includes the sensitive information, if comprising the sensitive information, into Enter S504, otherwise enters S505;
S504: the label corresponding bill of cochain field, and enter S505;
S505: judging whether to reach current maximum block height, if not up to, entering S506, if reached, into Enter S507;
S506: current block height is increased into a height, and returns to S502;
S507: the current maximum block height of record returns to S505 using the starting altitude as next detection cycle.
By the above process it is found that the detection mode only detects a upper detection cycle to current produced new cochain Field.It is to be understood that needing all to detect whole cochain fields, as long as there is a cochain field in S503 Include sensitive information, then corresponding result be exactly include the sensitive information, into S504, if all do not included, correspond to Result be exactly not include sensitive information, into S505.
Below by a specific application scenarios example to cochain of the electronic bill in block chain network and inquiry Process is illustrated.Wherein, TrustSQL can be a kind of block chain bottom frame, can be compatible with Mysql and JsonRPC, and Support a variety of common recognition algorithms.TrustSQL specifically uses Byzantine failure tolerance common recognition mechanism, allows Partial Block chain node delay machine, has Conducive to reduction node cost of access and improve network reliability.The Digital Signature Algorithm of TrustSQL is digital signature of elliptic curve Algorithm, private key can be generated by server oneself, so that the binding between the field to be written that server is sent and server Relationship can not be tampered.
Fig. 7 is a kind of schematic diagram of application scenarios embodiment provided by the present application.As shown in fig. 7, personal user's terminal obtains Get the field to be written of personal user's input, including username field, Taxpayer Identification Number field, bank of deposit and account word Section, station address field, subscriber phone field, and above-mentioned field is sent to enterprise UE terminal, enterprise UE terminal is not only The field to be written for receiving the input of personal user's terminal also receives the field to be written of enterprise customer's input, including items list word Section, memo field, drawer's field, auditor's field etc..Above-mentioned whole field to be written, which is constituted, completes bill by enterprise customer Terminal is sent to server, these fields to be written are sent to a block chain node of block chain network by server unification, The node calls non-sensitive information database first to judge whether field to be written includes sensitive information.If field to be written In a certain field include " AAA ", and one of non-sensitive information database sensitive information is " AAA ", then by sentencing Disconnected, which includes sensitive information, otherwise, does not include sensitive information.When judging comprising sensitive information, then block The field to be written is cut, and generates interception record, can be sent to server and intercept record to be prompted.Personal user is whole End or enterprise UE terminal are modified according to prompt, execute the above process again.When judge field to be written do not include have When sensitive information, the corresponding Hash result of field to be written is obtained by Hash operation, and Hash result is sent to server. Server encrypts Hash result to obtain signed data according to the private key of itself, and one be sent in block chain network Block chain node, which carries out carrying out sign test to signed data using the public key of server, subsequent if sign test passes through To generate the block for including above-mentioned Hash result on the block chain node, and the block is broadcasted into its into block chain network Above-mentioned block can be appended on block chain block chain node by he after other block chain node verifications pass through.It is subsequent such as Fruit inquiry terminal needs to access to block chain network, then carries out looking into for corresponding bill by pre-set access mode It askes, inquiry mode can be the number of electronic bill, Hash result etc..After obtaining query result, if including sensitive letter Breath, then replace the field comprising sensitive information with " * ", and be back to inquiry terminal, thus which supervisor can determine A little fields include sensitive information, which field is normal.
Fig. 8 is a kind of structure chart of the information processing unit of electronic bill provided by the present application.As shown in figure 8, the device Include:
First obtains module 11, for obtaining the access path of non-sensitive information database, the sensitive information data in advance It include sensitive information in library.
Second obtains module 12, for obtaining the field to be written of server transmission to judge whether comprising the sensitive letter Breath;The field to be written is the field for blank bill to be written.
Message processing module 13 is used for when the field to be written does not include the sensitive information, to the server The signed data of return carries out sign test;The signed data is particular by the corresponding Hash result of the field to be written and institute The private key for stating server generates.
Information uploading module 14 stores the field to be written to block chain after passing through for sign test.
Mode, the information processing unit of electronic bill are preferably carried out as one kind further include:
First judgment module, whether the field of cochain for judging to store on the block chain includes the sensitive letter Breath;
Mark module is when being for the result in the first judgment module, and the label cochain field is corresponding Bill.
It is preferably carried out mode as one kind, message processing module 13 specifically includes:
First judging unit, for judging whether the field to be written includes the sensitive information;
When Hash operation unit for the judging result in the first judging unit is no, the field to be written is carried out Hash operation is to obtain the Hash result;
Hash transmission unit, for sending the Hash result so that the server is according to the private to the server Key encrypts the Hash result to obtain the signed data;
Receiving unit, the signed data returned for receiving the server;
First sign test unit carries out sign test to the signed data for the public key using the server.
It is preferably carried out mode as one kind, the first judgment module specifically includes:
First acquisition unit, for obtaining described in whole bills cochain field from block chain network;
Second judgment unit, for judging whether the cochain field includes the sensitive information, if comprising described Sensitive information then triggers the mark module.
It is preferably carried out mode as one kind, the message processing module 12 specifically includes:
Processing unit, for carrying out Hash operation to obtain the Hash result, to the clothes to the field to be written It is described so that the server according to the private key is encrypted to obtain to the Hash result that business device sends the Hash result Signed data, and judge whether the field to be written includes the sensitive information;
Receiving unit, the signed data returned for receiving the server;
Third judging unit, for judging whether there is the corresponding judging result of the field to be written;
4th judging unit, for described to be written there are when the judging result, judging whether the judging result characterizes Enter field not comprising the sensitive information;
5th judging unit, for judging whether to reach preset delay time there is no when the judging result, if Not up to, then the third judging unit is triggered;
Second sign test unit utilizes institute when for not including the sensitive information or reach the preset delay time The public key for stating server carries out sign test to the signed data.
It is preferably carried out mode as one kind, the first judgment module specifically includes:
Second acquisition unit, for obtaining current block height;Wherein, by the corresponding block height of a upper detection cycle As starting altitude;
Third acquiring unit, for obtaining described in whole bills cochain word from the corresponding block of current block height Section;
6th judging unit, for judging whether the cochain field includes the sensitive information, if comprising described Sensitive information then triggers the mark module and triggers the 7th judging unit or do not include the sensitive information, then described in triggering 7th judging unit;
7th judging unit reaches current maximum block height for judging whether;
Current block height is increased a height, and touch when for not up to current maximum block height by adding unit Send out third acquiring unit;
Recording unit when for reaching current maximum block height, records current maximum block height using as next The starting altitude of detection cycle;
Mode, above-mentioned apparatus are preferably carried out as one kind further include:
Setup module, for presetting sensitive information white list;
Second judgment module, for judging whether the field to be written includes letter in the sensitive information white list Breath, if do not included, triggers message processing module 13;If comprising directly triggering message processing module 13 is to service The signed data that device returns carries out sign test.
Mode, above-mentioned apparatus are preferably carried out as one kind further include:
Blocking module, for intercepting the field to be written when the field to be written includes the sensitive information, and It generates and intercepts record.
The information processing unit of electronic bill provided by the embodiments of the present application is being obtained for the to be written of blank bill to be written After entering field, judge whether above-mentioned field to be written includes detection of the sensitive information realization to above-mentioned field to be written, when above-mentioned When field to be written does not include sensitive information, above-mentioned field to be written is subjected to Hash operation, and after sign test passes through, will obtain Hash result be stored on block chain.It can be seen that the embodiment of the present application is to store electronic bill by block chain network Corresponding field so that just can not be tampered after each field cochain, be effectively ensured monitoring party anaphase nucleus check tickets according to when Authenticity.In addition, also carrying out the detection of sensitive information to above-mentioned field before cochain, it effectively prevent comprising sensitive information The problem of can not being modified after field cochain, while also reducing the risk that more problem bill is stored in block chain network.
Further, the embodiment of the present application also provides a kind of electronic equipment.Fig. 9 is a kind of electricity provided by the embodiments of the present application The structural schematic diagram of sub- equipment.As shown in figure 9, the electronic equipment includes memory 51, for storing computer program;Processor 52, the step of the information processing method such as electronic bill provided by the above embodiment is realized when for executing the computer program Suddenly.
Wherein, processor 52 may include one or more processing cores, such as 4 core processors, 8 core processors Deng.Processor 52 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field- Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed Logic array) at least one of example, in hardware realize.Processor 61 also may include primary processor and coprocessor, main place Reason device is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.In In some embodiments, processor 52 can be integrated with GPU (Graphics Processing Unit, image processor), GPU For being responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 52 can also include AI (Artificial Intelligence, artificial intelligence) processor, the AI processor is for handling the calculating in relation to machine learning Operation.
Memory 51 may include one or more computer readable storage mediums, which can be with It is non-transient.Memory 51 may also include high-speed random access memory and nonvolatile memory, such as one or more A disk storage equipment, flash memory device.In the present embodiment, memory 51 is at least used to store following computer program 521, Wherein, after which is loaded and executed by processor 52, it is disclosed to electronics to can be realized aforementioned any embodiment The correlation step of the information processing method of bill.In addition, the resource that memory 51 is stored can also include 512 He of operating system Data 513 etc., storage mode can be of short duration storage or permanently store.Wherein, operating system 512 may include Windows, Unix, Linux etc..Data 513 can include but is not limited to field to be written etc..
In some embodiments, electronic equipment, which may also include, display screen 53, power supply 54, communication interface 55, input and output Interface 56, sensor 57 and communication bus 58.
It will be understood by those skilled in the art that structure shown in Fig. 9 does not constitute the restriction to electronic equipment, can wrap It includes than illustrating more or fewer components.
Finally, the embodiment of the present application also discloses a kind of storage medium, computer is stored in the storage medium to be held Row instruction when the computer executable instructions are loaded and executed by processor, realizes that aforementioned any embodiment is disclosed by area The information processing method step for the electronic bill that block chain network executes.
It is to be understood that if the method in above-described embodiment is realized in the form of SFU software functional unit and as independence Product when selling or using, can store in a computer readable storage medium.Based on this understanding, the application Technical solution substantially all or part of the part that contributes to existing technology or the technical solution can be in other words It is expressed in the form of software products, which is stored in a storage medium, and it is each to execute the application The all or part of the steps of embodiment the method.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), magnetic or disk Etc. the various media that can store program code.
The information processing method of electronic bill provided herein, device, electronic equipment and medium are carried out above It is discussed in detail.Each embodiment is described in a progressive manner in specification, the highlights of each of the examples are with other The difference of embodiment, the same or similar parts in each embodiment may refer to each other.For device disclosed in embodiment For, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is said referring to method part It is bright.It should be pointed out that for those skilled in the art, under the premise of not departing from the application principle, Can also to the application, some improvement and modification can also be carried out, these improvement and modification also fall into the protection scope of the claim of this application It is interior.
Also it should be noted that, in the present specification, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that the process, method, article or equipment for including a series of elements not only includes that A little elements, but also including other elements that are not explicitly listed, or further include for this process, method, article or The intrinsic element of equipment.In the absence of more restrictions, the element limited by sentence "including a ...", is not arranged Except there is also other identical elements in the process, method, article or apparatus that includes the element.

Claims (11)

1. a kind of information processing method of electronic bill characterized by comprising
The access path of non-sensitive information database is obtained in advance, includes sensitive information in the non-sensitive information database;
The field to be written that server is sent is obtained to judge whether comprising the sensitive information;The field to be written be for The field of blank bill is written;
When the field to be written does not include the sensitive information, sign test is carried out to the signed data that the server returns; The signed data is generated particular by the private key of the corresponding Hash result of field to be written and the server;
Sign test stores the field to be written to block chain after passing through.
2. the information processing method of electronic bill according to claim 1, which is characterized in that further include:
Judge whether the field of cochain stored on the block chain includes the sensitive information;
If it is, the label corresponding bill of cochain field.
3. the information processing method of electronic bill according to claim 2, which is characterized in that described to work as the word to be written When section does not include the sensitive information, sign test is carried out to the signed data that the server returns and is specifically included:
Judge whether the field to be written includes the sensitive information;
If do not included, Hash operation is carried out to obtain the Hash result to the field to be written;
The Hash result is sent so that the server carries out the Hash result according to the private key to the server Encryption obtains the signed data;
Receive the signed data that the server returns;
Sign test is carried out to the signed data using the public key of the server.
4. the information processing method of electronic bill according to claim 3, which is characterized in that the judgement block chain Whether the field of cochain of upper storage includes that the sensitive information specifically includes:
Cochain field is obtained described in whole bills from block chain network;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field.
5. the information processing method of electronic bill according to claim 2, which is characterized in that described to work as the word to be written When section does not include the sensitive information, sign test is carried out to the signed data that the server returns and is specifically included:
Hash operation is carried out to the field to be written to obtain the Hash result, Xiang Suoshu server sends the Hash knot Fruit encrypts the Hash result according to the private key to obtain the signed data so as to the server, and described in judgement Whether field to be written includes the sensitive information;
Receive the signed data that the server returns;
Judge whether there is the corresponding judging result of the field to be written;
If there is the judging result, then judge whether the judging result characterizes the field to be written not comprising described quick Feel information;
If not including the sensitive information, sign test is carried out to the signed data using the public key of the server;
If there is no the judging result, then judge whether to reach preset delay time;
If not up to, return described in the step of judging whether there is the field to be written corresponding judging result;
If reached, enter the step of public key using the server carries out sign test to the signed data.
6. the information processing method of electronic bill according to claim 5, which is characterized in that the judgement block chain Whether the field of cochain of upper storage includes that the sensitive information specifically includes:
Obtain current block height;Wherein, using the corresponding block height of a upper detection cycle as starting altitude;
Cochain field is obtained described in whole bills from the corresponding block of current block height;
Whether the judgement cochain field includes the sensitive information;
If comprising the sensitive information, the step of entering described in the label the corresponding bill of cochain field;And judge Whether current maximum block height is reached;
If current block height not up to, is increased a height, and return described from the corresponding area of current block height The step of field of cochain of whole bills is obtained in block;
If reached, current maximum block height is recorded using the starting altitude as next detection cycle;
If not including the sensitive information, judge whether to reach current maximum block height;
If current block height not up to, is increased a height into described, and return described from current block height The step of field of cochain of whole bills is obtained in corresponding block;
If reached, enter the current maximum block height of the record using the step of the starting altitude as next detection cycle Suddenly.
7. the information processing method of electronic bill described in -6 any one according to claim 1, which is characterized in that further include:
Preset sensitive information white list;
Judge whether the field to be written includes information in the sensitive information white list;
If do not included, into described when the field to be written, which does not include, pre-set sensitive information, to service The signed data that device returns carries out the step of sign test;
If comprising being directly entered the step of signed data returned to server carries out sign test.
8. the information processing method of electronic bill described in -6 any one according to claim 1, which is characterized in that when it is described to When field is written comprising the sensitive information, further includes:
The field to be written is intercepted, and generates interception record.
9. a kind of information processing unit of electronic bill characterized by comprising
First acquisition module is wrapped in the non-sensitive information database for obtaining the access path of non-sensitive information database in advance Contain sensitive information;
Second obtains module, for obtaining the field to be written of server transmission to judge whether comprising the sensitive information;Institute Stating field to be written is the field for blank bill to be written;
Message processing module, for being returned to the server when the field to be written does not include the sensitive information Signed data carries out sign test;The signed data is particular by the corresponding Hash result of field to be written and the service The private key of device generates;
Information uploading module stores the field to be written to block chain after passing through for sign test.
10. a kind of electronic equipment, which is characterized in that including memory, for storing computer program;
Processor realizes the letter of electronic bill as claimed in any one of claims 1 to 8 when for executing the computer program The step of ceasing processing method.
11. a kind of computer readable storage medium, which is characterized in that be stored with computer on the computer readable storage medium Program, the computer program realize the information of electronic bill as claimed in any one of claims 1 to 8 when being executed by processor The step of processing method.
CN201910778771.6A 2019-08-22 2019-08-22 Information processing method and device of electronic bill, electronic equipment and medium Active CN110457957B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910778771.6A CN110457957B (en) 2019-08-22 2019-08-22 Information processing method and device of electronic bill, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910778771.6A CN110457957B (en) 2019-08-22 2019-08-22 Information processing method and device of electronic bill, electronic equipment and medium

Publications (2)

Publication Number Publication Date
CN110457957A true CN110457957A (en) 2019-11-15
CN110457957B CN110457957B (en) 2024-04-12

Family

ID=68488468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910778771.6A Active CN110457957B (en) 2019-08-22 2019-08-22 Information processing method and device of electronic bill, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN110457957B (en)

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111310205A (en) * 2020-02-11 2020-06-19 平安科技(深圳)有限公司 Sensitive information detection method and device, computer equipment and storage medium
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111932326A (en) * 2020-08-17 2020-11-13 腾讯科技(深圳)有限公司 Data processing method based on block chain network and related equipment
CN112532709A (en) * 2020-11-24 2021-03-19 杭州趣链科技有限公司 Uplink request processing method and device and block link point equipment
CN112559489A (en) * 2020-12-11 2021-03-26 杭州趣链科技有限公司 Block chain supervision method and equipment based on cross-chain and storage medium
CN112800457A (en) * 2021-01-13 2021-05-14 迅鳐成都科技有限公司 Sensitive information supervision method and system for block chain network
WO2021120628A1 (en) * 2019-12-19 2021-06-24 深圳壹账通智能科技有限公司 Blockchain-based sensitive word detection method and apparatus, computer device and computer-readable storage medium
CN113033565A (en) * 2021-03-10 2021-06-25 大象慧云信息技术有限公司 Electronic invoice data processing method and system
CN113434909A (en) * 2021-06-25 2021-09-24 湖北央中巨石信息技术有限公司 Data on-demand evidence storing method based on block chain
CN113824565A (en) * 2021-09-24 2021-12-21 广东卓启云链科技有限公司 Block chain sensitive information management method and related device
CN114461614A (en) * 2022-04-12 2022-05-10 北京安华金和科技有限公司 Sensitive data identification processing method and system
WO2022126720A1 (en) * 2020-12-15 2022-06-23 杭州趣链科技有限公司 Blockchain-based information shielding method and apparatus, device, and readable storage medium
CN114726561A (en) * 2020-12-22 2022-07-08 京东科技信息技术有限公司 Data processing method, device and system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018146A (en) * 2017-05-09 2017-08-04 暨南大学 A kind of public sentiment detection platform building method based on block chain technology
CN108984625A (en) * 2018-06-19 2018-12-11 平安科技(深圳)有限公司 Information filtering method, device, computer equipment and storage medium
CN109034924A (en) * 2018-08-16 2018-12-18 腾讯科技(深圳)有限公司 Electronic bill generation method, device, storage medium and computer equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018146A (en) * 2017-05-09 2017-08-04 暨南大学 A kind of public sentiment detection platform building method based on block chain technology
CN108984625A (en) * 2018-06-19 2018-12-11 平安科技(深圳)有限公司 Information filtering method, device, computer equipment and storage medium
CN109034924A (en) * 2018-08-16 2018-12-18 腾讯科技(深圳)有限公司 Electronic bill generation method, device, storage medium and computer equipment

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021120628A1 (en) * 2019-12-19 2021-06-24 深圳壹账通智能科技有限公司 Blockchain-based sensitive word detection method and apparatus, computer device and computer-readable storage medium
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111310205A (en) * 2020-02-11 2020-06-19 平安科技(深圳)有限公司 Sensitive information detection method and device, computer equipment and storage medium
CN111310205B (en) * 2020-02-11 2024-05-10 平安科技(深圳)有限公司 Sensitive information detection method, device, computer equipment and storage medium
CN111932326B (en) * 2020-08-17 2024-03-19 腾讯科技(深圳)有限公司 Data processing method based on block chain network and related equipment
CN111932326A (en) * 2020-08-17 2020-11-13 腾讯科技(深圳)有限公司 Data processing method based on block chain network and related equipment
CN112532709A (en) * 2020-11-24 2021-03-19 杭州趣链科技有限公司 Uplink request processing method and device and block link point equipment
WO2022110407A1 (en) * 2020-11-24 2022-06-02 杭州趣链科技有限公司 Uplink request processing method and apparatus, and blockchain node device
CN112559489A (en) * 2020-12-11 2021-03-26 杭州趣链科技有限公司 Block chain supervision method and equipment based on cross-chain and storage medium
CN112559489B (en) * 2020-12-11 2023-07-07 杭州趣链科技有限公司 Cross-chain-based blockchain supervision method, device and storage medium
WO2022126720A1 (en) * 2020-12-15 2022-06-23 杭州趣链科技有限公司 Blockchain-based information shielding method and apparatus, device, and readable storage medium
CN114726561B (en) * 2020-12-22 2024-04-05 京东科技信息技术有限公司 Data processing method, device and system
CN114726561A (en) * 2020-12-22 2022-07-08 京东科技信息技术有限公司 Data processing method, device and system
CN112800457A (en) * 2021-01-13 2021-05-14 迅鳐成都科技有限公司 Sensitive information supervision method and system for block chain network
CN113033565A (en) * 2021-03-10 2021-06-25 大象慧云信息技术有限公司 Electronic invoice data processing method and system
CN113434909B (en) * 2021-06-25 2023-12-29 湖北央中巨石信息技术有限公司 Data on-demand evidence-storing method based on blockchain
CN113434909A (en) * 2021-06-25 2021-09-24 湖北央中巨石信息技术有限公司 Data on-demand evidence storing method based on block chain
CN113824565B (en) * 2021-09-24 2023-08-25 广东卓启云链科技有限公司 Block chain sensitive information management method and related device
CN113824565A (en) * 2021-09-24 2021-12-21 广东卓启云链科技有限公司 Block chain sensitive information management method and related device
CN114461614B (en) * 2022-04-12 2022-06-28 北京安华金和科技有限公司 Sensitive data identification processing method and system
CN114461614A (en) * 2022-04-12 2022-05-10 北京安华金和科技有限公司 Sensitive data identification processing method and system

Also Published As

Publication number Publication date
CN110457957B (en) 2024-04-12

Similar Documents

Publication Publication Date Title
CN110457957A (en) Information processing method, device, electronic equipment and the medium of electronic bill
US20200294048A1 (en) Blockchain-based data verification method and apparatus, and electronic device
US20220180375A1 (en) Blockchain-based product authentication system
AU2018374912B2 (en) Model training system and method, and storage medium
CN109102269B (en) Transfer method and device based on block chain, block chain node and storage medium
CN111177275A (en) Block chain-based management method, terminal, device and storage medium
Choi et al. RFID tag data processing in manufacturing for track-and-trace anti-counterfeiting
WO2019157367A1 (en) Scalable decentralized digital and programmatic advertising analytics system
CN105262779B (en) Identity authentication method, device and system
KR20180115778A (en) Integrated block chain-based data transfer control method and system
CN110245186A (en) A kind of method for processing business and relevant device based on block chain
WO2021098274A1 (en) Method and apparatus for evaluating risk of leakage of private data
CN111786994B (en) Data processing method based on block chain and related equipment
CN112036995A (en) Large-scale enterprise financial data management method and system based on block chain and readable storage medium
WO2020186726A1 (en) Block chain-based blacklist data sharing method and system
CN110264325A (en) A kind of invoice checking method and device based on block chain
CN109493224A (en) A kind of block chain picture social intercourse system
CN109242666A (en) Personal reference method, apparatus and computer equipment are obtained based on block chain
US11769146B1 (en) Blockchain transactional identity verification
CN111008834A (en) Block chain-based charitable donation management method, equipment and medium
CN110913397A (en) Short message verification method and device, storage medium and computer equipment
Divya et al. Blockvoting: an online voting system using block chain
CN111814193B (en) Information sharing method, device and equipment
WO2019177788A1 (en) Detecting alterations of journal data structures
CN110599211A (en) Ticket information processing method and device and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant