CN111597562B - Block chain-based on-chain data verification method, device, equipment and storage medium - Google Patents

Block chain-based on-chain data verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN111597562B
CN111597562B CN202010269637.6A CN202010269637A CN111597562B CN 111597562 B CN111597562 B CN 111597562B CN 202010269637 A CN202010269637 A CN 202010269637A CN 111597562 B CN111597562 B CN 111597562B
Authority
CN
China
Prior art keywords
data
service
trade
business
financing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010269637.6A
Other languages
Chinese (zh)
Other versions
CN111597562A (en
Inventor
赵达悦
王梦寒
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN202010269637.6A priority Critical patent/CN111597562B/en
Publication of CN111597562A publication Critical patent/CN111597562A/en
Application granted granted Critical
Publication of CN111597562B publication Critical patent/CN111597562B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The present disclosure relates to the field of big data technologies, and in particular, to a method, an apparatus, a computer device, and a storage medium for verifying data on a chain based on a blockchain. The method comprises the following steps: each participant of the trade service is obtained and based on the encrypted service data uploaded by the corresponding blockchain node, the encrypted service data is the data obtained after each participant encrypts the service data of the trade service through a homomorphic encryption algorithm, and the encrypted service data carries the service identifier of the trade service; acquiring an association relationship between business data of trade business corresponding to the business identifier, and taking the association relationship as the association relationship between encryption business data of the trade business; and carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result. By adopting the method, the safety of the data on the chain can be improved.

Description

Block chain-based on-chain data verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a blockchain-based on-chain data verification method, device, apparatus, and storage medium.
Background
Supply chain financing is a branch of the financing service, which is characterized by the self-compensation nature of the financing service, i.e., the supply chain service (including commerce) underlying the financing service can generate sufficient cash inflow for reimbursement of all principal, interest and fees of the financing service. In supply chain financial transactions, audit verification of the authenticity of trade transaction data is important.
The traditional verification mode is that various trade business data are provided by an applicant and then are verified by manual verification, the provided trade business data are plaintext data, potential safety hazards exist, and the processing process is not intelligent enough by manual verification.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a blockchain-based on-chain data verification method, apparatus, device, and storage medium that can improve data security.
A blockchain-based on-chain data verification method, the method comprising:
each participant of the trade service is obtained and based on the encrypted service data uploaded by the corresponding blockchain node, the encrypted service data is the data obtained after each participant encrypts the service data of the trade service through a homomorphic encryption algorithm, and the encrypted service data carries the service identifier of the trade service;
Acquiring an association relationship between business data of trade business corresponding to the business identifier, and taking the association relationship as the association relationship between encryption business data of the trade business;
and carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result.
In one embodiment, before obtaining the association relationship between the business data of the trade business corresponding to the business identifier, the method further includes:
receiving an authorization key sent by each participant of the trade service, wherein the authorization key carries a service identifier of the trade service;
based on the service identification, sending the authorization key to other participants of the trade service corresponding to the service identification;
the association relation is established by carrying out association operation on each service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, obtaining an association relationship between service data of a trade service corresponding to a service identifier, and using the association relationship as an association relationship between encrypted service data of the trade service, includes:
Acquiring an association relationship between the same data items in each business data of the trade business, and taking the association relationship as the association relationship between the same data items in each encrypted business data of the trade business;
the method for judging whether the encrypted service data corresponding to the association relation is consistent comprises the following steps:
and judging whether the same data entry in each piece of encrypted service data corresponding to the association relationship is consistent.
In one embodiment, after cross-verifying each encrypted service data and outputting the cross-verification result, the method further includes:
receiving a financing request of a financing application party, wherein the financing request carries a business identifier of a trade business for auditing treatment;
the method comprises the steps of obtaining encrypted service data corresponding to a financing request, a cross-validation result of the encrypted service data and an authorization key of the encrypted service data based on a service identifier, and sending the obtained encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal carries out auditing processing on the financing request and receives an auditing processing result fed back to a blockchain by the financing terminal.
In one embodiment, after receiving the financing request from the financing applicant, the method further comprises:
Receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant;
and according to the user identification, inquiring the historical financing request and the auditing processing result thereof corresponding to the user identification on the blockchain, and sending the historical financing request and the auditing processing result to the financing terminal.
An on-chain data validation apparatus based on a blockchain, the apparatus comprising:
the system comprises an encryption service data acquisition module, a service identification processing module and a service identification processing module, wherein the encryption service data acquisition module is used for acquiring encryption service data uploaded by each participant of the trade service based on a corresponding blockchain node, wherein the encryption service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encryption service data carries the service identification of the trade service;
the association relation acquisition module is used for acquiring association relation among business data of the trade business corresponding to the business identifier, and taking the association relation as the association relation among the encrypted business data of the trade business;
and the cross verification module is used for carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation are consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result.
In one embodiment, the apparatus further includes:
the authorization key receiving module is used for receiving authorization keys respectively sent by all participants of the trade service, wherein the authorization keys carry service identifiers of the trade service;
the authorization key sending module is used for sending the authorization key to other parties of trade business corresponding to the business identifier based on the business identifier;
the association relation is established by carrying out association operation on each service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the association relationship obtaining module is configured to obtain an association relationship between the same data items in each service data of the trade service, and use the association relationship as an association relationship between the same data items in each encrypted service data of the trade service;
the cross verification module is used for judging whether the same data item in each encrypted service data corresponding to the association relationship is consistent.
A computer device comprising a memory storing a computer program and a processor implementing the steps of any one of the methods described above when the processor executes the computer program.
A computer readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of any of the preceding claims.
According to the above-mentioned on-chain data verification method, device, equipment and storage medium based on the blockchain, through obtaining the encrypted service data uploaded by each participant of the trade service based on the corresponding blockchain node, wherein the encrypted service data is the data obtained by encrypting the service data by each participant through the homomorphic encryption algorithm, the encrypted service data carries the service identification of the trade service, then the association relationship between the service data of the trade service corresponding to the service identification is obtained, the association relationship is used as the association relationship between the encrypted service data of the trade service, text recognition is further carried out on the encrypted service data of the trade service, whether the encrypted service data corresponding to the association relationship is consistent or not is judged, and cross verification is carried out on the encrypted service data of the trade service. Therefore, the service data on the block chain are all encrypted data, and the data for verification are also encrypted data, so that the security of the data on the chain can be improved. And the server performs cross-validation on the service data through the association relationship, so that manual participation is reduced, and data processing is more intelligent.
Drawings
FIG. 1 is an application scenario diagram of a blockchain-based on-chain data verification method in one embodiment;
FIG. 2 is a flow diagram of a blockchain-based on-chain data verification method in one embodiment;
FIG. 3 is a block diagram of a block chain based on-chain data validation device in one embodiment;
fig. 4 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The block chain-based on-chain data verification method provided by the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The terminal 102 includes a terminal for each participant to perform a data uplink operation, and may also include a terminal for submitting and auditing a financing application in a financing service process. Specifically, the terminal 102 uplinks encrypted service data corresponding to the trade service through the corresponding blockchain node. The server 104 obtains the encrypted service data uploaded by each participant of the trade service based on the corresponding blockchain node, obtains the association relationship between each service data of the trade service corresponding to the service identifier based on the service identifier of the trade service, uses the association relationship as the association relationship between each encrypted service data of the trade service, and then the server 104 carries out text recognition on each encrypted service data of the trade service, and judges whether the encrypted service data corresponding to the association relationship is consistent or not so as to carry out cross verification on each encrypted service data, thereby obtaining a verification result. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smartphones, tablet computers, and portable wearable devices, and the server 104 may be implemented by a stand-alone server or a server cluster composed of a plurality of servers.
In one embodiment, as shown in fig. 2, there is provided a block chain based on-chain data verification method, which is described by taking the application of the method to the server in fig. 1 as an example, and includes the following steps:
step S202, each party of the trade business is obtained based on the encrypted business data uploaded by the corresponding blockchain node, the encrypted business data is the data obtained by encrypting the business data of the trade business by each party through the homomorphic encryption algorithm, and the encrypted business data carries the business identification of the trade business.
The trade business refers to a business for conducting trade transactions, such as order transactions and the like. Each party to the trade service may include multiple parties to the buyer, seller, logistic party, etc.
Business data for a trade business refers to data generated in the trade business and may include, but is not limited to, purchase order data, invoice data, and shipping bill data, among others. Wherein the purchase order data may include, but is not limited to, a purchase order number, a name of the purchased item, a purchase quantity, an item model number, an item size, an item unit price, a purchase time, an item delivery address, and the like; invoice data may include, but is not limited to, invoice number, date of invoices, item names, number of purchases, model number of items, unit price of items, buyer name, buyer identification number, buyer address, etc.; the manifest data may include, but is not limited to, manifest number, recipient name, address, associated time, item type, etc. data.
The encrypted service data refers to data obtained by encrypting the service data through a homomorphic encryption algorithm, and the encrypted service data can carry the service identifier of the trade service. The homomorphic encryption algorithm can include, but is not limited to, RSA algorithm, paillier algorithm, gentry algorithm and other algorithms, and the service identification can be an order number or a trade bill number in trade service.
In this embodiment, the manner in which each participant uploads the encrypted service data to the blockchain may be that each participant fills in the service data and encrypts and uploads the service data by manually entering the service data through a terminal, or may also be that the encrypted service data in the enterprise resource planning system (Enterprise Resource Planning, ERP) is automatically synchronized to the blockchain by means of system docking, for example, through a related docking interface.
Optionally, before uploading the encrypted service data, the server may create a blockchain node corresponding to each participant, authenticate the authentication information uploaded by each participant through the blockchain node corresponding to each participant, and obtain the electronic signature of each participant after the authentication is passed.
The server can authenticate authentication information submitted by each participant in a manner of interfacing external enterprise business information, wherein a specific authentication manner is authentication by adopting an enterprise four-element manner, namely, authentication of enterprise names, enterprise codes, legal representative person names, legal representative person identity card numbers and the like is included.
The server authenticates each participant and acquires the electronic signature of each participant, so that the electronic signature of each participant is carried in the encrypted service data uploaded by each participant, and the authenticity of the uploaded encrypted service data can be improved.
Step S204, the association relation between the business data of the trade business corresponding to the business identification is obtained, and the association relation is used as the association relation between the encryption business data of the trade business.
The association relationship refers to the relationship among purchase order data, invoice data and freight bill data uploaded by different participants in the business data of the trade business.
Specifically, the server can obtain the association relation between the corresponding business data from the blockchain through the business identifier of the trade business, so that the association relation is used as the association relation between the encrypted business data of the trade business, and the association relation between the encrypted purchase order data, the invoice data and the freight bill data is obtained.
Alternatively, in some trade businesses, the amount of transactions involved may be large, the buyer may be a purchase with only one purchase order, only one purchase order data, but the seller may be shipping and invoicing over a time period or batch, so there may be multiple invoices and multiple pieces of logistic information, i.e., multiple invoice data and multiple invoice data, in the trade business. In this embodiment, the association relationship may be a relationship that associates purchase order data, a plurality of invoice data, and a plurality of waybill data of the trade service.
And S206, carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result.
As described above, each encrypted service data is ciphertext data obtained by a homomorphic encryption algorithm.
In this embodiment, for each encrypted service data, plaintext is identical, encryption algorithm is identical, and ciphertext obtained after encryption is also identical.
The server can judge whether the encrypted service data corresponding to the association relation is consistent or not by carrying out text recognition on the obtained encrypted service data so as to carry out cross verification on the encrypted service data.
Specifically, if the server judges that the encrypted service data corresponding to the association relationship are consistent, determining that the encrypted service data are real data, and outputting a cross verification result that the verification of the encrypted service data of the trade service is consistent by the server; if the server judges that the encrypted service data corresponding to the association relation is inconsistent, the encrypted service data is determined to be non-real data, and the server outputs a cross verification result that the verification of the encrypted service data of the trade service is inconsistent.
In the above-mentioned on-chain data verification method based on the blockchain, by acquiring the encrypted service data uploaded by each participant of the trade service based on the corresponding blockchain node, wherein the encrypted service data is the data obtained by encrypting the service data by each participant through the homomorphic encryption algorithm, the encrypted service data carries the service identifier of the trade service, then the association relationship between the service data of the trade service corresponding to the service identifier is acquired, the association relationship is used as the association relationship between the encrypted service data of the trade service, text recognition is further carried out on each encrypted service data of the trade service, whether the encrypted service data corresponding to the association relationship is consistent or not is judged, and cross verification is carried out on each encrypted service data of the trade service. Therefore, the service data on the block chain are all encrypted data, and the data for verification are also encrypted data, so that the security of the data on the chain can be improved. And the server performs cross-validation on the service data through the association relationship, so that manual participation is reduced, and data processing is more intelligent.
In one embodiment, the method may further include: receiving an authorization key sent by each participant of the trade service, wherein the authorization key carries a service identifier of the trade service; and sending the authorization key to other parties of the trade business corresponding to the business identifier based on the business identifier.
As described above, the association relationship refers to a relationship among purchase order data, invoice data, and shipping bill data uploaded by different parties in the business data of the trade business. In this embodiment, the association relationship may be established by performing association operation on each service data obtained by decrypting each encrypted service data of the trade service after decrypting each encrypted service data by an authorized party of the authorization key.
Specifically, the server determines each participant of the trade service corresponding to the service identifier according to the service identifier, and sends the authorization key of each participant to other participants, for example, the server grants the authorization key of the logistics company for encrypting the waybill data to the seller and the buyer, sends the authorization key of the buyer for encrypting the purchase order data to the seller, and sends the authorization key of the seller for encrypting the invoice data to the buyer.
Alternatively, the server may acquire the corresponding authorization key according to the key acquisition request of each party, and send the authorization key to the corresponding authorized requester, or may perform the sending of the authorization key according to the authorization operation of the authorizer of the authorization key.
Further, the authorized party of the authorization key can decrypt the encrypted service data based on the obtained authorization key, as described above, the authorized party of the authorization key for encrypting the shipping bill data is the seller and the buyer, the authorized party of the authorization key for encrypting the purchase order data is the seller, and similarly, the authorized party of the authorization key for encrypting the invoice data is the buyer.
Specifically, after decrypting the encrypted service data of the trade service based on the authorization key to obtain service data, the authorized party can perform association operation on each service data of the trade service, namely, associate purchase order data, invoice data and waybill data to obtain association relations of each service data of the trade service, and upload the association relations to the blockchain.
In the above embodiment, by receiving the authorization key sent by each participant of the trade service and sending the authorization key to other participants of the trade service corresponding to the service identifier based on the service identifier of the trade service carried by the authorization key, only the participants of the trade service can acquire the key and decrypt the encrypted service data, thereby further improving the security of the data.
In one embodiment, obtaining the association relationship between the business data of the trade business corresponding to the business identifier, and taking the association relationship as the association relationship between the encrypted business data of the trade business may include: and acquiring the association relation between the same data items in each business data of the trade business, and taking the association relation as the association relation between the same data items in each encrypted business data of the trade business. The server determining whether the encrypted service data corresponding to the association relationship is consistent may include: and judging whether the same data entry in each piece of encrypted service data corresponding to the association relationship is consistent.
Wherein, the data entry refers to each piece of data in each piece of business data or each piece of encrypted business data described above, for example, for purchase order data, the data entry is a purchase order number, a purchased article name, a purchase number, an article model, an article size, an article unit price, a purchase time, an article delivery address, and the like; for invoice data, the data items are invoice numbers, invoicing dates, article names, purchase numbers, article models, article unit prices, buyer names, buyer identification numbers, buyer addresses and the like; for the manifest data, the data entries are manifest number, receiver name, address, associated time, item type, etc.
In this embodiment, the association relationship may be an association relationship between the same bill entry in invoice data, purchase order data, and waybill data associated with a trade service, for example, an association relationship between buyer names in invoice data, purchase order data, and waybill data, and an association relationship between seller names in invoice data, purchase order data, and waybill data. Specifically, the method may further include an association relationship that associates the names of the goods, the specifications of the goods, the unit price of the goods, the currency, the number of the goods, the units, the total price of the goods, and the like one by one. For example, company A places a purchase order to company B, including the item name iphone x, 10 items in number, and 1 ten thousand unit price; and then, the company B issues an invoice comprising the item names iphone x, 10 items and unit price of 2 ten thousand, and can associate the item names, the item numbers and the unit price in the purchase order and the invoice to obtain the association relationship among the same bill items and upload the association relationship to the blockchain.
Further, the server may use the association relationship between the same data entry in each service data of the trade service obtained from the blockchain as the association relationship between the same data entry in each encrypted service data of the trade service.
Further, the server can perform text recognition on each piece of encrypted service data, acquire the same data item in each piece of encrypted service data based on the association relation of the same data item in each piece of service document, and judge whether the same data item is consistent or not. For example, with the previous example, for the "item name" in the purchase order and the invoice associated with the association relationship, the "iphone x" in the purchase order and the invoice is homomorphic encrypted, and after homomorphic encryption, the ciphertext is consistent, so the determination result of the "item name" data item is consistent; in contrast, the "unit price" in the purchase order and the invoice associated with the association relationship is "1 ten thousand" in the purchase order, and "2 ten thousand" in the invoice, and the ciphertext thereof is inconsistent, and therefore, the determination result of the "unit price" data item is inconsistent.
Optionally, the server may select the same data entry corresponding to each association relationship from the encrypted service data, as a data set, and then the server determines the same data entry in each data set to determine whether the same data entries are consistent, so as to obtain a determination result of each same data entry.
Alternatively, the server may determine a plurality of identical data entries in each encrypted service data of the trade service in a certain logic order or in a parallel manner, and obtain each data entry determination result.
In this embodiment, if the determination results of all the data entries in each encrypted service data of the trade service are consistent, a determination result that the service data is real service data is obtained, and if the determination result of at least one data entry is inconsistent, a determination result that the service data is non-real service data is obtained.
In the above embodiment, the association relationship between the same data items in each encrypted service data of the trade service is obtained by obtaining the association relationship between the same data items in each service data of the trade service, so that when judging whether the encrypted service data are consistent, each data item can be judged, a more accurate judgment result can be obtained, and the accuracy of data verification is improved.
In one embodiment, the method may further include: receiving a financing request of a financing application party, wherein the financing request carries a business identifier of a trade business for auditing treatment; the method comprises the steps of obtaining encrypted service data corresponding to a financing request, a cross-validation result of the encrypted service data and an authorization key of the encrypted service data based on a service identifier, and sending the obtained encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal carries out auditing processing on the financing request and receives an auditing processing result fed back to a blockchain by the financing terminal.
The financing application party is an application party requesting financing, and can apply for financing according to business data of trade business, namely, the financing application party can be a buyer or a seller in trade transaction.
The financing request carries a business identifier of a trade business used for auditing the financing request, and the financing request can include, but is not limited to, information of applicant, information of a designated financial institution, information of an application cause, a financing amount, detailed use of financing, mortgage and the like.
Specifically, the financing applicant may initiate a financing application to one or more financial institutions based on business data of a trade business, or may apply simultaneously or sequentially, which is not limited.
The server acquires corresponding encrypted service data on the blockchain, a verification result of cross verification of the encrypted service data and an authorization key of the encrypted service data based on a service identifier of a trade service carried by the financing request according to the financing request of the financing applicant, and sends the acquired encrypted service data, the verification result of cross verification of the encrypted service data and the authorization key of the encrypted service data to the financing terminal.
Further, the financing terminal decrypts the encrypted service data according to the financing request and the authorization key sent by the server, performs verification processing on whether financing is performed based on the service data obtained after decryption and a verification result of cross verification performed by the server to determine whether the financing is performed, for example, the verification result is failed, and the financing mechanism can determine whether the financing application is failed due to fake or input errors according to the decrypted service data and then determine whether the financing is performed; if the verification result is passed, the financing can be directly agreed.
In this embodiment, the auditing result of the auditing process of the financing organization on the financing application may be uploaded to the blockchain via the financing terminal and notify the financing applicant party. The financing application party can determine whether the financing application passes or not through the auditing and processing results uploaded by the financing organization and perform subsequent processing work.
In the above embodiment, by receiving the financing request of the financing applicant, acquiring the corresponding data based on the service identifier carried by the financing request, sending the financing terminal, and receiving the auditing result of the financing terminal, all the data of the financing application are uploaded to the blockchain, thereby guaranteeing the integrity of the data on the chain and providing a reference basis for the subsequent financing application.
In one embodiment, the method may further include: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and according to the user identification, inquiring the historical financing request and the auditing processing result thereof corresponding to the user identification on the blockchain, and sending the historical financing request and the auditing processing result to the financing terminal.
The financing history result obtaining request may be a request for obtaining a financing history result of the financing applicant, where the financing history result obtaining request carries a user identifier of the financing applicant. The applicant identity may be the identity of the business name, business code, etc. of the financing applicant as described above.
Specifically, the server may query, from the blockchain, a historical financing request of a financing application party corresponding to the application party identifier and a result of an audit process thereof according to the application party identifier, for example, a specific historical financing application amount, an application time of each historical financing application, whether each application passes, and reasons that the application does not pass, such as invoice faking, data unreality, and the like.
Furthermore, the financing terminal can take the historical financing request and the auditing processing result of the financing application party as references to carry out auditing judgment on the financing request of the financing application party and obtain the auditing processing result corresponding to the financing application.
In the above embodiment, the historical financing request corresponding to the user identifier on the blockchain and the auditing processing result thereof are queried and sent to the financing terminal, so that the financing terminal can determine whether to apply for financing to the financing applicant by taking the historical data as a reference, and further can reduce the financing risk of the financing institution.
It should be understood that, although the steps in the flowchart of fig. 2 are shown in sequence as indicated by the arrows, the steps are not necessarily performed in sequence as indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in fig. 2 may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, nor do the order in which the sub-steps or stages are performed necessarily performed in sequence, but may be performed alternately or alternately with at least a portion of the sub-steps or stages of other steps or other steps.
In one embodiment, as shown in FIG. 3, there is provided a blockchain-based on-chain data verification device, comprising: an encrypted service data acquisition module 100, an association acquisition module 200, and a cross-validation module 300, wherein:
The encrypted service data acquisition module 100 is configured to acquire encrypted service data uploaded by each participant of the trade service based on the corresponding blockchain node, where the encrypted service data is data obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service.
The association relation obtaining module 200 is configured to obtain an association relation between each service data of the trade service corresponding to the service identifier, and use the association relation as an association relation between each encrypted service data of the trade service.
The cross-validation module 300 is configured to perform text recognition on each piece of encrypted service data of the trade service, and determine whether the encrypted service data corresponding to the association relationship is consistent, so as to perform cross-validation on each piece of encrypted service data and output a cross-validation result.
In one embodiment, the apparatus may further include:
and the authorization key receiving module is used for receiving authorization keys respectively sent by all the participants of the trade service, wherein the authorization keys carry service identifiers of the trade service.
And the authorization key sending module is used for sending the authorization key to other parties of trade business corresponding to the business identifier based on the business identifier.
The association relation is established by carrying out association operation on each piece of service data obtained by decryption after each piece of encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the association acquiring module 200 may be configured to acquire an association between the same data entry in each service data of the trade service, and use the association as an association between the same data entry in each encrypted service data of the trade service;
the cross-validation module 300 is configured to determine whether the same data entry in each encrypted service data corresponding to the association relationship is consistent.
In one embodiment, the apparatus may further include:
and the financing request receiving module is used for receiving the financing request of the financing application party, and the financing request carries the service identification of the trade service for auditing and processing.
The result receiving module is used for acquiring the encrypted service data corresponding to the financing request, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to the financing terminal so that the financing terminal carries out auditing processing on the financing request and receives the auditing processing result fed back to the blockchain by the financing terminal.
In one embodiment, the apparatus may further include:
the financing history result acquisition request receiving module is used for receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing application party.
And the query module is used for querying the historical financing request and the auditing processing result thereof corresponding to the user identifier on the blockchain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
For specific limitations on the blockchain-based on-chain data verification device, reference may be made to the limitations hereinabove for the blockchain-based on-chain data verification method, and no further description is given herein. The various modules in the blockchain-based on-chain data verification device described above may be implemented in whole or in part in software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, the internal structure of which may be as shown in fig. 4. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The database of the computer device is used for storing encrypted service data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program, when executed by a processor, implements a blockchain-based on-chain data verification method.
Those skilled in the art will appreciate that the structures shown in FIG. 4 are block diagrams only and do not constitute a limitation of the computer device on which the present aspects apply, and that a particular computer device may include more or less components than those shown, or may combine some of the components, or have a different arrangement of components.
In one embodiment, a computer device is provided comprising a memory storing a computer program and a processor that when executing the computer program can implement the steps of: each participant of the trade service is obtained and based on the encrypted service data uploaded by the corresponding blockchain node, the encrypted service data is the data obtained after each participant encrypts the service data of the trade service through a homomorphic encryption algorithm, and the encrypted service data carries the service identifier of the trade service; acquiring an association relationship between business data of trade business corresponding to the business identifier, and taking the association relationship as the association relationship between encryption business data of the trade business; and carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result.
In one embodiment, before the processor executes the computer program to obtain the association relationship between the business data of the trade business corresponding to the business identifier, the following steps may be further implemented: receiving an authorization key sent by each participant of the trade service, wherein the authorization key carries a service identifier of the trade service; based on the service identification, sending the authorization key to other participants of the trade service corresponding to the service identification; the association relation is established by carrying out association operation on each service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the processor when executing the computer program realizes obtaining the association relationship between the business data of the trade business corresponding to the business identifier, and uses the association relationship as the association relationship between the encrypted business data of the trade business, and may include: and acquiring the association relation between the same data items in each business data of the trade business, and taking the association relation as the association relation between the same data items in each encrypted business data of the trade business. The processor, when executing the computer program, may determine whether the encrypted service data corresponding to the association relationship is consistent, and may include: and judging whether the same data entry in each piece of encrypted service data corresponding to the association relationship is consistent.
In one embodiment, after the processor performs cross-validation on each encrypted service data and outputs a cross-validation result when executing the computer program, the following steps may be further implemented: receiving a financing request of a financing application party, wherein the financing request carries a business identifier of a trade business for auditing treatment; the method comprises the steps of obtaining encrypted service data corresponding to a financing request, a cross-validation result of the encrypted service data and an authorization key of the encrypted service data based on a service identifier, and sending the obtained encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal carries out auditing processing on the financing request and receives an auditing processing result fed back to a blockchain by the financing terminal.
In one embodiment, after the processor executes the computer program to receive the financing request from the financing applicant, the following steps may also be implemented: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and according to the user identification, inquiring the historical financing request and the auditing processing result thereof corresponding to the user identification on the blockchain, and sending the historical financing request and the auditing processing result to the financing terminal.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, can implement the steps of: each participant of the trade service is obtained and based on the encrypted service data uploaded by the corresponding blockchain node, the encrypted service data is the data obtained after each participant encrypts the service data of the trade service through a homomorphic encryption algorithm, and the encrypted service data carries the service identifier of the trade service; acquiring an association relationship between business data of trade business corresponding to the business identifier, and taking the association relationship as the association relationship between encryption business data of the trade business; and carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result.
In one embodiment, before the computer program is executed by the processor to obtain the association relationship between the business data of the trade business corresponding to the business identifier, the following steps may be further implemented: receiving an authorization key sent by each participant of the trade service, wherein the authorization key carries a service identifier of the trade service; based on the service identification, sending the authorization key to other participants of the trade service corresponding to the service identification; the association relation is established by carrying out association operation on each service data obtained by decryption after each encrypted service data of the trade service is decrypted by an authorized party of the authorization key.
In one embodiment, the computer program when executed by the processor obtains an association relationship between service data of the trade service corresponding to the service identifier, and uses the association relationship as an association relationship between encrypted service data of the trade service, and may include: and acquiring the association relation between the same data items in each business data of the trade business, and taking the association relation as the association relation between the same data items in each encrypted business data of the trade business. The computer program, when executed by the processor, may implement determining whether the encrypted service data corresponding to the association relationship is consistent, and may include: and judging whether the same data entry in each piece of encrypted service data corresponding to the association relationship is consistent.
In one embodiment, after the computer program is executed by the processor to implement cross-validation on each encrypted service data and output a cross-validation result, the following steps may be implemented: receiving a financing request of a financing application party, wherein the financing request carries a business identifier of a trade business for auditing treatment; the method comprises the steps of obtaining encrypted service data corresponding to a financing request, a cross-validation result of the encrypted service data and an authorization key of the encrypted service data based on a service identifier, and sending the obtained encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal carries out auditing processing on the financing request and receives an auditing processing result fed back to a blockchain by the financing terminal.
In one embodiment, after the computer program is executed by the processor to receive a financing request from a financing applicant, the following steps may also be implemented: receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of a financing applicant; and according to the user identification, inquiring the historical financing request and the auditing processing result thereof corresponding to the user identification on the blockchain, and sending the historical financing request and the auditing processing result to the financing terminal.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the various embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples merely represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the invention. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application is to be determined by the claims appended hereto.

Claims (10)

1. A blockchain-based on-chain data verification method, the method comprising:
acquiring encrypted service data uploaded by each participant of the trade service based on a corresponding blockchain node, wherein the encrypted service data is obtained by encrypting the service data of the trade service by each participant through a homomorphic encryption algorithm, and the encrypted service data carries a service identifier of the trade service;
Acquiring an association relationship between business data of trade business corresponding to the business identifier, and taking the association relationship as the association relationship between encryption business data of the trade business;
text recognition is carried out on each piece of encrypted service data of the trade service, whether the encrypted service data corresponding to the association relation is consistent or not is judged, so that cross verification is carried out on each piece of encrypted service data, and a cross verification result is output;
before the association relation between the business data of the trade business corresponding to the business identifier is obtained, the method further comprises:
receiving an authorization key sent by each participant of the trade service, wherein the authorization key carries a service identifier of the trade service;
based on the service identifier, sending the authorization key to other participants of trade service corresponding to the service identifier;
the association relation is established by carrying out association operation on each piece of service data obtained by decryption after each piece of encrypted service data of the trade service is decrypted by an authorized party of the authorization key;
the step of sending the authorization key to other participants of the trade business corresponding to the business identifier comprises the following steps:
Sending an authorization key to a participant according to a key acquisition request of the participant, wherein the participant is a participant of trade business corresponding to the business identifier;
or according to the authorizing operation of the authorizing party of the authorizing key, the authorizing key is sent to the corresponding authorized party, and the authorized party is the participant of the trade business corresponding to the business identifier.
2. The method according to claim 1, wherein the obtaining the association relationship between the business data of the trade business corresponding to the business identifier, and taking the association relationship as the association relationship between the encrypted business data of the trade business, includes:
acquiring an association relation between the same data items in each business data of the trade business, and taking the association relation as the association relation between the same data items in each encrypted business data of the trade business;
the judging whether the encrypted service data corresponding to the association relation is consistent or not comprises the following steps:
and judging whether the same data item in each piece of encrypted service data corresponding to the association relationship is consistent.
3. The method of claim 1, wherein after cross-verifying each of the encrypted service data and outputting a cross-verification result, further comprising:
Receiving a financing request of a financing application party, wherein the financing request carries a business identifier of a trade business for auditing treatment;
and acquiring the encrypted service data corresponding to the financing request, a verification result of the cross verification of the encrypted service data and an authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the verification result of the cross verification of the encrypted service data and the authorization key of the encrypted service data to a financing terminal so that the financing terminal carries out auditing processing on the financing request and receives the auditing processing result fed back to a blockchain by the financing terminal.
4. The method of claim 3, wherein after receiving the financing request from the financing applicant, further comprising:
receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of the financing applicant;
and according to the user identification, inquiring a historical financing request and an auditing processing result thereof corresponding to the user identification on a blockchain, and sending the historical financing request and the auditing processing result to the financing terminal.
5. A blockchain-based on-chain data verification device, the device comprising:
the system comprises an encryption service data acquisition module, a service identification module and a service identification module, wherein the encryption service data acquisition module is used for acquiring encryption service data uploaded by each participant of a trade service based on a corresponding blockchain node, wherein the encryption service data is data obtained by encrypting service data of the trade service by each participant through a homomorphic encryption algorithm, and the encryption service data carries the service identification of the trade service;
the association relation acquisition module is used for acquiring association relation among business data of the trade business corresponding to the business identifier, and taking the association relation as the association relation among the encrypted business data of the trade business;
the cross verification module is used for carrying out text recognition on each piece of encrypted service data of the trade service, judging whether the encrypted service data corresponding to the association relation is consistent or not, carrying out cross verification on each piece of encrypted service data, and outputting a cross verification result;
further comprises:
the authorization key receiving module is used for receiving authorization keys sent by all participants of the trade service respectively, wherein the authorization keys carry service identifiers of the trade service;
The authorization key sending module is used for sending the authorization key to other participants of trade business corresponding to the business identifier based on the business identifier;
the association relation is established by carrying out association operation on each piece of service data obtained by decryption after each piece of encrypted service data of the trade service is decrypted by an authorized party of the authorization key;
the authorization key sending module is specifically configured to, when sending the authorization key to other parties of the trade service corresponding to the service identifier:
sending an authorization key to a participant according to a key acquisition request of the participant, wherein the participant is a participant of trade business corresponding to the business identifier;
or according to the authorizing operation of the authorizing party of the authorizing key, the authorizing key is sent to the corresponding authorized party, and the authorized party is the participant of the trade business corresponding to the business identifier.
6. The apparatus of claim 5, wherein the association acquiring module is configured to acquire an association between the same data entry in each service data of the trade service, and use the association as an association between the same data entry in each encrypted service data of the trade service;
The cross verification module is used for judging whether the same data item in each encrypted service data corresponding to the association relation is consistent or not.
7. The apparatus of claim 5, wherein the apparatus further comprises:
the financing request receiving module is used for receiving a financing request of a financing applicant, wherein the financing request carries a business identifier of a trade business for auditing treatment;
the result receiving module is used for acquiring the encrypted service data corresponding to the financing request, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data based on the service identifier, and sending the acquired encrypted service data, the cross-validation result of the encrypted service data and the authorization key of the encrypted service data to the financing terminal so that the financing terminal carries out auditing processing on the financing request and receives the auditing processing result fed back to the blockchain by the financing terminal.
8. The apparatus of claim 7, wherein the apparatus further comprises:
the financing history result acquisition request receiving module is used for receiving a financing history result acquisition request, wherein the financing history result acquisition request carries a user identifier of the financing applicant;
And the query module is used for querying a historical financing request and an auditing processing result thereof corresponding to the user identifier on the blockchain according to the user identifier, and sending the historical financing request and the auditing processing result to the financing terminal.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 4 when the computer program is executed.
10. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 4.
CN202010269637.6A 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium Active CN111597562B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010269637.6A CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010269637.6A CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111597562A CN111597562A (en) 2020-08-28
CN111597562B true CN111597562B (en) 2023-06-23

Family

ID=72183514

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010269637.6A Active CN111597562B (en) 2020-04-08 2020-04-08 Block chain-based on-chain data verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111597562B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112016924A (en) * 2020-10-21 2020-12-01 支付宝(杭州)信息技术有限公司 Data evidence storage method, device and equipment based on block chain
CN113034265B (en) * 2020-11-24 2024-05-07 腾讯科技(深圳)有限公司 Data verification method, device, computer equipment and computer readable storage medium
CN113051597B (en) * 2021-04-21 2023-04-11 深圳壹账通智能科技有限公司 Method and device for generating combined shipping bill of lading, electronic equipment and storage medium

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108428106A (en) * 2018-02-05 2018-08-21 深圳市资本在线金融信息服务有限公司 A kind of intelligent application method, system and terminal device of financing

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104657843A (en) * 2015-03-06 2015-05-27 上海玖纳信息科技有限公司 Cross-border on-line automatic customs clearance and reconciliation method and system
CN109544160B (en) * 2018-11-20 2020-06-30 杭州呯嘭智能技术有限公司 Transaction authenticity verification method and system based on block chain and intelligent contract

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108428106A (en) * 2018-02-05 2018-08-21 深圳市资本在线金融信息服务有限公司 A kind of intelligent application method, system and terminal device of financing

Also Published As

Publication number Publication date
CN111597562A (en) 2020-08-28

Similar Documents

Publication Publication Date Title
US11190358B2 (en) Hash-based data verification system
CN109034924B (en) Electronic bill generating method, electronic bill generating device, storage medium and computer equipment
EP3811562B1 (en) Method, computer program product and apparatus for creating, registering, and verifying digitally sealed assets
CN110599137B (en) Electronic bill data processing method and device and computer equipment
CN111159779B (en) Customs clearance data processing method and device, computer equipment and storage medium
US9876646B2 (en) User identification management system and method
US11949791B2 (en) Hash contract generation and verification system
CN111597562B (en) Block chain-based on-chain data verification method, device, equipment and storage medium
US20170026180A1 (en) Method and database system for secure storage and communication of information
US9530126B2 (en) Secure mobile payment processing
CN110378755B (en) Electronic invoice generation method and device, computer equipment and storage medium
EP3556069A1 (en) System and method for securely processing an electronic identity
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
CN111815308A (en) Trade data processing method based on block chain and related equipment thereof
CN112513904B (en) Digital asset transaction control method, device, terminal equipment and storage medium
US20230020190A1 (en) Techniques For Performing Secure Operations
US20220108322A1 (en) Systems and methods for use in biometric-enabled network interactions
CN110599322B (en) Data auditing method and device based on blockchain network
US20170061431A1 (en) Systems and Methods of Securing MO/TO Processing
US20220376914A1 (en) Token management system and method
TWM549906U (en) System using electronic device for payment
CN112669035A (en) Block chain based bulk commodity spot transaction system and method
US20200273037A1 (en) Payment-system-based user authentication and information access system and methods
CN111917776A (en) Electronic invoice generating device and system
CN113393180A (en) Bin data processing method and device, electronic equipment and computer readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant