CN113221158B - Block chain-based security verification method for stock of securities work - Google Patents

Block chain-based security verification method for stock of securities work Download PDF

Info

Publication number
CN113221158B
CN113221158B CN202011630965.0A CN202011630965A CN113221158B CN 113221158 B CN113221158 B CN 113221158B CN 202011630965 A CN202011630965 A CN 202011630965A CN 113221158 B CN113221158 B CN 113221158B
Authority
CN
China
Prior art keywords
data
manuscript
original
module
stock work
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011630965.0A
Other languages
Chinese (zh)
Other versions
CN113221158A (en
Inventor
王磊
林乐
兰春嘉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Lingshuzhonghe Information Technology Co ltd
Original Assignee
Shanghai Lingshuzhonghe Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lingshuzhonghe Information Technology Co ltd filed Critical Shanghai Lingshuzhonghe Information Technology Co ltd
Priority to CN202011630965.0A priority Critical patent/CN113221158B/en
Publication of CN113221158A publication Critical patent/CN113221158A/en
Application granted granted Critical
Publication of CN113221158B publication Critical patent/CN113221158B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to a security verification method of a stock work manuscript based on a blockchain. The method comprises the steps of extracting abstract and meta information of an original stock work manuscript file based on an SHA-256 secure hash algorithm, a clustering induction function and a secure lock, collecting data to be uplinked based on identity authentication and intelligent matching, constructing a distributed secure, non-tamperable and manuscript history traceable private chain with access right control, and realizing automatic intelligent verification of the stock work manuscript data based on intelligent matching, intelligent contracts and entrusting mechanisms.

Description

Block chain-based security verification method for stock of securities work
Technical Field
The invention relates to the field of data storage and verification, in particular to a security storage and verification method for a stock work manuscript based on a blockchain.
Background
Most of the existing certificate storage and verification devices of the stock work manuscript are single function devices, and usually only can complete the physical storage work of the stock work manuscript, while the verification work of the stock work manuscript needs another device to complete. The existing certificate storage devices of stock work manuscripts are mainly provided with a storage function, do not provide intelligent retrieval and intelligent matching, are mainly used for centralized storage, are irregular, lead to complicated file retrieval process, and lack sufficient safety guarantee in storage environment;
The existing stock work manuscript verification device needs more manual operation and manual verification, has higher requirements on the professional knowledge level of verification staff, and has low efficiency and higher error rate;
therefore, the invention aims to combine the requirements of the stock certificate and verification function of the stock certificate, combines the blockchain and the intelligent algorithm, designs a safe stock certificate verification device of the stock certificate based on the blockchain, constructs a distributed private chain with access right control, safety, non-falsification and traceability of the history of the stock certificate, realizes automatic intelligent stock certificate verification of the stock certificate data, reduces labor cost and improves the efficiency of stock certificate data stock certificate verification.
Disclosure of Invention
In view of the above, the present invention provides a security verification method for a blockchain-based stock work manuscript that solves or partially solves the above-mentioned problems.
In order to achieve the effects of the technical scheme, the technical scheme of the invention is as follows: a blockchain-based security document verification method, comprising the steps of:
a security verification method for a stock work manuscript based on a blockchain is characterized by comprising the following steps of: the system comprises a stock work manuscript data original storage module, a security module, a manuscript data uplink module, a block chain module and a manuscript data verification module;
The original stock data storage module is used for storing original stock files and provides a flexible inquiry mode of the stored original stock files;
the original storage module of the stock work manuscript data operates in a local area network where a user of the original storage module of the stock work manuscript data is located and is isolated from the external Internet;
when the original stock work manuscript file is stored in the stock work manuscript data original storage module, the stock work manuscript data original storage module is allocated with a unique mark ID;
the unique mark ID consists of a relation sub-object and a unique sub-object;
the relation sub-object is used for establishing the connection between the current original stock work manuscript file and other existing original stock work manuscript files in the stock work manuscript data original storage module;
the relationship sub-object consists of a relationship keyword and a relationship file mark ID group;
the relationship key has three different values;
the relationship key includes: a level association keyword, a father association keyword, a son association keyword;
each relationship keyword corresponds to one relationship file mark ID group, and different relationship keywords correspond to different relationship file mark ID groups;
The relation file mark ID group is an array, and the array can be null or non-null;
when the relation file mark ID group is a non-null value, the relation file mark ID group is an array formed by mark IDs of different original stock work manuscript files stored in one or more stock work manuscript data original storage modules, and all original stock work manuscript files corresponding to all mark IDs in the relation file mark ID group have a relation represented by relation keywords corresponding to the relation file mark ID group with the original stock work manuscript files corresponding to the mark IDs where the relation file mark ID group is located;
when the first original stock work manuscript file is being distributed with the mark ID by the stock work manuscript data original storage module, the original stock work manuscript file which is being distributed with the mark ID by the stock work manuscript data original storage module is called as a second original stock work manuscript file;
when the relationship file marking ID group corresponding to one relationship key word of the relationship sub-object of the marking ID allocated by the original storage module of the securities work manuscript data is null, the marked second original securities work manuscript file is not provided with the file with the relationship marked by the relationship key word in the original storage module of the securities work manuscript data;
The level association key represents other original stock work manuscript files with level association with the second original stock work manuscript file, and the level association does not comprise subordinate and subordinate relations;
the father association relation key words represent other original stock work manuscript files which have subordinate relations with the second original stock work manuscript file, namely other original stock work manuscript files of father relations of the second original stock work manuscript file;
the sub-association relation key words represent other original securities work manuscript files which have subordinate relations with the second original securities work manuscript file, namely other original securities work manuscript files of the sub-relations of the second original securities work manuscript file;
the original storage module of the stock work manuscript data can quickly inquire out an original stock work manuscript file set meeting the association relation set by the inquiry conditions by setting single and combined association relation inquiry conditions;
the security module comprises a meta information extraction unit, a hash unit and a security storage unit;
the security module is connected with the original storage module of the stock work manuscript data and can search and extract the original stock work manuscript file from the original storage module of the stock work manuscript data;
The meta information extraction unit firstly searches an original stock work manuscript file from a stock work manuscript data original storage module according to a search condition, the stock work manuscript data original storage module outputs the searched original stock work manuscript file to the meta information extraction unit of the security module, and the meta information extraction unit comprises a meta information predefined template and an intelligent induction module;
the meta-information predefined template is a rule matching set of a predefined condition set and a predefined meta-information set, and each condition defined in the predefined condition set is uniquely matched with one meta-information in the predefined meta-information set;
the predefined set of meta-information is a set of key description information for a document of a stock work manuscript, the predefined set of meta-information comprising: original stock work manuscript file name, original stock work manuscript file ID, original stock work manuscript file type, original stock work manuscript file storage path, original stock work manuscript file version, original stock work manuscript file creation date;
the intelligent induction template extracts an extended meta-information set except a predefined meta-information set in a meta-information predefined template in an original stock work manuscript file, then carries out cluster analysis on a combined set of the predefined meta-information set and the extended meta-information set of all original stock work manuscript files based on a cluster induction function, the cluster induction function firstly completes summation of cluster induction points of the same meta-information in the predefined meta-information set, then obtains an accumulated sum of cluster induction results of one predefined meta-information set, and then carries out secondary cluster induction based on the cluster induction function by combining the combined set of the predefined meta-information set and the extended meta-information set to obtain a cluster induction result cluster capable of being characterized in multiple dimensions;
Each cluster induction result cluster is a set formed by original stock work manuscript files with similar meta-information characteristics;
the hash unit adopts SHA-256 secure hash algorithm;
the hash unit receives the result of the clustering induction result cluster of the meta information extraction unit, and sequentially calculates the hash value of the original stock work manuscript file in each clustering induction result cluster, and the obtained hash value is used as the abstract data of the original stock work manuscript file;
the safe storage unit provides safe data storage service for summary data, a predefined meta information set and an extended meta information set of an original stock work manuscript file;
the security storage unit is provided with a security lock for the summary data, the predefined meta information set and the extended meta information set of each stored original stock work manuscript file, and the data stored in the security storage unit can be operated only by a user with a security fingerprint matched with the security lock;
the safe storage unit is connected with the manuscript data uplink module;
the manuscript data uplink module comprises an identity authentication private key unit and a to-be-uplink data collection unit based on intelligent matching;
the identity authentication private key unit stores a security identity private key with a unique identity mark and a security fingerprint, wherein the security identity private key can be used for signing blockchain transactions, and the security fingerprint is used for identity authentication when accessing the security storage unit;
Based on the intelligent matching, the to-be-uplink data collection unit calculates a matching set conforming to the fuzzy matching degree by utilizing the intelligent matching degree function based on the intelligent matching degree function;
the to-be-matched attribute parameters are input by a user of the manuscript data uplink module, and influence factors of different to-be-matched attribute parameters in the intelligent matching process are different, so that different to-be-matched attribute parameters can obtain different intelligent matching results;
the key of realizing intelligent matching based on the intelligent matching to-be-uplink data collection unit is to construct an intelligent matching degree function;
the intelligent matching degree function is influenced by influence factors of attribute parameters to be matched, and an intelligent matching filter is constructed for each attribute parameter to be matched based on the influence factors and the intelligent matching degree function;
then carrying out multistage intelligent matching screening on a plurality of similar attributes of each attribute parameter to be matched to form an iterative screener consisting of a plurality of intelligent matching screeners;
the output result of the iterative filter is used as an intelligent matching result of the data collection unit to be uplink based on intelligent matching;
The to-be-uplink data collection unit based on intelligent matching initiates a resource access request to the safe storage unit according to the intelligent matching result;
the manuscript data uplink module is connected with the secure storage unit, when the manuscript data uplink module initiates a resource access request to the secure storage unit, the secure storage requires the manuscript data uplink module to provide a secure fingerprint, the manuscript data uplink module sends the secure fingerprint encrypted by the secure identity private key to the secure storage unit, the secure storage unit decrypts by the corresponding public key and performs identity verification, and after the identity verification is passed, whether the secure fingerprint sent by the manuscript data uplink module is matched with the secure lock or not is verified;
after the verification is passed, a data access channel of the manuscript data uplink module is opened, and data is transmitted to the manuscript data uplink module;
when the verification is not passed, the security storage unit carries out credit punishment record on the security identity private key which requests data access, and when the same security identity private key is subjected to credit punishment record by the security storage unit for three times, the data access request of the security identity private key recorded with the credit punishment record for three times is permanently refused;
the block chain module constructs a distributed private chain with access authority control, only users granted with read or write authority can access and uplink the data in the private chain of the block chain module, the privacy of the private chain data is protected through the private chain controlled by the read or write authority, meanwhile, the trust degree between working nodes in the block chain module is improved, the complexity of hash calculation of a hierarchical tree structure in each transaction is reduced, and the block chain transaction speed is improved;
Each working node of the blockchain module stores and maintains a complete safety certificate of the historical securities working manuscript and verifies transaction data;
the historical securities work manuscript data is broadcast to all working nodes of the block chain module after digital signature is carried out by using an identity authentication private key of the working node to be currently uplink, the working node which receives the broadcast information carries out signature verification on the received broadcast information by using an identity authentication public key issued by the working node to be currently uplink;
all working nodes calculate the validity of the stock work manuscript data to be uplinked, which is broadcasted by the working node to be uplinked, based on a consensus algorithm of rights and interests proving, when the calculation of the validity of the first working node is completed, a new block is established for the stock work manuscript data to be uplinked, and a time stamp is added, so that the security document storage work of the stock work manuscript is completed;
storing security storage and verification transaction data of the historical securities working manuscript in a physical data block layer of a block chain module, and storing hash values of the securities working manuscript data according to a structure of a hierarchical tree, wherein each leaf node of the hierarchical tree stores hash values of the securities working manuscript data, and each non-leaf node of the hierarchical tree stores hash values of a collection of all leaf nodes belonging to each non-leaf node;
Predefined intelligent contracts in the blockchain module, wherein the intelligent contracts comprise data completeness checking intelligent contracts, data evidence storing intelligent contracts and data examining intelligent contracts;
the intelligent contract enables the security document storage and verification work of the stock document to be automatically triggered and automatically executed when the intelligent contract triggering condition is met;
the intelligent contract for checking the data completeness is used for checking the completeness and compliance of the stock work manuscript data to be uplinked, after the stock work manuscript data to be uplinked passes the checking of the intelligent contract for checking the data completeness, the intelligent contract for storing the data is triggered, and when the stock work manuscript data to be uplinked does not pass the checking of the intelligent contract for checking the data completeness, the uplink request of the stock work manuscript data to be uplinked is refused;
the data certificate intelligent contract is used for processing certificate storing work of stock data of securities to be linked, the data certificate intelligent contract depends on the data completeness checking intelligent contract, and the data certificate intelligent contract can be triggered only after the checking of the data completeness checking intelligent contract;
the data inspection intelligent contract has two triggering modes, wherein one triggering mode is periodically triggered according to a triggering time axis of the data inspection intelligent contract, the triggering time axis of the data inspection intelligent contract is a time axis established by taking a time stamp of a first block of a block chain when the first block of the block chain is successfully established as a starting point, a triggering point of the data inspection intelligent contract is set on the time axis every other fixed time period T from the starting point, each triggering point represents a time value, the data inspection intelligent contract is triggered according to the time value of the triggering point of the data inspection intelligent contract set on the triggering time axis of the data inspection intelligent contract, wherein the time period T is more than 0, and the T represents time in seconds;
The method comprises the steps that a manuscript data verification module collects manuscript data verification requests of a manuscript data verification module user, the manuscript data verification module encrypts the data verification requests by using a user private key of the manuscript data verification module and broadcasts the data verification requests to working nodes of a blockchain, the working nodes in the blockchain verify identities of the manuscript data verification module, after the identities pass, the first working node receives the broadcasting of the manuscript data verification module and completes identity verification work and serves as a primary consignment node of the manuscript data verification module, the primary consignment node decrypts the data verification requests of the manuscript data verification module by using a public key of the manuscript data verification module to obtain data verification request original plaintext of the manuscript data verification module, and the data verification request original plaintext of the manuscript data verification module is stored in a data verification request buffer stack of the primary consignment node;
the data verification request buffer stack of the primary entrusting node is a data temporary buffer area and is used for storing the original plaintext of the data verification request after the authentication and decryption of the manuscript data verification module;
the data verification request buffer stack of the primary consignment node is provided with a request quantity buffer threshold C, wherein C is a positive integer and represents quantity;
Before the original plaintext of the data verification request of the manuscript data verification module enters a data verification request buffer stack of a primary consignment node, firstly judging whether the number X of cached data verification request original plaintext in the data verification request buffer stack of the primary consignment node is smaller than a request number buffer threshold C, wherein X is a positive integer and represents the number;
when X < C, the data verification request buffer stack of the primary entrusting node receives and stores the data verification request original plaintext of the new manuscript data verification module, and meanwhile, the number of the cached data verification request original plaintext is increased by one;
when x=c, the data verification request buffer stack of the primary delegate node will not receive the original plaintext of the data verification request of the new manuscript data verification module any more, until the number of cached data verification request original plaintext in the data verification request buffer stack of the primary delegate node satisfies X < C, the data verification request original plaintext of the new manuscript data verification module can not be received and stored;
when the number of cached data verification request original plain texts in the data verification request buffer stack of the primary delegation node meets the condition X=C, broadcasting a giving up primary delegation message to all other working nodes in the blockchain by the primary delegation node;
After receiving the giving up primary delegation message of the primary delegation node, other working nodes of the block chain compete for the secondary delegation node of the manuscript data verification module;
in the competition process of the second-level consignment node, the working node which is provided that the number of the data verification request original plaintext cached in the data verification request buffer stack reaches a threshold value can not participate in the competition of the second-level consignment node;
after the primary delegation node broadcasts and gives up the primary delegation message, the first working node which receives the broadcast of the manuscript data verification module and completes the authentication work and meets the competition condition of the secondary delegation node is used as the secondary delegation node of the manuscript data verification module, and the original plaintext of the data verification request of the manuscript data verification module is stored in a data verification request buffer stack of the secondary delegation node;
the first-level entrusting node and the second-level entrusting node of the manuscript data verification module are collectively called as entrusting nodes of the manuscript data verification module;
the entrusting node of the manuscript data verification module processes the original plaintext of the data verification request of the manuscript data verification module in the data verification request buffer stack according to the time sequence, and the original plaintext of the data verification request which is first added into the stack is processed preferentially;
The processing flow is as follows: the entrusting node stacks a piece of data verification request original plaintext which is first stacked in the data verification request buffer stack, then broadcasts a private key of the entrusting node on the original plaintext of the data verification request to a blockchain, and a working node in the blockchain receives the data verification request of the entrusting node, verifies a historical securities working manuscript stored in the blockchain according to the data verification request and records a verification result.
The beneficial results of the invention are: the invention provides a security verification device of a stock work manuscript based on a blockchain, which comprises a stock work manuscript data original storage module, a security module, a manuscript data chaining module, a blockchain module and a manuscript data verification module. The method comprises the steps of extracting abstract and meta information of an original stock work manuscript file based on an SHA-256 secure hash algorithm, a clustering induction function and a secure lock, collecting data to be uplinked based on identity authentication and intelligent matching, constructing a distributed secure, non-tamperable and manuscript history traceable private chain with access right control, and realizing automatic intelligent verification of the stock work manuscript data based on intelligent matching, intelligent contracts and entrusting mechanisms.
Detailed Description
In order to make the technical problems, technical schemes and beneficial effects to be solved more clear, the invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for explaining the present invention, and are not intended to limit the present invention, and products capable of achieving the same function are included in the scope of protection of the present invention as equivalents and improvements. The specific method comprises the following steps:
example 1: a security verification method of stock work manuscript based on block chain includes stock work manuscript data original storage module, security module, manuscript data up-link module, block chain module, manuscript data verification module;
the original stock data storage module is used for storing original stock files and provides a flexible inquiry mode of the stored original stock files;
the original storage module of the stock work manuscript data operates in a local area network where a user of the original storage module of the stock work manuscript data is located and is isolated from the external Internet;
when the original stock work manuscript file is stored in the stock work manuscript data original storage module, the stock work manuscript data original storage module is allocated with a unique mark ID;
The unique mark ID consists of a relation sub-object and a unique sub-object;
the relation sub-object is used for establishing the connection between the current original stock work manuscript file and other existing original stock work manuscript files in the stock work manuscript data original storage module;
the relationship sub-object consists of a relationship keyword and a relationship file mark ID group;
the relationship key has three different values;
the relationship key includes: a level association keyword, a father association keyword, a son association keyword;
each relationship keyword corresponds to one relationship file mark ID group, and different relationship keywords correspond to different relationship file mark ID groups;
the relation file mark ID group is an array, and the array can be null or non-null;
when the relation file mark ID group is a non-null value, the relation file mark ID group is an array formed by mark IDs of different original stock work manuscript files stored in one or more stock work manuscript data original storage modules, and all original stock work manuscript files corresponding to all mark IDs in the relation file mark ID group have a relation represented by relation keywords corresponding to the relation file mark ID group with the original stock work manuscript files corresponding to the mark IDs where the relation file mark ID group is located;
When the first original stock work manuscript file is being distributed with the mark ID by the stock work manuscript data original storage module, the original stock work manuscript file which is being distributed with the mark ID by the stock work manuscript data original storage module is called as a second original stock work manuscript file;
when the relationship file marking ID group corresponding to one relationship key word of the relationship sub-object of the marking ID allocated by the original storage module of the securities work manuscript data is null, the marked second original securities work manuscript file is not provided with the file with the relationship marked by the relationship key word in the original storage module of the securities work manuscript data;
the level association key represents other original stock work manuscript files with level association with the second original stock work manuscript file, and the level association does not comprise subordinate and subordinate relations;
the father association relation key words represent other original stock work manuscript files which have subordinate relations with the second original stock work manuscript file, namely other original stock work manuscript files of father relations of the second original stock work manuscript file;
the sub-association relation key words represent other original securities work manuscript files which have subordinate relations with the second original securities work manuscript file, namely other original securities work manuscript files of the sub-relations of the second original securities work manuscript file;
The original storage module of the stock work manuscript data can quickly inquire out an original stock work manuscript file set meeting the association relation set by the inquiry conditions by setting single and combined association relation inquiry conditions;
the security module comprises a meta information extraction unit, a hash unit and a security storage unit;
the security module is connected with the original storage module of the stock work manuscript data and can search and extract the original stock work manuscript file from the original storage module of the stock work manuscript data;
the meta information extraction unit firstly searches an original stock work manuscript file from a stock work manuscript data original storage module according to a search condition, the stock work manuscript data original storage module outputs the searched original stock work manuscript file to the meta information extraction unit of the security module, and the meta information extraction unit comprises a meta information predefined template and an intelligent induction module;
the meta-information predefined template is a rule matching set of a predefined condition set and a predefined meta-information set, and each condition defined in the predefined condition set is uniquely matched with one meta-information in the predefined meta-information set;
the predefined set of meta-information is a set of key description information for a document of a stock work manuscript, the predefined set of meta-information comprising: original stock work manuscript file name, original stock work manuscript file ID, original stock work manuscript file type, original stock work manuscript file storage path, original stock work manuscript file version, original stock work manuscript file creation date;
The intelligent induction template extracts an extended meta-information set except a predefined meta-information set in a meta-information predefined template in an original stock work manuscript file, then carries out cluster analysis on a combined set of the predefined meta-information set and the extended meta-information set of all original stock work manuscript files based on a cluster induction function, the cluster induction function firstly completes summation of cluster induction points of the same meta-information in the predefined meta-information set, then obtains an accumulated sum of cluster induction results of one predefined meta-information set, and then carries out secondary cluster induction based on the cluster induction function by combining the combined set of the predefined meta-information set and the extended meta-information set to obtain a cluster induction result cluster capable of being characterized in multiple dimensions;
each cluster induction result cluster is a set formed by original stock work manuscript files with similar meta-information characteristics;
the hash unit adopts SHA-256 secure hash algorithm;
the hash unit receives the result of the clustering induction result cluster of the meta information extraction unit, and sequentially calculates the hash value of the original stock work manuscript file in each clustering induction result cluster, and the obtained hash value is used as the abstract data of the original stock work manuscript file;
The safe storage unit provides safe data storage service for summary data, a predefined meta information set and an extended meta information set of an original stock work manuscript file;
the security storage unit is provided with a security lock for the summary data, the predefined meta information set and the extended meta information set of each stored original stock work manuscript file, and the data stored in the security storage unit can be operated only by a user with a security fingerprint matched with the security lock;
the safe storage unit is connected with the manuscript data uplink module;
the manuscript data uplink module comprises an identity authentication private key unit and a to-be-uplink data collection unit based on intelligent matching;
the identity authentication private key unit stores a security identity private key with a unique identity mark and a security fingerprint, wherein the security identity private key can be used for signing blockchain transactions, and the security fingerprint is used for identity authentication when accessing the security storage unit;
based on the intelligent matching, the to-be-uplink data collection unit calculates a matching set conforming to the fuzzy matching degree by utilizing the intelligent matching degree function based on the intelligent matching degree function;
the to-be-matched attribute parameters are input by a user of the manuscript data uplink module, and influence factors of different to-be-matched attribute parameters in the intelligent matching process are different, so that different to-be-matched attribute parameters can obtain different intelligent matching results;
The key of realizing intelligent matching based on the intelligent matching to-be-uplink data collection unit is to construct an intelligent matching degree function;
the intelligent matching degree function is influenced by influence factors of attribute parameters to be matched, and an intelligent matching filter is constructed for each attribute parameter to be matched based on the influence factors and the intelligent matching degree function;
then carrying out multistage intelligent matching screening on a plurality of similar attributes of each attribute parameter to be matched to form an iterative screener consisting of a plurality of intelligent matching screeners;
the output result of the iterative filter is used as an intelligent matching result of the data collection unit to be uplink based on intelligent matching;
the to-be-uplink data collection unit based on intelligent matching initiates a resource access request to the safe storage unit according to the intelligent matching result;
the manuscript data uplink module is connected with the secure storage unit, when the manuscript data uplink module initiates a resource access request to the secure storage unit, the secure storage requires the manuscript data uplink module to provide a secure fingerprint, the manuscript data uplink module sends the secure fingerprint encrypted by the secure identity private key to the secure storage unit, the secure storage unit decrypts by the corresponding public key and performs identity verification, and after the identity verification is passed, whether the secure fingerprint sent by the manuscript data uplink module is matched with the secure lock or not is verified;
After the verification is passed, a data access channel of the manuscript data uplink module is opened, and data is transmitted to the manuscript data uplink module;
when the verification is not passed, the security storage unit carries out credit punishment record on the security identity private key which requests data access, and when the same security identity private key is subjected to credit punishment record by the security storage unit for three times, the data access request of the security identity private key recorded with the credit punishment record for three times is permanently refused;
the block chain module constructs a distributed private chain with access authority control, only users granted with read or write authority can access and uplink the data in the private chain of the block chain module, the privacy of the private chain data is protected through the private chain controlled by the read or write authority, meanwhile, the trust degree between working nodes in the block chain module is improved, the complexity of hash calculation of a hierarchical tree structure in each transaction is reduced, and the block chain transaction speed is improved;
each working node of the blockchain module stores and maintains a complete safety certificate of the historical securities working manuscript and verifies transaction data;
the historical securities work manuscript data is broadcast to all working nodes of the block chain module after digital signature is carried out by using an identity authentication private key of the working node to be currently uplink, the working node which receives the broadcast information carries out signature verification on the received broadcast information by using an identity authentication public key issued by the working node to be currently uplink;
All working nodes calculate the validity of the stock work manuscript data to be uplinked, which is broadcasted by the working node to be uplinked, based on a consensus algorithm of rights and interests proving, when the calculation of the validity of the first working node is completed, a new block is established for the stock work manuscript data to be uplinked, and a time stamp is added, so that the security document storage work of the stock work manuscript is completed;
storing security storage and verification transaction data of the historical securities working manuscript in a physical data block layer of a block chain module, and storing hash values of the securities working manuscript data according to a structure of a hierarchical tree, wherein each leaf node of the hierarchical tree stores hash values of the securities working manuscript data, and each non-leaf node of the hierarchical tree stores hash values of a collection of all leaf nodes belonging to each non-leaf node;
predefined intelligent contracts in the blockchain module, wherein the intelligent contracts comprise data completeness checking intelligent contracts, data evidence storing intelligent contracts and data examining intelligent contracts;
the intelligent contract enables the security document storage and verification work of the stock document to be automatically triggered and automatically executed when the intelligent contract triggering condition is met;
the intelligent contract for checking the data completeness is used for checking the completeness and compliance of the stock work manuscript data to be uplinked, after the stock work manuscript data to be uplinked passes the checking of the intelligent contract for checking the data completeness, the intelligent contract for storing the data is triggered, and when the stock work manuscript data to be uplinked does not pass the checking of the intelligent contract for checking the data completeness, the uplink request of the stock work manuscript data to be uplinked is refused;
The data certificate intelligent contract is used for processing certificate storing work of stock data of securities to be linked, the data certificate intelligent contract depends on the data completeness checking intelligent contract, and the data certificate intelligent contract can be triggered only after the checking of the data completeness checking intelligent contract;
the data inspection intelligent contract has two triggering modes, wherein one triggering mode is periodically triggered according to a triggering time axis of the data inspection intelligent contract, the triggering time axis of the data inspection intelligent contract is a time axis established by taking a time stamp of a first block of a block chain when the first block of the block chain is successfully established as a starting point, a triggering point of the data inspection intelligent contract is set on the time axis every other fixed time period T from the starting point, each triggering point represents a time value, the data inspection intelligent contract is triggered according to the time value of the triggering point of the data inspection intelligent contract set on the triggering time axis of the data inspection intelligent contract, wherein the time period T is more than 0, and the T represents time in seconds;
the method comprises the steps that a manuscript data verification module collects manuscript data verification requests of a manuscript data verification module user, the manuscript data verification module encrypts the data verification requests by using a user private key of the manuscript data verification module and broadcasts the data verification requests to working nodes of a blockchain, the working nodes in the blockchain verify identities of the manuscript data verification module, after the identities pass, the first working node receives the broadcasting of the manuscript data verification module and completes identity verification work and serves as a primary consignment node of the manuscript data verification module, the primary consignment node decrypts the data verification requests of the manuscript data verification module by using a public key of the manuscript data verification module to obtain data verification request original plaintext of the manuscript data verification module, and the data verification request original plaintext of the manuscript data verification module is stored in a data verification request buffer stack of the primary consignment node;
The data verification request buffer stack of the primary entrusting node is a data temporary buffer area and is used for storing the original plaintext of the data verification request after the authentication and decryption of the manuscript data verification module;
the data verification request buffer stack of the primary consignment node is provided with a request quantity buffer threshold C, wherein C is a positive integer and represents quantity;
before the original plaintext of the data verification request of the manuscript data verification module enters a data verification request buffer stack of a primary consignment node, firstly judging whether the number X of cached data verification request original plaintext in the data verification request buffer stack of the primary consignment node is smaller than a request number buffer threshold C, wherein X is a positive integer and represents the number;
when X < C, the data verification request buffer stack of the primary entrusting node receives and stores the data verification request original plaintext of the new manuscript data verification module, and meanwhile, the number of the cached data verification request original plaintext is increased by one;
when x=c, the data verification request buffer stack of the primary delegate node will not receive the original plaintext of the data verification request of the new manuscript data verification module any more, until the number of cached data verification request original plaintext in the data verification request buffer stack of the primary delegate node satisfies X < C, the data verification request original plaintext of the new manuscript data verification module can not be received and stored;
When the number of cached data verification request original plain texts in the data verification request buffer stack of the primary delegation node meets the condition X=C, broadcasting a giving up primary delegation message to all other working nodes in the blockchain by the primary delegation node;
after receiving the giving up primary delegation message of the primary delegation node, other working nodes of the block chain compete for the secondary delegation node of the manuscript data verification module;
in the competition process of the second-level consignment node, the working node which is provided that the number of the data verification request original plaintext cached in the data verification request buffer stack reaches a threshold value can not participate in the competition of the second-level consignment node;
after the primary delegation node broadcasts and gives up the primary delegation message, the first working node which receives the broadcast of the manuscript data verification module and completes the authentication work and meets the competition condition of the secondary delegation node is used as the secondary delegation node of the manuscript data verification module, and the original plaintext of the data verification request of the manuscript data verification module is stored in a data verification request buffer stack of the secondary delegation node;
the first-level entrusting node and the second-level entrusting node of the manuscript data verification module are collectively called as entrusting nodes of the manuscript data verification module;
The entrusting node of the manuscript data verification module processes the original plaintext of the data verification request of the manuscript data verification module in the data verification request buffer stack according to the time sequence, and the original plaintext of the data verification request which is first added into the stack is processed preferentially;
the processing flow is as follows: the entrusting node stacks a piece of data verification request original plaintext which is first stacked in the data verification request buffer stack, then broadcasts a private key of the entrusting node on the original plaintext of the data verification request to a blockchain, and a working node in the blockchain receives the data verification request of the entrusting node, verifies a historical securities working manuscript stored in the blockchain according to the data verification request and records a verification result.
The above description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the claims. While the invention has been described in terms of what are presently considered to be the most practical and preferred embodiments, it is to be understood that the invention is not limited to the disclosed embodiments.

Claims (1)

1. A security verification method for a stock work manuscript based on a blockchain is characterized by comprising the following steps of: the method comprises the steps of firstly, a stock work manuscript data original storage module, a security module, a manuscript data linking module, a block chain module and a manuscript data verification module; the original stock data storage module is used for storing original stock work manuscript files and providing flexible inquiry modes of the stored original stock work manuscript files; the original storage module of the stock work manuscript data operates in a local area network where a user of the original storage module of the stock work manuscript data is located and is isolated from the external Internet; when the original stock work manuscript file is stored in the stock work manuscript data original storage module, the stock work manuscript data original storage module distributes a unique mark ID; the unique mark ID consists of a relation sub-object and a unique sub-object; the relation sub-object is used for establishing the connection between the current original stock work manuscript file and other existing original stock work manuscript files in the stock work manuscript data original storage module; the relationship sub-object consists of a relationship keyword and a relationship file mark ID group; the relationship key has three different values; the relationship key comprises: a level association keyword, a father association keyword, a son association keyword; each relationship keyword corresponds to one relationship file mark ID group, and different relationship keywords correspond to different relationship file mark ID groups; the relation file mark ID group is an array, and the array can be null or non-null; when the relation file mark ID group is a non-null value, the relation file mark ID group is an array formed by mark IDs of different original stock work manuscript files stored in one or more stock work manuscript data original storage modules, and all original stock work manuscript files corresponding to all mark IDs in the relation file mark ID group have a relation represented by a relation key word corresponding to the relation file mark ID group with the original stock work manuscript file corresponding to the mark ID in which the relation file mark ID group is positioned; when a first original stock work manuscript file is being distributed with a mark ID by the stock work manuscript data original storage module, the original stock work manuscript file which is being distributed with the mark ID by the stock work manuscript data original storage module is called as a second original stock work manuscript file; when the relationship file mark ID group corresponding to one relationship key word of the mark ID of the second original stock work manuscript file which is currently marked is a null value, the second original stock work manuscript file which is distributed by the stock work manuscript data original storage module does not have the relationship marked by the relationship key word; the level association key represents other original stock work manuscript files with level association with the second original stock work manuscript file, and the level association does not comprise subordinate and affiliated relations; the father association relation key words represent other original stock work manuscript files with subordinate relation with the second original stock work manuscript file, namely other original stock work manuscript files of father relation of the second original stock work manuscript file; the sub-association relation keywords represent other original stock work manuscript files which have subordinate relations with the second original stock work manuscript file, namely other original stock work manuscript files of the sub-relations of the second original stock work manuscript file; the original storage module of the stock work manuscript data can quickly inquire out an original stock work manuscript file set meeting the association relation set by the inquiry conditions by setting single and combined association relation inquiry conditions; the security module comprises a meta information extraction unit, a hash unit and a security storage unit; the security module is connected with the original storage module of the stock work manuscript data and can search and extract an original stock work manuscript file from the original storage module of the stock work manuscript data; the meta information extraction unit firstly searches an original stock work manuscript file from the stock work manuscript data original storage module according to a search condition, the stock work manuscript data original storage module outputs the searched original stock work manuscript file to the meta information extraction unit of the security module, and the meta information extraction unit comprises a meta information predefined template and an intelligent induction module; step two, the meta-information predefined template is a rule matching set of a predefined condition set and a predefined meta-information set, and each condition defined in the predefined condition set is uniquely matched with one meta-information in the predefined meta-information set; the predefined set of meta-information is a key set of descriptive information of the stock work manuscript file, the predefined set of meta-information comprising: original stock work manuscript file name, original stock work manuscript file ID, original stock work manuscript file type, original stock work manuscript file storage path, original stock work manuscript file version, original stock work manuscript file creation date; the intelligent induction template extracts an extended meta-information set except a predefined meta-information set in the meta-information predefined template in the original stock work manuscript file, then performs cluster analysis on all combined sets of the predefined meta-information set and the extended meta-information set of the original stock work manuscript file based on a cluster induction function, wherein the cluster induction function firstly completes summation of cluster induction points of the same meta-information in the predefined meta-information set, then obtains an accumulated sum of cluster induction results of one predefined meta-information set, and then performs secondary cluster induction based on the cluster induction function by combining the combined sets of the predefined meta-information set and the extended meta-information set to obtain a cluster induction result cluster capable of being characterized in multiple dimensions; each cluster induction result cluster is a set formed by the original stock work manuscript files with similar meta-information characteristics; the hash unit adopts an SHA-256 secure hash algorithm; the hash unit receives the result of the clustering induction result cluster of the meta information extraction unit, and sequentially calculates the hash value of the original stock work manuscript file in each clustering induction result cluster, and the obtained hash value is used as the abstract data of the original stock work manuscript file; the safe storage unit provides safe data storage service for the abstract data, the predefined meta information set and the extended meta information set of the original stock work manuscript file; the security storage unit is provided with a security lock for each piece of stored summary data, a predefined meta information set and an extended meta information set of the original stock work manuscript file, and the data stored in the security storage unit can be operated only by a user with a security fingerprint matched with the security lock; the safe storage unit is connected with the manuscript data uplink module; the manuscript data uplink module comprises an identity authentication private key unit and a data collection unit to be uplink based on intelligent matching; the identity authentication private key unit stores a security identity private key with a unique identity mark and a security fingerprint, wherein the security identity private key can be used for signing blockchain transaction, and the security fingerprint is used for identity authentication when accessing the security storage unit; the to-be-uplink data collection unit based on intelligent matching calculates a matching set conforming to fuzzy matching degree by utilizing an intelligent matching degree function based on the intelligent matching degree function; the to-be-matched attribute parameters can be input by a user of the manuscript data uplink module, and influence factors of different to-be-matched attribute parameters in the intelligent matching process are different, so that different to-be-matched attribute parameters can obtain different intelligent matching results; the key of the intelligent matching-based to-be-uplink data collection unit is to construct an intelligent matching degree function; the intelligent matching degree function is influenced by the influence factors of the attribute parameters to be matched, and an intelligent matching filter is constructed for each attribute parameter to be matched based on the influence factors and the intelligent matching degree function; then carrying out multistage intelligent matching screening on a plurality of similar attributes of each attribute parameter to be matched to form an iterative screener consisting of a plurality of intelligent matching screeners; the output result of the iterative filter is used as an intelligent matching result of the to-be-uplink data collecting unit based on intelligent matching; the to-be-uplink data collection unit based on intelligent matching initiates a resource access request to the safe storage unit according to an intelligent matching result; the manuscript data uplink module is connected with the secure storage unit, when the manuscript data uplink module initiates a resource access request to the secure storage unit, the secure storage requires the manuscript data uplink module to provide a secure fingerprint, the manuscript data uplink module sends the secure fingerprint encrypted by a secure identity private key to the secure storage unit, the secure storage unit decrypts and performs identity verification by using a corresponding public key, and after the identity verification is passed, the secure storage unit verifies whether the secure fingerprint sent by the manuscript data uplink module is matched with a secure lock; after the verification is passed, opening a data access channel of the manuscript data uplink module, and transmitting data to the manuscript data uplink module; when the verification fails, the security storage unit performs credit punishment record on the security identity private key which requests data access, and when the same security identity private key is subjected to credit punishment record by the security storage unit for three times, the data access request of the security identity private key with three times is permanently refused; the block chain module constructs a distributed private chain with access authority control, only users granted with read or write authority can access and uplink the data in the private chain of the block chain module, the privacy of the private chain data is protected through the private chain controlled by the read or write authority, meanwhile, the trust degree between working nodes in the block chain module is improved, the complexity of hash calculation of a hierarchical tree structure in each transaction is reduced, and the speed of block chain transaction is improved; each working node of the blockchain module stores and maintains a complete safety certificate of a historical securities working manuscript and verification transaction data; the historical securities work manuscript data is digitally signed by an identity authentication private key of a current work node to be uplink and then broadcast to all work nodes of the block chain module, the work node which receives the broadcast information carries out signature verification on the received broadcast information by an identity authentication public key issued by the current work node to be uplink; all working nodes calculate the validity of the stock work manuscript data to be uplinked, which is broadcasted by the working node to be uplinked, based on a consensus algorithm of rights and interests proving, and when the calculation of the validity of the first working node is completed, a new block is established for the stock work manuscript data to be uplinked and a time stamp is added, so that the security document storage work of the stock work manuscript is completed; the security storage and verification transaction data of the historical stock work manuscript are stored in a physical data block layer of the block chain module, hash values of the stock work manuscript data are stored according to a structure of a hierarchical tree, wherein each leaf node of the hierarchical tree stores hash values of the stock work manuscript data, and each non-leaf node of the hierarchical tree stores hash values of a collection of all leaf nodes belonging to each non-leaf node; the block chain module is used for predefining intelligent contracts, wherein the intelligent contracts comprise a data completeness check intelligent contract, a data storage certificate intelligent contract and a data examination intelligent contract; the intelligent contract enables the security document storage and verification work of the stock to be automatically triggered and automatically executed when the intelligent contract triggering condition is met; the intelligent contract for checking the data completeness is used for checking the completeness and compliance of the stock work manuscript data to be uplinked, the intelligent contract for checking the data is triggered after the stock work manuscript data to be uplinked passes the check of the intelligent contract for checking the data completeness, and the request for uplinking the stock work manuscript data to be uplinked is refused when the stock work manuscript data to be uplinked does not pass the check of the intelligent contract for checking the data completeness; the data certification intelligent contract is used for processing certification work of stock data of securities work manuscript to be uplinked, the data certification intelligent contract depends on the data completeness checking intelligent contract, and the data certification intelligent contract can be triggered only after the data completeness checking intelligent contract is checked; the data inspection intelligent contract is periodically triggered according to a triggering time axis of the data inspection intelligent contract, the triggering time axis of the data inspection intelligent contract is a time axis established by taking a time stamp of a first block of the block chain when the first block is successfully established as a starting point, a triggering point of the data inspection intelligent contract is set on the time axis every other fixed time period T from the starting point, each triggering point represents a time value, and the data inspection intelligent contract is triggered according to the time value of the triggering point of the data inspection intelligent contract set on the triggering time axis of the data inspection intelligent contract, wherein the time period T is more than 0, and the time period T represents time in seconds; the method comprises the steps that a manuscript data verification module collects manuscript data verification requests of a manuscript data verification module user, the manuscript data verification module encrypts data verification requests by using a user private key of the manuscript data verification module and broadcasts the data verification requests to working nodes of a block chain, the working nodes in the block chain verify identities of the manuscript data verification module, after the identities pass verification, the first working node receives the broadcasting of the manuscript data verification module and completes identity verification work, and the working node serves as a primary entrusting node of the manuscript data verification module, decrypts the data verification requests of the manuscript data verification module by using a public key of the manuscript data verification module to obtain data verification request original plaintext of the manuscript data verification module, and stores the data verification request original plaintext of the manuscript data verification module into a data verification request buffer stack of the primary entrusting node; the data verification request buffer stack of the primary consignment node is a data temporary buffer area and is used for storing the original plaintext of the data verification request after the authentication and decryption of the manuscript data verification module; the data verification request buffer stack of the primary consignment node is provided with a request quantity buffer threshold C, wherein C is a positive integer and represents quantity; before the original plaintext of the data verification request of the manuscript data verification module enters a data verification request buffer stack of the primary consignment node, firstly judging whether the number X of cached data verification request original plaintext in the data verification request buffer stack of the primary consignment node is smaller than a request number buffer threshold C, wherein X is a positive integer and represents the number; when X < C, the data verification request buffer stack of the primary consignment node receives and stores the data verification request original plaintext of the new manuscript data verification module, and meanwhile, the number of the cached data verification request original plaintext is increased by one; when x=c, the data verification request buffer stack of the primary delegate node will not receive the new original plaintext of the data verification request of the manuscript data verification module any more, until the number of cached original plaintext of the data verification request in the data verification request buffer stack of the primary delegate node satisfies X < C, the data verification request original plaintext of the new manuscript data verification module can not be received and stored; when the number of cached data verification request original plain texts in the data verification request buffer stack of the primary delegation node meets the condition x=c, the primary delegation node broadcasts a relinquishing primary delegation message to all other working nodes in the blockchain; after receiving the primary delegation message of the primary delegation node, other working nodes of the blockchain compete for the secondary delegation node of the manuscript data verification module; in the competition process of the second-level consignment node, the working node which is provided that the number of the data verification request original plaintext cached in the data verification request buffer stack reaches a threshold value can not participate in the competition of the second-level consignment node; after the primary delegation node broadcasts and gives up the primary delegation message, a first working node which receives the broadcast of the manuscript data verification module and completes the authentication work and meets the competition condition of a secondary delegation node is used as the secondary delegation node of the manuscript data verification module, and the original plaintext of the data verification request of the manuscript data verification module is stored in a data verification request buffer stack of the secondary delegation node; collectively, a primary delegated node and a secondary delegated node of the manuscript data verification module are referred to as delegated nodes of the manuscript data verification module; the entrusting node of the manuscript data verification module processes the original plaintext of the data verification request of the manuscript data verification module in the data verification request buffer stack according to the time sequence, and preferentially processes the original plaintext of the data verification request which is first stacked; the processing flow is as follows: the entrusting node stacks a data verification request original plain text which is first stacked in a data verification request buffer stack, then broadcasts a private key of the entrusting node on the data verification request original plain text label to the block chain, and a working node in the block chain receives the data verification request of the entrusting node, verifies the stored historical stock work manuscript in the block chain according to the data verification request and records a verification result.
CN202011630965.0A 2020-12-31 2020-12-31 Block chain-based security verification method for stock of securities work Active CN113221158B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011630965.0A CN113221158B (en) 2020-12-31 2020-12-31 Block chain-based security verification method for stock of securities work

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011630965.0A CN113221158B (en) 2020-12-31 2020-12-31 Block chain-based security verification method for stock of securities work

Publications (2)

Publication Number Publication Date
CN113221158A CN113221158A (en) 2021-08-06
CN113221158B true CN113221158B (en) 2023-08-08

Family

ID=77085966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011630965.0A Active CN113221158B (en) 2020-12-31 2020-12-31 Block chain-based security verification method for stock of securities work

Country Status (1)

Country Link
CN (1) CN113221158B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN111383117A (en) * 2020-05-29 2020-07-07 支付宝(杭州)信息技术有限公司 Asset management method and device based on block chain and electronic equipment
CN111383120A (en) * 2020-05-29 2020-07-07 支付宝(杭州)信息技术有限公司 Asset management method and device based on block chain and electronic equipment
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111859422A (en) * 2020-07-10 2020-10-30 郑州信大先进技术研究院 Digital asset deposit certificate system based on block chain
CN111949733A (en) * 2020-08-21 2020-11-17 交通银行股份有限公司 Asset securitization management system and method based on block chain
CN112053274A (en) * 2020-10-12 2020-12-08 腾讯科技(深圳)有限公司 Construction guide method and device for government affair block chain network

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11711202B2 (en) * 2019-05-29 2023-07-25 International Business Machines Corporation Committing data to blockchain based on approximate hash verification

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106530088A (en) * 2016-12-19 2017-03-22 杜伯仁 Method for trading stock product based on block chain security nodes
CN109493042A (en) * 2018-10-24 2019-03-19 南京邮电大学 A kind of intelligent contract possessing access control function is credible to deposit card method and system
CN109639406A (en) * 2018-12-24 2019-04-16 国泰君安证券股份有限公司 Efficient trust solution based on block chain and IPFS
CN111475574A (en) * 2020-04-09 2020-07-31 成都九宽科技有限公司 Data acquisition device based on block chain
CN111383117A (en) * 2020-05-29 2020-07-07 支付宝(杭州)信息技术有限公司 Asset management method and device based on block chain and electronic equipment
CN111383120A (en) * 2020-05-29 2020-07-07 支付宝(杭州)信息技术有限公司 Asset management method and device based on block chain and electronic equipment
CN111859422A (en) * 2020-07-10 2020-10-30 郑州信大先进技术研究院 Digital asset deposit certificate system based on block chain
CN111949733A (en) * 2020-08-21 2020-11-17 交通银行股份有限公司 Asset securitization management system and method based on block chain
CN112053274A (en) * 2020-10-12 2020-12-08 腾讯科技(深圳)有限公司 Construction guide method and device for government affair block chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘瑜恒 等 ; .证券区块链的应用探索、问题挑战与监管对策.金融监管研究.2017,(04),第89-109页. *

Also Published As

Publication number Publication date
CN113221158A (en) 2021-08-06

Similar Documents

Publication Publication Date Title
Amudha Dilated transaction access and retrieval: Improving the information retrieval of blockchain-assimilated internet of things transactions
Xu et al. vChain: Enabling verifiable boolean range queries over blockchain databases
CN109145540B (en) Intelligent terminal identity authentication method and device based on block chain
US11061887B2 (en) Event verification receipt system and methods
Anagnostopoulos et al. Persistent authenticated dictionaries and their applications
Blaze et al. Decentralized trust management
CN109241753A (en) A kind of data sharing method and system based on block chain
CN108959457B (en) Method and system for inquiring and verifying certificate
CN108491495A (en) A kind of archive digitization management system
CN111611315A (en) Financial big data-oriented multi-branch tree structure block chain integrated optimization storage method
CN109922039A (en) A kind of identity management method of half centralization based on block chain technology
CN113259311B (en) Decentralized identity authentication system based on block chain
CN101251881A (en) Device, system and method for recognizing content
CN113065961A (en) Power block chain data management system
US20210409192A1 (en) Data access control with a confidential blockchain network
CN115865378B (en) Streaming media real-time certification and verification method based on blockchain
CN112865962A (en) Block chain-based distributed identification authentication method and device and electronic equipment
Li et al. ISCP: An Improved Blockchain Consensus Protocol.
CN117235810A (en) Log safe storage and efficient query method based on blockchain
CN113221158B (en) Block chain-based security verification method for stock of securities work
Gao et al. Data right confirmation mechanism based on blockchain and locality sensitive hashing
CN111614638A (en) Face recognition data distribution system and method based on big data platform
CN114389878B (en) Block chain slicing method and block chain network system
CN115982115A (en) Data sharing method
CN116484399A (en) Method and system for constructing ciphertext range search result completeness verification data structure

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 200120 building C3, No. 101 Eshan Road, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Shanghai Lingshuzhonghe Information Technology Co.,Ltd.

Address before: C3, 101 Eshan Road, Pudong New Area, Shanghai, 200120

Applicant before: NENG LIAN TECH. LTD.

GR01 Patent grant
GR01 Patent grant