CN117113431A - Trade financing file storage and calling method, device, system and medium - Google Patents

Trade financing file storage and calling method, device, system and medium Download PDF

Info

Publication number
CN117113431A
CN117113431A CN202311055359.4A CN202311055359A CN117113431A CN 117113431 A CN117113431 A CN 117113431A CN 202311055359 A CN202311055359 A CN 202311055359A CN 117113431 A CN117113431 A CN 117113431A
Authority
CN
China
Prior art keywords
trade financing
file
hash value
signature
institution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311055359.4A
Other languages
Chinese (zh)
Inventor
胡小明
温雨霖
黄文东
郑学友
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202311055359.4A priority Critical patent/CN117113431A/en
Publication of CN117113431A publication Critical patent/CN117113431A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application provides a method, a device, a system and a medium for storing and calling trade financing files, which can be applied to the field of big data or finance. Transmitting the signature ciphertext and the encryption key to a second authority; decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first institution to obtain a second hash value, and uploading the second hash value to the alliance chain for comparison; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution. By paperless storage of traditional trade financing data in a distributed network storage system, paper use is reduced and data flow is quickened. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.

Description

Trade financing file storage and calling method, device, system and medium
Technical Field
The application relates to the technical field of computers, in particular to a method, a device, a system and a medium for storing and calling trade financing files.
Background
The financial industry has emerged as a new peak in recent decades as a traditional industry with a long history, also by virtue of the rapid development of electronic information technology. The explosive increase of the traffic brings considerable revenue and the frequent risk problem is not neglected. The current electronic information era enters the Internet stage, if the financial industry can be tightly combined with Internet technology, risks can be identified timely, the efficiency is positively improved, and the development of leaping type development is brought forward.
The trade financing service is a very important service in the financial industry, effectively solves the problem of difficult financing of small and medium-sized enterprises, and widens the financing channel of the small and medium-sized enterprises. In recent years, with globalization, trade volume between countries and regions has increased greatly, and risks have increased silently. The current business mode which is highly dependent on the manual cross checking of both sides of trade to judge the authenticity and accuracy of a large number of paper trade documents is no longer applicable to the current situation. Thus leading to four aspects of trade financing: firstly, the verification cost is high. And secondly, the information is incomplete. And thirdly, repeated financing. Fourth, the financing cost is increased.
The current trade financing business mainly uses paper certificates, various data are many and miscellaneous, the circulation among a plurality of acceptance departments is slow, the trade financing business is easy to tamper, the repeated financing is easy to be caused, and the business data are scattered and isolated and the statistical supervision difficulty is high.
Therefore, how to realize paperless storage and calling of trade financing files, quicken the circulation of the data, prevent tampering and increase mutual trust is a technical problem to be solved in the field.
Disclosure of Invention
In view of the above, this summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
The application aims to provide a method, a device, a system and a medium for storing and calling trade financing files, which can realize paperless storing and calling of the trade financing files, quicken the circulation of data, prevent tampering and increase mutual trust.
In order to achieve the above purpose, the application has the following technical scheme:
in a first aspect, an embodiment of the present application provides a method for storing and calling a trade financing file, including:
After the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain;
carrying out digital signature on the initial trade financing file by utilizing a private key of the first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file;
symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to the second authority;
decrypting the encryption key by using the private key of the second mechanism to obtain the symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file;
decrypting the digital signature of the signature trade financing file by using the public key of the first organization to obtain a second hash value, and uploading the second hash value to the alliance chain to be compared with the first hash value;
and when the first hash value and the second hash value are consistent, transmitting the initial trade financing file to the second institution.
In one possible implementation, before the interstellar file system receives the initial trade financing file uploaded by the first institution, the method further comprises:
verifying the identity of the first and second organizations with a management organization on the federation chain;
and after passing the authentication, controlling the management institution to issue respective public keys to the first institution and the second institution.
In one possible implementation, after the interstellar file system receives the initial trade financing file uploaded by the first organization, the computing the first hash value of the initial trade financing file is uploaded to a coalition chain and further comprises:
generating an address hash of the initial trade financing file, and generating a new block of a block chain according to the address hash; the block head of the new block records meta information of the new block; and recording the address hash by the block body of the new block.
In one possible implementation, the new region includes a plurality of; after the generating the new blockchain block according to the address hash, the method further comprises:
and connecting the new blocks to form the block chain according to the generation time sequence of the new blocks.
In a second aspect, an embodiment of the present application provides a trade financing file storage calling apparatus, including:
the first calculation unit is used for calculating a first hash value of the initial trade financing file and uploading the first hash value to the alliance chain after the interstellar file system receives the initial trade financing file uploaded by the first organization;
the splicing unit is used for digitally signing the initial trade financing file by utilizing the private key of the first mechanism, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file;
the encryption unit is used for symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to the second authority;
a decryption unit, configured to decrypt the encryption key by using a private key of the second mechanism, to obtain the symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file;
the second computing unit is used for decrypting the digital signature of the signature trade financing file by utilizing the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain and comparing the second hash value with the first hash value;
And the sending unit is used for sending the initial trade financing file to the second institution when the first hash value and the second hash value are consistent.
In one possible implementation, the method further includes:
an identity verification unit, configured to perform identity verification on the first and second institutions by using a management institution on the federation chain;
and the issuing unit is used for controlling the management institution to issue the public keys to the first institution and the second institution when the identity verification is passed.
In one possible implementation, the apparatus further includes:
the generation unit is used for generating an address hash of the initial trade financing file and generating a new block of the block chain according to the address hash; the block head of the new block records meta information of the new block; and recording the address hash by the block body of the new block.
In one possible implementation, the method further includes:
and the connecting unit is used for mutually connecting the new blocks according to the generation time sequence of the new blocks to form the block chain.
In a third aspect, an embodiment of the present application provides a trade financing file storage and calling system, including:
A memory for storing a computer program;
and a processor for implementing the steps of the trade financing file storage calling method as described above when executing the computer program.
In a fourth aspect, embodiments of the present application provide a computer readable medium having a computer program stored thereon, which when processed for execution, implements the steps of the trade financing file storage calling method described above.
Compared with the prior art, the embodiment of the application has the following beneficial effects:
the embodiment of the application provides a method, a device, a system and a medium for storing and calling trade financing files, which can be applied to the field of big data or the field of finance. The method comprises the following steps: after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain; the method comprises the steps of performing digital signature on an initial trade financing file by using a private key of a first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file; symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to a second authority; decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain, and comparing the second hash value with the first hash value; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution. Therefore, the application reduces the use of paper and quickens the flow of the data by storing the traditional trade financing data in the distributed network storage system in a paperless way. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.
Drawings
In order to more clearly illustrate the embodiments of the application or the technical solutions in the prior art, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are some embodiments of the application and that other drawings may be obtained from these drawings without inventive effort for a person skilled in the art.
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 shows a flowchart of a method for trade financing file store call provided by an embodiment of the present application;
FIG. 2 is a schematic diagram illustrating a module structure of a trade financing file storage and calling system according to an embodiment of the present application;
fig. 3 shows a schematic diagram of a trade financing file storage calling device according to an embodiment of the present application.
Detailed Description
It should be noted that the method, the device, the system and the medium for storing and calling the trade financing file provided by the application can be used in the big data field or the financial field. The foregoing is merely an example, and is not intended to limit the application fields of the method, the device, the system and the medium for invoking the storage of the trade financing file provided by the present application.
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure have been shown in the accompanying drawings, it is to be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein, but are provided to provide a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
The term "including" and variations thereof as used herein are intended to be open-ended, i.e., including, but not limited to. The term "based on" is based at least in part on. The term "one embodiment" means "at least one embodiment"; the term "another embodiment" means "at least one additional embodiment"; the term "some embodiments" means "at least some embodiments. Related definitions of other terms will be given in the description below.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
As described in the background, the financial industry has emerged as a traditional industry with a long history, coming to a new peak in the last decades, also by the rapid development of electronic information technology. The explosive increase of the traffic brings considerable revenue and the frequent risk problem is not neglected. The current electronic information era enters the Internet stage, if the financial industry can be tightly combined with Internet technology, risks can be identified timely, the efficiency is positively improved, and the development of leaping type development is brought forward.
The trade financing service is a very important service in the financial industry, effectively solves the problem of difficult financing of small and medium-sized enterprises, and widens the financing channel of the small and medium-sized enterprises. In recent years, with globalization, trade volume between countries and regions has increased greatly, and risks have increased silently. The current business mode which is highly dependent on the manual cross checking of both sides of trade to judge the authenticity and accuracy of a large number of paper trade documents is no longer applicable to the current situation. Thus leading to four aspects of trade financing: firstly, the verification cost is high. And secondly, the information is incomplete. And thirdly, repeated financing. Fourth, the financing cost is increased.
The current trade financing business mainly uses paper certificates, various data are many and miscellaneous, the circulation among a plurality of acceptance departments is slow, the trade financing business is easy to tamper, the repeated financing is easy to be caused, and the business data are scattered and isolated and the statistical supervision difficulty is high.
Therefore, how to realize paperless storage and calling of trade financing files, quicken the circulation of the data, prevent tampering and increase mutual trust is a technical problem to be solved in the field.
In order to solve the technical problems, the embodiment of the application provides a method, a device, a system and a medium for storing and calling trade financing files, which can be applied to the field of big data or the field of finance. The method comprises the following steps: after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain; the method comprises the steps of performing digital signature on an initial trade financing file by using a private key of a first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file; symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to a second authority; decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain, and comparing the second hash value with the first hash value; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution. Therefore, the application reduces the use of paper and quickens the flow of the data by storing the traditional trade financing data in the distributed network storage system in a paperless way. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.
Exemplary method
Referring to fig. 1, a flowchart of a method for storing and calling a trade financing file according to an embodiment of the present application includes:
s101: and after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to the alliance chain.
S102: and carrying out digital signature on the initial trade financing file by using a private key of the first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file.
S103: symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; and sending the signature ciphertext and the encryption key to the second institution.
S104: decrypting the encryption key by using the private key of the second mechanism to obtain the symmetric encryption key; and symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file.
S105: and decrypting the digital signature of the signature trade financing file by using the public key of the first organization to obtain a second hash value, and uploading the second hash value to the alliance chain to be compared with the first hash value.
S106: and when the first hash value and the second hash value are consistent, transmitting the initial trade financing file to the second institution.
In an embodiment of the application, the interstellar file system (Inter Planetary File System, IPFS), unlike the hyper-centralized hypertext transfer protocol (HTTP, hypertext Transfer Protocol), is a de-centralized network transfer protocol that aims to create persistent and distributed storage and sharing files. Nodes in the interstellar file system network form a distributed storage network, wherein after the resources are subjected to hash encryption operation, unique hash addresses which cannot be tampered and deleted are generated and stored on a blockchain, so that the distributed storage network has strong reliability.
Blockchain: in short, the chain is composed of a plurality of blocks, each block stores certain information, and the blocks are connected into the chain according to the time sequence of generation. This chain is kept in all servers, and the entire blockchain is secure as long as one server in the entire system can work. These servers, referred to as nodes in the blockchain system, provide storage space and computational support for the entire blockchain system. If the information in the blockchain is to be modified, it is necessary to sign consent of more than half of the nodes and modify the information in all the nodes, which are usually held in different subject hands, so it is an extremely difficult thing to tamper with the information in the blockchain. Compared with the traditional network, the blockchain has two main core characteristics: data is difficult to tamper with and to decentralize. Based on the two characteristics, the information recorded by the blockchain is more real and reliable, and can help solve the problem that people are not trusted each other.
Alliance chain: between the public chain and the private chain, is moderately open to the outside, and is more in line with most industry scenes. The authorized company and organization can join the network, participate in consensus, write in and inquire data all need to be controlled through the authorization mechanism, can participate in the trade process by real name, meet the supervision requirement, the trade speed is faster than the public chain.
Decentralizing: an open, flattened, equal system phenomenon or structure. In a system having a plurality of nodes distributed, each node has a highly autonomous nature. The nodes can be freely connected with each other to form a new connection unit. Any node may be a staged center but not have mandatory center control capabilities. The effects from node to node can form nonlinear causal relationships through the network.
And (3) storing in a distributed network: by adopting an expandable system structure, data are stored in a plurality of independent machine equipment in a scattered manner so as to share the storage load, the bottleneck problem of a single storage server in the traditional centralized storage system is solved, and the reliability, usability and expansibility of the system are improved.
Trade financing (trade financing): in commodity trade, a bank applies a structural short-term financing tool (credit evidence with a period of less than one year, such as a business bill, a bank bill and the like) to financing based on assets such as inventory, prepayment, accounts receivable and the like in commodity trade.
Because the blockchain technology has three aspects: firstly, the data is difficult to tamper, and the value can be borne. Compared with paper certificates, the electronic data is easy to copy and modify, when the electronic data is used for bearing value, risk hidden danger exists, and the blockchain technology is designed through a consensus mechanism, so that the electronic data is difficult to tamper with and copy is invalid, the defect of the electronic data is successfully avoided, a basic condition is created for the application of data storage and certification, and the 'value Internet' becomes possible. Secondly, account book disclosure and autonomous data circulation are carried out. The participants maintain a public account book together according to the agreement, and each transaction is billed after the whole consensus. The data on the public account book is wholly visible, so that the access right and the data portability of the data main body can be effectively ensured, and the data main body is endowed with more flexible disposal capability for own data. Through data encryption storage, the accuracy and the non-falsification of the data can be ensured on the premise of data security and privacy, and more efficient autonomous circulation of the data among different applications can be realized. Thirdly, the participants cooperate in a peer-to-peer and mesh manner. The participants have no obvious hierarchy or subordinate relation, so that convenience is provided for cross-mechanism coordination, the negotiation on an organization structure is not needed, and the business rules can be developed simply and quickly by solidifying the business rules into the initial setting of the blockchain.
The embodiment of the application aims to combine the blockchain technology with an interstellar file system and apply the blockchain technology to the identification, storage and sharing of trade data such as orders, invoices, customs clearance in trade financing business. The participating institutions can communicate with each other's trade data after joining the interstellar file system network, which will increase the data flow rate and reduce the use of paper credentials. Meanwhile, based on the characteristic of the blockchain, the credibility of trade data can be guaranteed, and the trade data is difficult to tamper. Therefore, on the premise of controllable risk, the embodiment of the application simplifies the redundant links in the traditional business process, can greatly improve the processing efficiency and reduces the labor cost.
Specifically, after the interstellar file system receives the initial trade financing file uploaded by the first organization, a first hash value of the initial trade financing file can be calculated and uploaded to the alliance chain.
In the embodiment of the application, referring to fig. 2, a schematic diagram of a module structure of a trade financing file storage and calling system is provided in the embodiment of the application, and the whole storage and calling system comprises four modules, namely an IPFS storage network module, a node access verification module, a file encryption and decryption and uploading/downloading module, a alliance chain and an intelligent contract module.
IPFS file storage network module: the IPFS may be installed on a computer that needs to join the IPFS network with reference to an official document. Since a private network is to be built, all nodes need to join the network using the same private key, so a shared key needs to be generated and distributed to each node after initialization. And then deleting the default public network node, and adding other nodes to the list of the node by each node respectively. The IPFS of each node is then started, i.e., the file can be uploaded and downloaded. This module functions to store trade financing data in the present system.
File encryption and upload/download modules may be utilized: an interface is provided for the authenticated financial institution to encrypt and upload the file into the IPFS network, and then the IPFS computes the hash value of the file and passes it to the federation chain module. I.e., the first hash value of the calculated initial trade financing file is uploaded to the coalition chain.
For example, the data uploaded to (downloaded from) the IPFS network by the user may be trade financing materials in the form of PDF (Portable Document Format, portable file format), documents, pictures, etc., transmitted over a private network built internally to the institution.
Since trade financing generally involves two financial institutions, the transmitted data should be limited to only two parties to the business and thus encryption of the data is required.
Assuming that the first organization a uploads the data and only hopes that the organization B can view the content therein, at this time, the organization a needs to perform hash operation on the data to obtain a first hash value, and then signs the initial trade financing file with the private key of the organization a to obtain the digital signature of the organization a. And splicing the digital signature and the initial trade financing file to obtain the signature trade financing file.
Symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; and sending the signature ciphertext and the encryption key to the second institution.
For example, the signed data can be obtained by splicing the data with the digital signature, and the signed ciphertext can be obtained by symmetrically encrypting (with high performance). The symmetric encryption key is encrypted by the public key of B, and the digital envelope is filled. And finally, loading the ciphertext with the signature into a digital envelope and sending the digital envelope to the second mechanism B.
Decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain, and comparing the second hash value with the first hash value; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution.
For example, after the second organization B opens the digital envelope, it decrypts with the private key of B to obtain a symmetrically encrypted key, and then symmetrically decrypts to obtain signed material. And decrypting the digital signature by using the public key of A to obtain a hash value, and verifying that the data is sent by A. And carrying out hash operation on the data to obtain a hash value. If the hash values are consistent, the data is not tampered.
The public key may be issued by a large, highly trusted institution in the network that does not participate in the transaction and issued to both parties involved in the transaction.
Therefore, the embodiment of the application stores the traditional trade financing data in the distributed network storage system in a paperless way, reduces the use of paper and accelerates the flow of the data. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.
Referring to fig. 2, the encryption and decryption submodule in the embodiment of the present application has the following specific functions: each node in the federation chain has a public key and a private key, which are equivalent to an account number and a password. When two nodes trade, the sender uses its own private key to make a digital signature for the file, then uses the public key of the receiver to encrypt the file, and packages the digital signature and the encrypted file and outputs them to the uploading sub-module.
The uploading sub-module has the specific functions of: and sending the output of the encryption sub-module to the IPFS, and returning the file hash value. And transmitting the information such as the file hash value, the sender address, the receiver address and the like to the alliance chain and intelligent contract module.
The specific functions of the download sub-module are: providing an interface to a financial institution that passes authentication to download the file;
the specific functions of the alliance chain and the intelligent contract module are as follows: the system can select alliance chain technology (consortium blockchain), is a block chain type commonly used among institutions, and has the characteristics of partial decentralization, strong controllability, privacy protection to a certain extent, high transaction speed and the like. The system aims at a financial business scene, has nature boundarity and industrialization, has high admission threshold and limited quantity of financial institutions participating in business, relates to important and sensitive privacy data, and has requirements on transaction timeliness, so that a alliance chain is very suitable for the system. In the system, each participating organization forms each node of the alliance chain, a large-scale high-credit organization serves as a management node, and other organizations are common nodes. The new node can be added only by obtaining the authorization of the management node, and the data can be read and written on the chain after the node is added. The file hash generated by IPFS is stored in the chain, so that trade data files can be agreed among nodes through the chain, and the effects of tamper resistance and credit increase are achieved. Storing only hash values on the chain can also save the calculation power and the storage space of the chain, and improve the transaction efficiency.
The patent selects PBFT (practical Bayesian fault tolerance, practical Byzantine Fault Tolerance) algorithm as the consensus algorithm of the consensus mechanism of the alliance chain, when the normal nodes occupy 2/3 or more of the total nodes, the consistency and the effectiveness of data among the nodes can be ensured, a second-level rapid consensus mechanism can be realized, the consistency is ensured, and the system is suitable for multi-center business modes participated in by multiple parties. After the transaction occurs, verifying through a consensus mechanism, generating a new block by an accounting node (full node), adding the new block to a chain of the node, and enabling the accounting node to have a complete chain account book; the non-accounting node (light node) does not store data, only has a routing function, and relies on the accounting node for transaction verification. Therefore, according to the actual business characteristics, the module selects the nodes of a large financial institution or enterprise with high credit as limited consensus nodes to participate in accounting, and the accounting nodes and the non-accounting nodes form a node network together. The information of the complete trade financing transaction is stored only on the chain of accounting nodes, and non-accounting nodes only act as transaction correspondents.
On the chain, we deploy intelligent contract program designed according to business features, which has the features of self-execution and self-verification and cannot be modified once deployed. According to the business scenario of the patent, attributes such as contract address, sender address, receiver address, file hash value, transaction remark information and the like are defined for the intelligent contract; a method for acquiring encrypted trade financing files from an IPFS network through file hash values is defined, whether the hash values are matched with addresses of requesters or not can be automatically checked through intelligent contracts, and files stored in the IPFS can be acquired after verification.
In one possible implementation, before the interstellar file system receives the initial trade financing file uploaded by the first institution, an embodiment of the present application may further comprise:
using a management mechanism on the alliance chain to carry out identity verification on the first mechanism and the second mechanism; when the authentication is passed, the control authority issues respective public keys to the first and second authorities.
In the embodiment of the application, in order to improve the security of the storage and calling of the trade financing file, the identity verification can be performed so as to avoid the occurrence of hacking or counterfeiting verification.
Specifically, the node access verification module may be a fort machine. Each financial institution needs to apply for joining the IPFS network before using the system, becoming a node in the IPFS. When the IPFS is used, the node access verification module is required to be used as a springboard, and after the authentication, the node access verification module is connected to a corresponding node in the IPFS network. That is, an interface is provided to obtain the public key, and information such as a unified social credit code of an application organization or company needs to be filled in. The public key is issued by the accounting node together, and is automatically broadcast to all nodes in the chain after being generated, and the obtained public key indicates that the node joins the chain network.
In one possible implementation manner, after the interstellar file system receives the initial trade financing file uploaded by the first organization, the method may further include:
generating an address hash of the initial trade financing file, and generating a new block of the block chain by the root address hash; the block head of the new block records the meta information of the new block; the block body record address of the new block is hashed.
In the embodiment of the application, after the data is sent to the IPFS network, the address hash is returned, and a new block is generated by transmitting the data into the block chain service module. The block header (including parent block index, timestamp, merkle tree merkel tree, etc.) records the meta-information of the current block, and the block body records the IPFS address hash of the material. Therefore, the blockchain can be newly increased in time, the characteristics of the blockchain are combined, the data is not easy to tamper, and the more nodes are added, the more the data are backed up, so that the usability is improved.
In one possible implementation manner, the new block provided by the embodiment of the present application may include a plurality of blocks; after generating the blockchain new block from the address hash, it may further include:
And connecting the blocks to form a blockchain according to the generation time sequence of the new blocks.
Namely, in the embodiment of the application, the block chains can be formed by sequentially connecting in time sequence, so that the uplink disorder can be prevented, and the ordering of the subsequent storage call is ensured. For example, referring to fig. 2, the financial institution nodes 1, 2, 3, 4, 5 … … n may be sequentially uplinked to form a storage network blockchain.
The embodiment of the application provides a method for storing and calling trade financing files, which can be applied to the field of big data or the field of finance. The method comprises the following steps: after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain; the method comprises the steps of performing digital signature on an initial trade financing file by using a private key of a first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file; symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to a second authority; decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain, and comparing the second hash value with the first hash value; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution. Therefore, the application reduces the use of paper and quickens the flow of the data by storing the traditional trade financing data in the distributed network storage system in a paperless way. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.
Exemplary apparatus
Referring to fig. 3, a schematic diagram of a trade financing file storage calling device according to an embodiment of the present application includes:
a first calculating unit 201, configured to calculate, when the interstellar file system receives an initial trade financing file uploaded by a first organization, a first hash value of the initial trade financing file to upload to a coalition chain;
a splicing unit 202, configured to digitally sign the initial trade financing file by using a private key of the first institution, and splice the digital signature and the initial trade financing file to obtain a signed trade financing file;
an encryption unit 203, configured to symmetrically encrypt the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to the second authority;
a decryption unit 204, configured to decrypt the encryption key by using a private key of the second mechanism, to obtain the symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file;
a second calculating unit 205, configured to decrypt the digital signature of the signed trade financing file by using the public key of the first organization, obtain a second hash value, upload the second hash value to the federation chain and compare the second hash value with the first hash value;
A sending unit 206, configured to send the initial trade financing file to the second institution when the first hash value and the second hash value are consistent.
In one possible implementation, the method further includes:
an identity verification unit, configured to perform identity verification on the first and second institutions by using a management institution on the federation chain;
and the issuing unit is used for controlling the management institution to issue the public keys to the first institution and the second institution when the identity verification is passed.
In one possible implementation, the apparatus further includes:
the generation unit is used for generating an address hash of the initial trade financing file and generating a new block of the block chain according to the address hash; the block head of the new block records meta information of the new block; and recording the address hash by the block body of the new block.
In one possible implementation, the method further includes:
and the connecting unit is used for mutually connecting the new blocks according to the generation time sequence of the new blocks to form the block chain.
The embodiment of the application provides a trade financing file storage and calling device which can be applied to the field of big data or the field of finance. The method applied to the device comprises the following steps: after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain; the method comprises the steps of performing digital signature on an initial trade financing file by using a private key of a first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file; symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to a second authority; decrypting the encryption key by using the private key of the second mechanism to obtain a symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain a signature trade financing file; decrypting the digital signature of the signature trade financing file by using the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain, and comparing the second hash value with the first hash value; when the first hash value and the second hash value are consistent, then the initial trade financing file is sent to the second institution. Therefore, the application reduces the use of paper and quickens the flow of the data by storing the traditional trade financing data in the distributed network storage system in a paperless way. Meanwhile, by means of the characteristic of the block chain, tampering can be effectively prevented, and mutual trust is increased. On the premise of controllable risk, the flow of trade financing business is quickened, and the time cost is reduced.
On the basis of the embodiment, the embodiment of the application provides a trade financing file storage and calling system, which comprises the following components:
a memory for storing a computer program;
and the processor is used for realizing the steps of the trade financing file storage calling method when executing the computer program.
On the basis of the above embodiment, the embodiment of the present application further provides a computer readable medium, where a computer program is stored, where the computer program is processed and executed to implement the steps of the trade financing file storage calling method.
It should be noted that the computer readable medium described in the present disclosure may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present disclosure, however, the computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
The computer readable medium may be embodied in the system described above; or may exist alone without being assembled into the system.
In particular, according to embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a non-transitory computer readable medium, the computer program comprising program code for performing the method shown in the flow chart.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for the device embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference is made to the description of the method embodiments for relevant points.
The foregoing is merely a preferred embodiment of the present application, and the present application has been disclosed in the above description of the preferred embodiment, but is not limited thereto. Any person skilled in the art can make many possible variations and modifications to the technical solution of the present application or modifications to equivalent embodiments using the methods and technical contents disclosed above, without departing from the scope of the technical solution of the present application. Therefore, any simple modification, equivalent variation and modification of the above embodiments according to the technical substance of the present application still fall within the scope of the technical solution of the present application.

Claims (10)

1. A method for invoking a store of trade financing files, comprising:
after the interstellar file system receives the initial trade financing file uploaded by the first organization, calculating a first hash value of the initial trade financing file and uploading the first hash value to a alliance chain;
carrying out digital signature on the initial trade financing file by utilizing a private key of the first institution, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file;
symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to the second authority;
decrypting the encryption key by using the private key of the second mechanism to obtain the symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file;
decrypting the digital signature of the signature trade financing file by using the public key of the first organization to obtain a second hash value, and uploading the second hash value to the alliance chain to be compared with the first hash value;
and when the first hash value and the second hash value are consistent, transmitting the initial trade financing file to the second institution.
2. The method of claim 1, further comprising, before the interstellar file system receives the initial trade financing file uploaded by the first institution:
verifying the identity of the first and second organizations with a management organization on the federation chain;
and after passing the authentication, controlling the management institution to issue respective public keys to the first institution and the second institution.
3. The method of claim 1, wherein after the interstellar file system receives the initial trade financing file uploaded by the first agency, the computing the first hash value of the initial trade financing file further comprises:
generating an address hash of the initial trade financing file, and generating a new block of a block chain according to the address hash; the block head of the new block records meta information of the new block; and recording the address hash by the block body of the new block.
4. A method according to claim 3, wherein the new zone comprises a plurality of; after the generating the new blockchain block according to the address hash, the method further comprises:
and connecting the new blocks to form the block chain according to the generation time sequence of the new blocks.
5. A trade financing file storage and calling device, comprising:
the first calculation unit is used for calculating a first hash value of the initial trade financing file and uploading the first hash value to the alliance chain after the interstellar file system receives the initial trade financing file uploaded by the first organization;
the splicing unit is used for digitally signing the initial trade financing file by utilizing the private key of the first mechanism, and splicing the digital signature and the initial trade financing file to obtain a signed trade financing file;
the encryption unit is used for symmetrically encrypting the signature trade financing file to obtain a signature ciphertext; encrypting the symmetrically encrypted key by using a public key of a second mechanism to obtain an encryption key; transmitting the signature ciphertext and the encryption key to the second authority;
a decryption unit, configured to decrypt the encryption key by using a private key of the second mechanism, to obtain the symmetric encryption key; symmetrically decrypting the signature ciphertext by using the symmetrically encrypted key to obtain the signature trade financing file;
the second computing unit is used for decrypting the digital signature of the signature trade financing file by utilizing the public key of the first organization, obtaining a second hash value, uploading the second hash value to the alliance chain and comparing the second hash value with the first hash value;
And the sending unit is used for sending the initial trade financing file to the second institution when the first hash value and the second hash value are consistent.
6. The apparatus as recited in claim 5, further comprising:
an identity verification unit, configured to perform identity verification on the first and second institutions by using a management institution on the federation chain;
and the issuing unit is used for controlling the management institution to issue the public keys to the first institution and the second institution when the identity verification is passed.
7. The apparatus of claim 5, wherein the apparatus further comprises:
the generation unit is used for generating an address hash of the initial trade financing file and generating a new block of the block chain according to the address hash; the block head of the new block records meta information of the new block; and recording the address hash by the block body of the new block.
8. The apparatus as recited in claim 7, further comprising:
and the connecting unit is used for mutually connecting the new blocks according to the generation time sequence of the new blocks to form the block chain.
9. A trade financing file storage and invocation system, comprising:
A memory for storing a computer program;
a processor for implementing the steps of the trade financing file storage calling method as defined in any one of claims 1 to 4 when executing the computer program.
10. A computer readable medium having stored thereon a computer program which when executed is processed to implement the steps of the trade financing file storage calling method of any of claims 1-4.
CN202311055359.4A 2023-08-21 2023-08-21 Trade financing file storage and calling method, device, system and medium Pending CN117113431A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311055359.4A CN117113431A (en) 2023-08-21 2023-08-21 Trade financing file storage and calling method, device, system and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311055359.4A CN117113431A (en) 2023-08-21 2023-08-21 Trade financing file storage and calling method, device, system and medium

Publications (1)

Publication Number Publication Date
CN117113431A true CN117113431A (en) 2023-11-24

Family

ID=88810468

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311055359.4A Pending CN117113431A (en) 2023-08-21 2023-08-21 Trade financing file storage and calling method, device, system and medium

Country Status (1)

Country Link
CN (1) CN117113431A (en)

Similar Documents

Publication Publication Date Title
WO2019179534A2 (en) System and method for creating decentralized identifiers
WO2019179533A2 (en) System and method for issuing verifiable claims
WO2019179535A2 (en) System and method for verifying verifiable claims
CN110188550B (en) Block chain data verification method and device
JP2020516104A (en) Off-chain smart contract service based on trusted execution environment
US11201742B2 (en) Blockchain-based trustable guarantees
Komalavalli et al. Overview of blockchain technology concepts
US20210160075A1 (en) Blockchain-based trustable guarantees
US11580539B2 (en) Blockchain-based trustable guarantees
US11216807B2 (en) Blockchain-based trustable guarantees
US11212104B2 (en) Blockchain-based trustable guarantees
US11182788B2 (en) Blockchain-based trustable guarantees
US11200570B2 (en) Blockchain-based trustable guarantees
US20210217098A1 (en) Blockchain-based message services for time-sensitive events
WO2021169767A1 (en) Data processing method and apparatus, device and medium
CN115705571A (en) Protecting privacy of auditable accounts
CN114266069A (en) House transaction electronic data sharing system and method based on block chain technology
US20210217100A1 (en) Storage management based on message feedback
Xiao et al. A collaborative auditing scheme with dynamic data updates based on blockchain
US20240187256A1 (en) Systems and methods for enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
CN115705601A (en) Data processing method and device, computer equipment and storage medium
Reddy et al. An Intelligent Tender Management System using Block Chain and IPFS
CN117113431A (en) Trade financing file storage and calling method, device, system and medium
Senthilkumar Data confidentiality, integrity, and authentication
Biradar et al. Empirical View Of Financial Management Survey In Block Chain Technology Issues, Risk And Mitigation

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination