WO2018103554A1 - 一种业务数据处理方法、验证方法、装置及*** - Google Patents
一种业务数据处理方法、验证方法、装置及*** Download PDFInfo
- Publication number
- WO2018103554A1 WO2018103554A1 PCT/CN2017/113349 CN2017113349W WO2018103554A1 WO 2018103554 A1 WO2018103554 A1 WO 2018103554A1 CN 2017113349 W CN2017113349 W CN 2017113349W WO 2018103554 A1 WO2018103554 A1 WO 2018103554A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- data
- service data
- blockchain
- fingerprint
- processed
- Prior art date
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/55—Detecting local intrusion or implementing counter-measures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Definitions
- the present application belongs to the field of computer data processing technologies, and in particular, to a service data processing method, a verification method, a device and a system.
- the more sensitive accounting data in the business data is generally recorded in the payment institution's own accounting system database. Since the payment institution has the highest management authority for these databases, it is theoretically possible to tamper with the data.
- the accounting data is directly related to the funds, and is usually the most important type of data in the payment institution. Therefore, the payment institution often uses some technical means to publicly express that its own accounting data is true and reliable since it was generated, and has not been tampered with to improve the credibility of the payment institution. For example, in the public welfare donation scenario, it is confirmed that the transfer of the donation is authentic, and in the regulatory review scenario, for example, the payment record data of the payment institution is not modified.
- Existing Ways In order to determine the credibility of the accounting data the conventional approach is generally verified by reconciliation.
- data can be checked against other organizations or topics.
- the relevant participants can store a set of accounting data based on their own perspective for checking against the payment institution's data. Verify that the payment data of the payment institution has been tampered with by demonstrating the different data displays of the same fund transfer document.
- the accounting data and the relevant data of other organizations are mutually corroborated to ensure mutual support to improve the cost of fraudulent accounting data.
- the cost of maintaining the trustworthiness of the accounting data of the own organization is relatively large. For example, when verifying the data with other organizations, it usually takes at least three parties to save the same amount of accounts. According to different copies, it can ensure that the data can be confirmed, and the hardware and software security requirements for data transmission and storage are also high. At the same time, for some payment institutions, some sensitive data is not suitable for disclosure. Therefore, in the process of monitoring and processing the accounting data, the original accounting data itself or the processing flow will be greatly changed and modified. The big impact on the original processing flow and performance of the system's accounting data. In addition, this method can not solve the problem of trust fundamentally. For example, the so-called external organization may also be the affiliate of the payment institution, and it cannot be ruled out that the two will not jointly falsify.
- the existing payment institution ensures that the accounting data is authentic and reliable. At present, it is impossible to fundamentally avoid the problem that the accounting data is modified from the accounting data, so that the reliability of the data disclosed by the payment institution is reduced.
- the purpose of the present application is to provide a service data processing method, a verification method, a device and a system, which can write original data into a blockchain by embedding original service data into a blockchain under a small impact on the original processing flow and performance.
- the method stores a copy of the original service data, and can fundamentally verify whether the service data has been tampered with, ensure that the service data cannot be modified, and improve the reliability and credibility of the service data.
- a service data processing method, verification method, device and system provided by the application are implemented as follows:
- a business data processing method comprising:
- a service data processing device comprising:
- a fingerprint data generating module configured to acquire service data to be processed, and generate fingerprint data of the to-be-processed service data in a preset manner
- a blockchain data generating module configured to write the fingerprint data into a blockchain corresponding to the to-be-processed service data, to generate blockchain replica data of the to-be-processed service data in the blockchain ,
- the blockchain replica data stores fingerprint data in adjacent previous node blockchain replica data.
- a method for verifying business data comprising:
- the blockchain replica data includes generating fingerprint data according to the service data to be processed And storing the data information in the blockchain, wherein the blockchain replica data stores fingerprint data in the adjacent previous node blockchain replica data;
- a business system including an I/O interface, a processing unit,
- the I/O interface is configured to receive service data to be processed
- the processing unit is configured to generate fingerprint data of the to-be-processed service data in a preset manner; and is further configured to write the service data into an original database, and write the fingerprint data into the Generating blockchain replica data of the to-be-processed service data in the blockchain, and storing the adjacent previous node zone in the blockchain replica data, in the blockchain database corresponding to the processing service data Fingerprint data in blockchain replica data.
- the service data processing method, verification method, device and system provided by the application use a blockchain as a copy storage method of data in a traditional business database.
- the original business system processing flow only needs to generate the corresponding fingerprint data of the business data, and then store it in the corresponding blockchain to generate the blockchain copy data, which has less invasion of the original business system processing process, and ensures the high performance of the traditional database. Based on the ability, the monitoring effect of business data is greatly guaranteed, the business data can not be modified, and the reliability and credibility of business data, especially sensitive accounting data, are improved.
- FIG. 1 is a schematic diagram of a data structure of a blockchain data storage provided by the present application.
- FIG. 2 is a flowchart of a method for an embodiment of a data processing method according to the present application
- FIG. 3 is a schematic diagram of an implementation scenario of providing fingerprint data for generating service data to be processed according to the present application
- FIG. 4 is a schematic diagram of implementation of another embodiment of a service data processing method provided by the present application.
- FIG. 5 is a schematic flowchart of a method of another embodiment of the service data processing method provided by the present application.
- FIG. 6 is a schematic diagram of another implementation scenario of generating fingerprint data of service data to be processed
- FIG. 7 is a schematic diagram of another implementation scenario of generating fingerprint data of service data to be processed.
- FIG. 8 is a flowchart of a method for an embodiment of a service data verification method according to the present application.
- FIG. 9 is a schematic structural diagram of a module of an embodiment of a service data processing apparatus provided by the present application.
- FIG. 10 is a schematic structural diagram of a module of another embodiment of a service data processing apparatus provided by the present application.
- FIG. 11 is a schematic structural diagram of a module of another embodiment of a service data processing apparatus provided by the present application.
- FIG. 12 is a schematic structural diagram of an embodiment of a service system provided by the present application.
- FIG. 2 is a flow chart of a method for processing an embodiment of a service data processing method according to the present application.
- the present application provides method operational steps or device structures as shown in the following embodiments or figures, but may include more or a portion of the combined fewer operational steps or may be included in the method or device based on conventional or no creative labor.
- Module unit In the steps or structures in which the necessary causal relationship does not exist logically, the execution order of the steps or the module structure of the device is not limited to the execution order or the module structure shown in the embodiment of the present application or the drawings.
- the method or module structure of the method or module structure may be sequentially executed or executed in parallel according to the method or module structure shown in the embodiment or the drawing (for example, a parallel processor or a multi-thread processing environment). And even the implementation environment for distributed processing).
- FIG. 1 is a schematic diagram of a data structure of a blockchain data storage provided by the present application.
- the chained data structure of the blockchain ensures that data changes can only be made incrementally. The recorded data will remain in the state of creation and will not be overwritten.
- the blockchain confirms the responsibility of data record responsibilities of each block through a specific consensus algorithm, and has obtained the approval of other nodes. If you want to change the data that already exists, you can usually only implement the replacement by falsifying the entire blockchain. This is almost impossible to do under the consensus algorithm of proof of work or proof of equity.
- the solution of the present application uses the blockchain as a copy storage method of data in the traditional business database.
- the original business system processing flow only needs to generate the corresponding fingerprint data of the business data, and then store it in the corresponding blockchain to generate the blockchain copy data, without making changes in the large processing flow, and ensuring the high performance of the traditional database.
- the monitoring effect of business data is greatly guaranteed, business data can not be modified, and the reliability and credibility of business data are improved.
- the blockchain replica data of the accounting data generated by a specific payment institution accounting system is described as an application scenario.
- the service data processed in this embodiment is accounting data.
- those skilled in the art can understand that the essence of the solution can be applied to scenarios in other service systems to prevent service data from being tampered with. That is, by embedding the fingerprint data generation logic in the original system processing flow and simultaneously writing the blockchain, the fingerprint data value of the current service data is compared with the original fingerprint data value stored on the blockchain. It can confirm whether the current business data has been modified, eliminate the possibility of data being falsified, and improve the reliability and credibility of business data.
- the business data in the embodiment of the present application is not limited to the accounting data, but the number of accounts with higher sensitivity
- the application effect is more obvious, which can significantly improve the credibility of the payment structure and other related financial business users to release data, and improve the business experience of users who have an interest relationship with the accounting data.
- the method may include:
- S1 Acquire the to-be-processed service data, and generate the fingerprint data of the to-be-processed service data in a preset manner.
- the payment institution's business system can acquire and store the corresponding business data according to the accounting initiator's accounting request.
- the accounting data can be obtained when the accounting system normally stores the accounting data to the database, and can be collectively referred to as the pending service data.
- the to-be-processed service data may be processed in a preset manner to generate fingerprint data of the to-be-processed service data.
- the payment institution can be understood as an organization that includes some or all of the money transfer service between the payers as an intermediary.
- the service data may include fund change voucher data generated in the system database when the payment institution provides the fund transfer and record service, or may include the fund change voucher data generated by the transfer and record directly obtained from the billing initiator or
- the associated data, such as pending business data, can be billing data received from the business system.
- the fingerprint data may be defined for the accounting data according to the implementation scenario or the service type of the accounting data, and the accounting data can be uniquely confirmed by the fingerprint data. If the accounting data is tampered with, the fingerprint data produced by it will also be changed. In this way, the authenticity of a certain accounting data can be determined by comparing the fingerprint data of the accounting data.
- the method for making the generated fingerprint data is an irreversible algorithm.
- the process of generating the fingerprint data is set to be one-way irreversible.
- the process of generating the fingerprint data is one-way and irreversible.
- the fingerprint data can be obtained by the data in a simple manner, and the data itself cannot be detonated through the fingerprint data. Therefore, the method provided in this embodiment can effectively and reliably ensure data security and privacy protection. Protection.
- the manner in which the fingerprint data of the to-be-processed service data is generated may be selected or customized according to a service scenario or a service data processing requirement, and the to-be-processed service data may be transformed into a service data that can be uniquely confirmed. Identification information.
- the preset algorithm for generating the fingerprint data may include multiple modes.
- the preset manner described in an embodiment of the present application may perform data hash processing on the service data to be processed, that is, a hash.
- S101 Perform hash processing on the to-be-processed service data, and use the hash value generated by the hash as the fingerprint data of the to-be-processed service data.
- a hash function can provide a service for verifying message integrity, and can generate fixed-length output for input messages of different lengths. This fixed length output is called the "hash” or “message digest” of the original input message.
- FIG. 3 is a schematic diagram of an implementation scenario of generating fingerprint data of service data to be processed according to the present application.
- the specific hashing method may be determined by itself, or may be MD5, SHA-1 or other algorithms.
- the hash value of the service data to be processed can be used as the fingerprint data of the to-be-processed service data to improve the security and privacy protection of the original service data.
- S2 Write the fingerprint data into a blockchain corresponding to the to-be-processed service data, and generate blockchain replica data of the to-be-processed service data in the blockchain, where the blockchain replica The data stores the fingerprint data in the adjacent previous node block chain replica data.
- the accounting data can be stored, and the fingerprint of the accounting document is calculated in the above manner, and then the fingerprint data can be written into the blockchain.
- the blockchain can be stored in a corresponding data storage unit, such as a database or other storage medium that specifically stores data in a public blockchain.
- a corresponding data storage unit such as a database or other storage medium that specifically stores data in a public blockchain.
- the chained data structure of the blockchain ensures that data changes can only be made incrementally.
- the blockchain replica data of the business data that has been recorded in the blockchain will remain in the state of creation and will not be overwritten.
- the blockchain passes the specific consensus algorithm (such as the blockchain copy data including the fingerprint data in the adjacent previous blockchain chain copy data), confirms the data record responsibility of each block, and obtains The identity of other nodes. If you want to change existing data, you can only implement the replacement by falsifying the entire blockchain. In the case of full disclosure (or full disclosure of designated monitoring objects), the replacement of the entire blockchain data is almost impossible. Therefore, the present application can use the characteristics that the fingerprint data in the blockchain cannot be falsified, and correlately confirm whether the original accounting data in the database has been tampered with, which greatly improves the credibility of the accounting data.
- fingerprint data may be fingerprinted while the business data is stored in the database, and the fingerprint data is written into the blockchain.
- the to-be-processed service data may be asynchronously Write to the blockchain, (ie database and blockchain "double write").
- the overall service system processing flow is as shown in FIG. 4 , FIG. 4 is a schematic diagram of implementation of another embodiment of a service data processing method provided by the present application, that is, the accounting data in FIG. 4 is the service data described in the embodiment of the present application.
- the writing the fingerprint data into a blockchain corresponding to the to-be-processed service data includes:
- S102 Write the fingerprint data into a blockchain corresponding to the to-be-processed service data in an asynchronous manner.
- the service data processing method provided by the application uses a blockchain as a copy storage method of data in a traditional business database.
- the original business system processing flow only needs to generate the corresponding fingerprint data of the business data, and then store it in the corresponding blockchain to generate the blockchain copy data, which has less invasion of the original business system processing process, and ensures the high performance of the traditional database.
- the monitoring effect of business data is greatly guaranteed, business data can not be modified, and the reliability and credibility of business data are improved.
- FIG. 5 is a schematic flowchart of a method of another embodiment of the service data processing method provided by the present application.
- the key elements determined in the to-be-processed service data such as the transfer party ID, time, and amount in the account data
- the key elements determined in the to-be-processed service data may be extracted first, and then generated for the key element data.
- Fingerprint data may be extracted from the common key element data, the source data of the fingerprint data can be simplified, the fingerprint data can be quickly generated, and the data processing effect can be improved.
- the method may further include:
- the generating the fingerprint data of the to-be-processed service data in a preset manner comprises: processing the extracted key element data in a preset manner to generate fingerprint data of the to-be-processed service data.
- FIG. 6 is a schematic diagram of another implementation scenario of generating fingerprint data of service data to be processed.
- the key element data Data_Key may be extracted, including the transfer party, time, amount, business document number, service type, etc., and then fingerprint data is generated for these key elements.
- the performing may include:
- S11 Determine a default value of the missing key element data according to the service type of the service data, and use the default value as the value of the key element data for generating the fingerprint data.
- key element data extracted from the to-be-processed business data may be used in combination with missing key element data.
- the default value generates fingerprint data of the to-be-processed business data.
- FIG. 7 the present application provides a schematic diagram of another implementation scenario of generating fingerprint data of service data to be processed.
- the key element data of the service type is missing, the default service type "this value is used as the default value".
- the fingerprint data Data_MD5 of the to-be-processed business data is generated in combination with the key element data of the already-obtained serial number, payee, payer, amount, and time.
- the service data processing method provided by the embodiment of the present application can be used in an existing database and a blockchain. There are also different versions of the same document, and the two versions are anchored to each other.
- the data in the blockchain can be publicly disclosed or disclosed to the specified object, such as the regulatory department or the designated user, to verify whether the business data stored in the database is tampering, and improve the credibility of the business data. Therefore, based on the foregoing, the present application further provides a service data verification method, and FIG. 8 is a flowchart of a method for verifying a service data according to an embodiment of the present application. As shown in FIG. 8, the method may include :
- S100 Determine service data to be verified, and obtain blockchain replica data associated with the service data to be verified from the stored blockchain data;
- the blockchain replica data includes a fingerprint according to the service data to be processed. Data is generated and stored in the blockchain, and the blockchain replica data stores fingerprint data in adjacent previous node blockchain replica data;
- S200 Calculate the first fingerprint data of the service data to be verified in a preset manner, and acquire second fingerprint data corresponding to the service data to be verified in the blockchain replica data;
- S300 Compare whether the first fingerprint data and the second fingerprint data are the same. If they are the same, confirm that the service data to be verified is not modified.
- the solution provided by the embodiment of the present application can use the feature that the fingerprint data in the blockchain cannot be falsified, and confirm whether the data in the database is tampered with, and can effectively and reliably verify whether the service data in the payment structure service system is
- the tampering has fundamentally solved the possibility of fraudulent business data (especially accounting data) on a technical level, which can greatly improve the credibility of the accounting data published by the payment structure.
- FIG. 9 is a schematic structural diagram of a module of a service data processing apparatus provided by the present application. As shown in FIG. 9, the apparatus may include:
- the fingerprint data generating module 101 is configured to obtain the to-be-processed service data, and generate the fingerprint data of the to-be-processed service data in a preset manner;
- the blockchain data generating module 102 may be configured to write the fingerprint data into a blockchain corresponding to the to-be-processed service data, and generate a blockchain of the to-be-processed service data in the blockchain. Copy data, the blockchain replica data stores fingerprint data in adjacent previous node blockchain replica data.
- the service data processing transfer provided by the present application while storing the business data, calculates the fingerprint data of the business data, and writes the fingerprint data into the blockchain.
- the existing database and blockchain there are different versions of the same document at the same time, and the two versions are anchored to each other. It is possible to use the characteristics of the blockchain in which the fingerprint data cannot be tampered, and to confirm whether the data in the database has been tampered with.
- FIG. 10 is a schematic structural diagram of another embodiment of a service data processing apparatus provided by the present application. As shown in FIG. 10, the apparatus may further include:
- the key element extraction module 103 may be configured to extract a predetermined type of key element data from the to-be-processed service data;
- the fingerprint data generating module 101 generates the fingerprint data of the to-be-processed service data in a preset manner, including processing the extracted key element data in a preset manner, and generating fingerprint data of the to-be-processed service data. .
- the process of generating the fingerprint data by the fingerprint data generating module 101 may be set to be one-way irreversible.
- the generating, by the fingerprint data generating module 101, the fingerprint data of the to-be-processed service data in a preset manner may include: performing hash processing on the to-be-processed service data, and using the hash value generated by the hash as a Document the fingerprint data of the processed business data.
- the blockchain data generating module 102 may write the fingerprint data into a blockchain corresponding to the to-be-processed service data in an asynchronous manner.
- FIG. 11 is a schematic structural diagram of another embodiment of a service data processing apparatus provided by the present application. As shown in FIG. 11, the apparatus may further include:
- the default processing module 104 may be configured to: when the to-be-processed service data is missing at least one of the key element data, determine a default value of the missing key element data according to the service type of the service data, and use the missing The provincial value is taken as the value of the key element data for generating the fingerprint data.
- a service data processing apparatus uses a blockchain as a copy storage method of data in a traditional service database.
- the original business system processing flow only needs to generate the corresponding fingerprint data of the business data, and then store it in the corresponding blockchain to generate the blockchain copy data, and the processing flow to the original business system.
- the process is less intrusive and ensures the high performance of the traditional database. It greatly ensures the monitoring effect of business data, ensures that business data cannot be modified, and improves the reliability and credibility of business data.
- FIG. 12 is a schematic structural diagram of an embodiment of a service system provided by the present application. Specifically, the application provides a service system, where the service system can include an I/O interface and a processing unit.
- the I/O interface is configured to receive service data to be processed
- the processing unit is configured to generate fingerprint data of the to-be-processed service data in a preset manner; and is further configured to write the service data into an original database, and write the fingerprint data into the Generating blockchain replica data of the to-be-processed service data in the blockchain, and storing the adjacent previous node zone in the blockchain replica data, in the blockchain database corresponding to the processing service data Fingerprint data in blockchain replica data.
- the original database storing the service data set of the service system and the blockchain database storing the blockchain data may be separated from the service system and stored separately. In other embodiments, any one of the original database and the blockchain database may be included in the service system. In one embodiment, the service system may include its own original database and the storage area.
- the blockchain database can be set up separately on a business server or a third party server or storage device.
- the processing unit may be further configured to: extract a predetermined type of key element data from the to-be-processed service data; correspondingly, the generating the fingerprint data of the to-be-processed service data by using a preset manner includes using a preset manner
- the extracted key element data is processed to generate fingerprint data of the to-be-processed business data.
- the processing unit may be further configured to: obtain, by using the stored blockchain data, the blockchain replica data associated with the service data to be verified, and calculate, by using a preset manner, the first service data to be verified. Fingerprint data, and acquiring second fingerprint data corresponding to the service data to be verified in the blockchain replica data; and comparing whether the first fingerprint data and the second fingerprint data are the same If yes, it is confirmed that the service data to be verified is not modified.
- the service data processing method, verification method, device and system provided by the application use a blockchain as a copy storage method of data in a traditional business database.
- the original business system processing flow only needs to generate the corresponding fingerprint data of the business data, and then store it in the corresponding blockchain to generate the blockchain copy data, which has less invasion of the original business system processing process, and ensures the high performance of the traditional database.
- the monitoring effect of business data is greatly guaranteed, business data can not be modified, and the reliability and credibility of business data are improved.
- the definition and extraction method of the key element data, the fingerprint data generated by MD5, the fingerprint data of the business data in the database and the blockchain are compared to determine whether the tampering or the like is used.
- the description of the data definition, acquisition, interaction, calculation, judgment, etc. of the class is not limited to the case that it must conform to the industry communication standard, the standard data structure, the standard database data processing method or the embodiment of the present application.
- Certain industry standards or implementations that have been modified in a manner that uses a custom approach or an embodiment described above may also achieve the same, equivalent, or similar, or post-deformation implementation effects of the above-described embodiments.
- Embodiments obtained by applying these modified or modified data acquisition, storage, judgment, processing methods, etc. may still fall within the scope of alternative embodiments of the present application.
- PLD Programmable Logic Device
- FPGA Field Programmable Gate Array
- HDL Hardware Description Language
- ABEL Advanced Boolean Expression Language
- AHDL Altera Hardware Description Language
- HDCal JHDL (Java Hardware Description Language)
- Lava Lola
- MyHDL PALASM
- RHDL Ruby Hardware Description Language
- VHDL Very-High-Speed Integrated Circuit Hardware Description Language
- the controller can be implemented in any suitable manner, for example, the controller can take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (eg, software or firmware) executable by the (micro)processor.
- computer readable program code eg, software or firmware
- examples of controllers include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, The Microchip PIC18F26K20 and the Silicone Labs C8051F320, the memory controller can also be implemented as part of the memory's control logic.
- the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
- Such a controller can therefore be considered a hardware component, and the means for implementing various functions included therein can also be considered as a structure within the hardware component.
- a device for implementing various functions can be considered as a software module that can be both a method of implementation and a structure within a hardware component.
- the system, device, module or unit illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product having a certain function.
- a typical implementation device is a computer.
- the computer can be, for example, a personal computer, a laptop computer, a car-mounted human-machine interaction device, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet.
- each module may be implemented in the same software or software, or the modules that implement the same function may be implemented by a plurality of sub-modules or a combination of sub-units.
- the device embodiments described above are merely illustrative.
- the division of the unit is only a logical function division.
- there may be another division manner for example, multiple units or components may be combined or integrated. Go to another system, or some features can be ignored or not executed.
- the mutual coupling or direct coupling or communication connection shown or discussed may be an indirect coupling or communication connection through some interface, device or unit, and may be in an electrical, mechanical or other form.
- the controller can be logically programmed by means of logic gates, switches, ASICs, programmable logic controllers, and embedding.
- the computer program instructions can also be stored in a computer readable memory that can direct a computer or other programmable data processing device to operate in a particular manner, such that the instructions stored in the computer readable memory produce an article of manufacture comprising the instruction device.
- the apparatus implements the functions specified in one or more blocks of a flow or a flow and/or block diagram of the flowchart.
- These computer program instructions can also be loaded onto a computer or other programmable data processing device such that a series of operational steps are performed on a computer or other programmable device to produce computer-implemented processing for execution on a computer or other programmable device.
- the instructions provide steps for implementing the functions specified in one or more of the flow or in a block or blocks of a flow diagram.
- a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
- processors CPUs
- input/output interfaces network interfaces
- memory volatile and non-volatile memory
- the memory may include non-persistent memory, random access memory (RAM), and/or non-volatile memory in a computer readable medium, such as read only memory (ROM) or flash memory.
- RAM random access memory
- ROM read only memory
- Memory is an example of a computer readable medium.
- Computer readable media includes both permanent and non-persistent, removable and non-removable media.
- Information storage can be implemented by any method or technology.
- the information can be computer readable instructions, data structures, modules of programs, or other data.
- Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read only memory. (ROM), electrically erasable programmable read only memory (EEPROM), flash memory or other memory technology, compact disk read only memory (CD-ROM), digital versatile disk (DVD) or other optical storage, Magnetic tape cartridges, magnetic tape storage or other magnetic storage devices or any other non-transportable media can be used to store information that can be accessed by a computing device.
- computer readable media does not include temporary storage of computer readable media, such as modulated numbers. According to the signal and carrier.
- embodiments of the present application can be provided as a method, system, or computer program product.
- the present application can take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment in combination of software and hardware.
- the application can take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) including computer usable program code.
- the application can be described in the general context of computer-executable instructions executed by a computer, such as a program module.
- program modules include routines, programs, objects, components, data structures, and the like that perform particular tasks or implement particular abstract data types.
- the present application can also be practiced in distributed computing environments where tasks are performed by remote processing devices that are connected through a communication network.
- program modules can be located in both local and remote computer storage media including storage devices.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Strategic Management (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Computing Systems (AREA)
- Storage Device Security (AREA)
- Collating Specific Patterns (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
Description
Claims (16)
- 一种业务数据处理方法,其特征在于,所述方法包括:获取待处理业务数据,采用预设方式生成所述待处理业务数据的指纹数据;将所述指纹数据写入与所述待处理业务数据对应的区块链中,生成所述待处理业务数据在所述区块链中的区块链副本数据,所述区块链副本数据中存储相邻的上一个节点区块链副本数据中的指纹数据。
- 如权利要求1所述的一种业务数据处理方法,其特征在于,获取待处理业务数据之后,所述方法还包括:从所述待处理业务数据中提取出预定类型的关键要素数据;相应的,所述采用预设方式生成所述待处理业务数据的指纹数据包括采用预设方式对提取的所述关键要素数据进行处理,生成所述待处理业务数据的指纹数据。
- 如权利要求1或2所述的一种业务数据处理方法,其特征在于,生成所述指纹数据的过程被设置成是单向不可逆的。
- 如权利要求1所述的一种业务数据处理方法,其特征在于,所述采用预设方式生成所述待处理业务数据的指纹数据,包括:对所述待处理业务数据进行哈希处理,将所述哈希生成的哈希值作为所述待处理业务数据的指纹数据。
- 如权利要求2所述的一种业务数据处理方法,其特征在于,当所述待处理业务数据缺少至少一项所述关键要素数据时,执行包括:根据所述业务数据的业务类型确定缺少的关键要素数据的缺省值,使用所述缺省值作为生成所述指纹数据的关键要素数据的取值。
- 如权利要求1所述的一种业务数据处理方法,其特征在于,所述将所述指纹数据写入与所述待处理业务数据对应的区块链中,包括:采用异步方式将所述指纹数据写入与所述待处理业务数据对应的区块链中。
- 一种业务数据验证方法,其特征在于,所述方法包括:确定待验证的业务数据,从存储的区块链数据中获取与所述待验证的业务数据相关联的区块链副本数据;所述区块链副本数据包括根据待处理业务数据的指纹数据生成并存储在区块链中的数据信息,所述区块链副本数据中存储相邻的上一个节点区块链副本数据中的指纹数据;采用预设方式计算所述待验证的业务数据的第一指纹数据,并获取所述区块链副本数据中的与所述待验证的业务数据相对应的第二指纹数据;比较所述第一指纹数据与所述第二指纹数据是否相同,若相同,则确认所述待验证的业务数据未被修改。
- 一种业务数据处理装置,其特征在于,所述装置包括:指纹数据生成模块,用于获取待处理业务数据,以及采用预设方式生成所述待处理业务数据的指纹数据;区块链数据生成模块,用于将所述指纹数据写入与所述待处理业务数据对应的区块链中,生成所述待处理业务数据在所述区块链中的区块链副本数据,所述区块链副本数据中存储相邻的上一个节点区块链副本数据中的指纹数据。
- 如权利要求8所述的一种业务数据处理装置,其特征在于,所述装置还包括:关键要素提取模块,用于从所述待处理业务数据中提取出预定类型的关键要素数据;相应的,所述指纹数据生成模块采用预设方式生成所述待处理业务数据的指纹数据包括采用预设方式对提取的所述关键要素数据进行处理,生成所述待处理业务数据的指纹数据。
- 如权利要求8或9所述的一种业务数据处理装置,其特征在于,所述指纹数据生成模块生成所述指纹数据的过程被设置成是单向不可逆的。
- 如权利要求8所述的一种业务数据处理装置,其特征在于,所述指纹数据生成模块采用预设方式生成所述待处理业务数据的指纹数据包括:对所述待处理业务数据进行哈希处理,将所述哈希生成的哈希值作为所述待处理业务数据的指纹数据。
- 如权利要求8所述的一种业务数据处理装置,其特征在于,所述区块链数据生成模块采用异步方式将所述指纹数据写入与所述待处理业务数据对应的区块链中。
- 如权利要求9所述的一种业务数据处理装置,其特征在于,所述装置还包括:缺省处理模块,用于当所述待处理业务数据缺少至少一项所述关键要素数据时,根据所述业务数据的业务类型确定缺少的关键要素数据的缺省值,使用所述缺省值作为生成所述指纹数据的关键要素数据的取值。
- 一种业务***,其特征在于,包括I/O接口、处理单元,所述I/O接口用于接收待处理业务数据;所述处理单元被设置成,用于采用预设方式生成所述待处理业务数据的指纹数据;还用于将所述业务数据写入原有数据库中,以及将所述指纹数据写入与所述待处理业务数据对应的区块链数据库中,生成所述待处理业务数据在所述区块链中的区块链副本数据,所述区块链副本数据中存储相邻的上一个节点区块链副本数据中的指纹数据。
- 如权利要求14所述的一种业务***,其特征在于,所述处理单元还用于,从所述待处理业务数据中提取出预定类型的关键要素数据;相应的,所述采用预设方式生成所述待处理业务数据的指纹数据包括采用预设方式对提取的所述关键要素数据进行处理,生成所述待处理业务数据的指纹数据。
- 如权利要求14或15所述的一种业务***,其特征在于,所述处理单元还用于,从存储的区块链数据中获取与所述待验证的业务数据相关联的区块链副本数据,采用预设方式计算所述待验证的业务数据的第一指纹数据,并获取所述区块链副本数据中的与所述待验证的业务数据相对应的第二指纹数据;还用于比较所述第一指纹数据与所述第二指纹数据是否相同,若相同,则确认所述待验证的业务数据未被修改。
Priority Applications (7)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
EP21171005.8A EP3893180B1 (en) | 2016-12-06 | 2017-11-28 | Service data processing method and apparatus |
KR1020197018334A KR102231411B1 (ko) | 2016-12-06 | 2017-11-28 | 서비스 데이터 프로세싱 및 검증을 위한 방법, 장치, 및 시스템 |
JP2019530465A JP2020513707A (ja) | 2016-12-06 | 2017-11-28 | ビジネスデータ処理方法、検証方法、装置、およびシステム |
EP17879521.7A EP3553725B1 (en) | 2016-12-06 | 2017-11-28 | Service data processing method and apparatus |
MYPI2019003205A MY194398A (en) | 2016-12-06 | 2017-11-28 | Method, apparatus, and system for service data processing and verification |
US16/432,572 US10789356B2 (en) | 2016-12-06 | 2019-06-05 | Method, apparatus, and system for service data processing and verification |
PH12019501272A PH12019501272A1 (en) | 2016-12-06 | 2019-06-06 | Method, apparatus, and system for service data processing and verification |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201611107046.9 | 2016-12-06 | ||
CN201611107046.9A CN107016542A (zh) | 2016-12-06 | 2016-12-06 | 一种业务数据处理方法、验证方法、装置及*** |
Related Child Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US16/432,572 Continuation US10789356B2 (en) | 2016-12-06 | 2019-06-05 | Method, apparatus, and system for service data processing and verification |
Publications (1)
Publication Number | Publication Date |
---|---|
WO2018103554A1 true WO2018103554A1 (zh) | 2018-06-14 |
Family
ID=59439128
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/CN2017/113349 WO2018103554A1 (zh) | 2016-12-06 | 2017-11-28 | 一种业务数据处理方法、验证方法、装置及*** |
Country Status (9)
Country | Link |
---|---|
US (1) | US10789356B2 (zh) |
EP (2) | EP3893180B1 (zh) |
JP (1) | JP2020513707A (zh) |
KR (1) | KR102231411B1 (zh) |
CN (1) | CN107016542A (zh) |
MY (1) | MY194398A (zh) |
PH (1) | PH12019501272A1 (zh) |
TW (1) | TW201822112A (zh) |
WO (1) | WO2018103554A1 (zh) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898366A (zh) * | 2018-07-25 | 2018-11-27 | 佛山市高明曦逻科技有限公司 | 基于分布式网络的公益活动众筹*** |
CN112528276A (zh) * | 2020-11-23 | 2021-03-19 | 中国联合网络通信集团有限公司 | 基于区块链的分布式存储防篡改方法及*** |
Families Citing this family (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107016542A (zh) | 2016-12-06 | 2017-08-04 | 阿里巴巴集团控股有限公司 | 一种业务数据处理方法、验证方法、装置及*** |
CN107480945A (zh) * | 2017-08-10 | 2017-12-15 | 杭州全视软件有限公司 | 一种责任的区块链管理方法 |
CN107748850A (zh) * | 2017-10-30 | 2018-03-02 | 北京计算机技术及应用研究所 | 一种利用区块链保存设备维修作业数据的方法和*** |
CN108256999B (zh) * | 2018-01-19 | 2020-08-14 | 阿里巴巴集团控股有限公司 | 资金流转方法及装置、电子设备 |
CN108510275A (zh) * | 2018-04-08 | 2018-09-07 | 众安信息技术服务有限公司 | 用于跟进公益项目的进展情况的方法及计算机可读存储介质 |
CN108876606B (zh) | 2018-05-29 | 2021-02-09 | 创新先进技术有限公司 | 资产转移方法及装置、电子设备 |
CN108805712B (zh) | 2018-05-29 | 2021-03-23 | 创新先进技术有限公司 | 资产转移的回退处理方法及装置、电子设备 |
CN108876572A (zh) | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | 区块链交易的对账方法及装置、电子设备 |
CN109583676B (zh) * | 2018-09-11 | 2023-08-18 | 创新先进技术有限公司 | 分布式***中采集业务流程数据的方法、***及其服务器 |
CN109409122B (zh) * | 2018-09-13 | 2022-08-16 | 远光软件股份有限公司 | 文件存储方法及其电子设备、存储介质 |
CN109657440B (zh) * | 2018-11-01 | 2020-11-27 | 创新先进技术有限公司 | 基于区块链的生物特征信息处理方法和装置、终端设备 |
CN110020945B (zh) | 2018-11-27 | 2020-10-30 | 创新先进技术有限公司 | 一种基于多个区块链网络的数据读取方法及*** |
CN109816512A (zh) * | 2018-12-14 | 2019-05-28 | 深圳壹账通智能科技有限公司 | 对账结果的验证方法、装置和计算机设备 |
CN109960949A (zh) * | 2019-01-28 | 2019-07-02 | 中国科学院数据与通信保护研究教育中心 | 一种数据存储验证方法及装置 |
KR102354776B1 (ko) * | 2019-03-04 | 2022-01-25 | 어드밴스드 뉴 테크놀로지스 씨오., 엘티디. | 트랜잭션 데이터를 처리를 위해 블록체인 시스템에 제공하기 위한 방법 및 디바이스 |
CN111026740B (zh) * | 2019-12-03 | 2022-07-12 | 厦门市美亚柏科信息股份有限公司 | 基于数据指纹的数据对账方法及*** |
CN111339203B (zh) * | 2020-02-28 | 2023-07-14 | 北京金和网络股份有限公司 | 区块链数据采集方法、装置及*** |
CN111787019B (zh) * | 2020-07-02 | 2023-04-14 | 深圳市亲邻科技有限公司 | 一种基于区块链的信息获取方法及装置 |
CN112668058A (zh) * | 2020-12-31 | 2021-04-16 | 车主邦(北京)科技有限公司 | 一种基于区块链技术的物流订单处理方法和装置 |
CN113407512A (zh) * | 2021-06-10 | 2021-09-17 | 湖南大学 | 基于区块链的分布式存储***及方法、设备、存储介质 |
CN114362969B (zh) * | 2022-03-17 | 2022-06-10 | 北京百度网讯科技有限公司 | 一种基于区块链的数据验证方法、装置、设备及存储介质 |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105610578A (zh) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | 区块链信息存证及隐私保护方法 |
CN105678182A (zh) * | 2015-12-29 | 2016-06-15 | 布比(北京)网络技术有限公司 | 一种数据操作控制的方法及装置 |
CN105871545A (zh) * | 2016-06-03 | 2016-08-17 | ***股份有限公司 | 可信电子凭证托管方法及*** |
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
CN107016542A (zh) * | 2016-12-06 | 2017-08-04 | 阿里巴巴集团控股有限公司 | 一种业务数据处理方法、验证方法、装置及*** |
Family Cites Families (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101398835B (zh) * | 2007-09-30 | 2012-08-29 | 日电(中国)有限公司 | 基于自然语言的服务选择***与方法以及服务查询***与方法 |
CN101409614B (zh) * | 2007-10-12 | 2011-04-13 | 华为技术有限公司 | 一种数据同步方法、***和设备 |
US9363258B2 (en) | 2007-12-17 | 2016-06-07 | International Business Machines Corporation | Secure digital signature system |
JP5414346B2 (ja) | 2009-04-28 | 2014-02-12 | 三菱電機株式会社 | データ処理装置 |
CN201465234U (zh) * | 2009-05-31 | 2010-05-12 | 北京飞天诚信科技有限公司 | 一种交易装置 |
CN101783052B (zh) * | 2010-02-04 | 2012-08-22 | 周建军 | 自助式单据打印设备 |
CN103853985B (zh) * | 2012-12-05 | 2017-01-18 | ***通信集团黑龙江有限公司 | 数据加密方法、解密方法及装置 |
US20160260095A1 (en) * | 2015-03-02 | 2016-09-08 | Dell Products, Lp | Containerized Computational Task Execution Management Using a Secure Distributed Transaction Ledger |
JP6364132B2 (ja) | 2015-03-31 | 2018-07-25 | ナスダック, インコーポレイテッドNasdaq, Inc. | ブロックチェーン取引記録のシステムおよび方法 |
CA2981952A1 (en) * | 2015-04-06 | 2016-10-13 | Bitmark, Inc. | System and method for decentralized title recordation and authentication |
US10142187B2 (en) * | 2015-04-29 | 2018-11-27 | Accenture Global Soltuions Limited | Predicting an effect of performing an action on a node of a geographical network |
EP3292484B1 (en) * | 2015-05-05 | 2021-07-07 | Ping Identity Corporation | Identity management service using a block chain |
US20160342977A1 (en) * | 2015-05-20 | 2016-11-24 | Vennd.io Pty Ltd | Device, method and system for virtual asset transactions |
WO2017027900A1 (en) * | 2015-08-14 | 2017-02-23 | Identitii Pty Ltd | A computer implemented method for processing a financial transaction and a system therefor |
US11562353B2 (en) * | 2015-11-24 | 2023-01-24 | Mastercard International Incorporated | Method and system for gross settlement by use of an opaque blockchain |
CN105719185B (zh) | 2016-01-22 | 2019-02-15 | 杭州复杂美科技有限公司 | 区块链的数据对比及共识方法 |
CN105956923B (zh) * | 2016-04-20 | 2022-04-29 | 上海如鸽投资有限公司 | 资产交易***以及资产的数字化认证和交易方法 |
CN105975868A (zh) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | 一种基于区块链的证据保全方法及装置 |
CN106097030A (zh) * | 2016-04-29 | 2016-11-09 | 北京太云科技有限公司 | 一种基于区块链的资产的数据处理方法、装置及*** |
CN106100847B (zh) * | 2016-06-14 | 2021-10-26 | 惠众商务顾问(北京)有限公司 | 非对称加密区块链身份信息验证方法及装置 |
WO2017218984A1 (en) * | 2016-06-16 | 2017-12-21 | The Bank Of New York Mellon | Ensuring data integrity of executed transactions |
CN106027563A (zh) * | 2016-07-08 | 2016-10-12 | 上海瀚银信息技术有限公司 | 一种敏感数据加解密装置、方法及交易*** |
US20180075532A1 (en) * | 2016-09-09 | 2018-03-15 | MonetaGo Inc. | Asset exchange system and method |
US20180268386A1 (en) * | 2016-09-13 | 2018-09-20 | C. Jay Wack | Identity Management Distributed Ledger and Blockchain |
US10587628B2 (en) * | 2016-09-29 | 2020-03-10 | Microsoft Technology Licensing, Llc | Verifiable outsourced ledgers |
-
2016
- 2016-12-06 CN CN201611107046.9A patent/CN107016542A/zh active Pending
-
2017
- 2017-09-14 TW TW106131555A patent/TW201822112A/zh unknown
- 2017-11-28 KR KR1020197018334A patent/KR102231411B1/ko active IP Right Grant
- 2017-11-28 JP JP2019530465A patent/JP2020513707A/ja active Pending
- 2017-11-28 WO PCT/CN2017/113349 patent/WO2018103554A1/zh unknown
- 2017-11-28 MY MYPI2019003205A patent/MY194398A/en unknown
- 2017-11-28 EP EP21171005.8A patent/EP3893180B1/en active Active
- 2017-11-28 EP EP17879521.7A patent/EP3553725B1/en active Active
-
2019
- 2019-06-05 US US16/432,572 patent/US10789356B2/en active Active
- 2019-06-06 PH PH12019501272A patent/PH12019501272A1/en unknown
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160283920A1 (en) * | 2015-03-28 | 2016-09-29 | Justin Fisher | Authentication and verification of digital data utilizing blockchain technology |
CN105678182A (zh) * | 2015-12-29 | 2016-06-15 | 布比(北京)网络技术有限公司 | 一种数据操作控制的方法及装置 |
CN105610578A (zh) * | 2016-01-25 | 2016-05-25 | 杭州复杂美科技有限公司 | 区块链信息存证及隐私保护方法 |
CN105871545A (zh) * | 2016-06-03 | 2016-08-17 | ***股份有限公司 | 可信电子凭证托管方法及*** |
CN107016542A (zh) * | 2016-12-06 | 2017-08-04 | 阿里巴巴集团控股有限公司 | 一种业务数据处理方法、验证方法、装置及*** |
Non-Patent Citations (1)
Title |
---|
See also references of EP3553725A4 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108898366A (zh) * | 2018-07-25 | 2018-11-27 | 佛山市高明曦逻科技有限公司 | 基于分布式网络的公益活动众筹*** |
CN112528276A (zh) * | 2020-11-23 | 2021-03-19 | 中国联合网络通信集团有限公司 | 基于区块链的分布式存储防篡改方法及*** |
CN112528276B (zh) * | 2020-11-23 | 2023-06-09 | 中国联合网络通信集团有限公司 | 基于区块链的分布式存储防篡改方法及*** |
Also Published As
Publication number | Publication date |
---|---|
EP3553725A4 (en) | 2020-01-01 |
PH12019501272A1 (en) | 2019-12-16 |
JP2020513707A (ja) | 2020-05-14 |
CN107016542A (zh) | 2017-08-04 |
MY194398A (en) | 2022-11-30 |
TW201822112A (zh) | 2018-06-16 |
US10789356B2 (en) | 2020-09-29 |
KR102231411B1 (ko) | 2021-03-26 |
US20190311116A1 (en) | 2019-10-10 |
EP3893180A1 (en) | 2021-10-13 |
KR20190085119A (ko) | 2019-07-17 |
EP3893180B1 (en) | 2023-06-21 |
EP3553725A1 (en) | 2019-10-16 |
EP3893180C0 (en) | 2023-06-21 |
EP3553725B1 (en) | 2021-08-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2018103554A1 (zh) | 一种业务数据处理方法、验证方法、装置及*** | |
JP6789397B2 (ja) | コンセンサス検証方法およびデバイス | |
EP3968191A1 (en) | Trusted hardware-based identity management methods, apparatuses, and devices | |
TWI737183B (zh) | 基於區塊鏈的文件相似性檢測方法、系統及非暫態電腦可讀媒體 | |
WO2018171539A1 (zh) | 一种业务请求的处理方法及装置 | |
CN111767578B (zh) | 一种数据检验方法、装置及设备 | |
TW202009760A (zh) | 身份資訊的識別方法及裝置 | |
WO2018176964A1 (zh) | 用于金融数据共享的方法、装置及电子设备 | |
US11341284B2 (en) | Trusted hardware-based data management methods, apparatuses, and devices | |
US11455417B2 (en) | Data processing methods, apparatuses, and devices | |
US11270004B2 (en) | Blockchain-based transaction privacy | |
CN109308211A (zh) | 用于在区块链中处理事务数据的方法、装置及存储介质 | |
US20170300873A1 (en) | System and method for secure automated clearinghouse transactions | |
US11494511B2 (en) | Data processing methods, apparatuses, and devices | |
US20230019921A1 (en) | System and method for facilitating creation, verification, and management of digital resources | |
US20230259533A1 (en) | Resource distribution instruments comprising logical digital resource components linked with processing of distribution requests | |
US20240146736A1 (en) | System and method for validating users in a virtual ecosystem based on stacking of digital resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 17879521 Country of ref document: EP Kind code of ref document: A1 |
|
ENP | Entry into the national phase |
Ref document number: 2019530465 Country of ref document: JP Kind code of ref document: A |
|
NENP | Non-entry into the national phase |
Ref country code: DE |
|
ENP | Entry into the national phase |
Ref document number: 20197018334 Country of ref document: KR Kind code of ref document: A |
|
ENP | Entry into the national phase |
Ref document number: 2017879521 Country of ref document: EP Effective date: 20190708 |