The content of the invention
In view of this, the present invention provides a kind of method, device and electronic equipment shared for finance data, ensure that
The authenticity of asset securitization service provider bottom data.
Other characteristics and advantage of the present invention will be apparent from by following detailed description, or partially by the present invention
Practice and acquistion.
According to an aspect of the invention, it is proposed that a kind of method shared for finance data, this method includes:According to finance
Asset data generates the first block data;The second block data is generated according to the first block data and examination & verification data;According to
Two block datas and payment data generate the 3rd block data;And issued the 3rd block data to complete financial number
Disposed according to chain code.
In a kind of exemplary embodiment of the disclosure, the first block data, the second block data and the 3rd block counts
Common recognition mechanism confirmation is carried out by algorithm of knowing together between.
In a kind of exemplary embodiment of the disclosure, common recognition algorithm includes:Byzantine failure tolerance algorithm.
In a kind of exemplary embodiment of the disclosure, the 3rd block data is issued to complete finance data chain code
Deployment, including:3rd block data is issued to the chain code deployment of alliance's chain to complete finance data.
In a kind of exemplary embodiment of the disclosure, the first block data is generated according to financial asset data, including:Press
Financial asset data are encapsulated according to predefined first transaction field, to generate the first encapsulation of data;Indicate the first processing public key;Refer to
Bright first transaction event;Signature authentication, generation the are carried out to the first encapsulation of data, the first processing public key and the first transaction event
One block data.
In a kind of exemplary embodiment of the disclosure, the first block data is generated according to financial asset data, in addition to:
First block data is synchronized to cache database.In a kind of exemplary embodiment of the disclosure, according to the first block data
And examination & verification data generate the second block data, including:According to predefined second transaction field encapsulate the first block data and
Data are audited, to generate the second encapsulation of data;Indicate second processing public key;Indicate the second transaction event;To the second encapsulation of data,
Second processing public key and the second transaction event carry out signature authentication, generate the second block data.
In a kind of exemplary embodiment of the disclosure, the second block is generated according to the first block data and examination & verification data
Data, in addition to:Monitored data, obtains the first block data.
In a kind of exemplary embodiment of the disclosure, the second block is generated according to the first block data and examination & verification data
Data, in addition to:Second block data is synchronized to cache database.
In a kind of exemplary embodiment of the disclosure, the 3rd block is generated according to the second block data and payment data
Data, including:The second block data and payment data are encapsulated according to predefined 3rd transaction field, the 3rd encapsulation of data is generated
Indicate the 3rd processing public key;Indicate the 3rd transaction event;To the 3rd encapsulation of data, the 3rd processing public key and the 3rd transaction event
Signature authentication is carried out, the 3rd block data is generated.
In a kind of exemplary embodiment of the disclosure, the 3rd block is generated according to the second block data and payment data
Data, in addition to:Monitored data, obtains the second block data.
In a kind of exemplary embodiment of the disclosure, the 3rd block is generated according to the second block data and payment data
Data, in addition to:3rd block data is synchronized to cache database.
In a kind of exemplary embodiment of the disclosure, in addition to:To the first block data, the second block data and
The write-in data side of three block datas carries out control of authority.
According to an aspect of the invention, it is proposed that a kind of device shared for finance data, the device includes:First block
Module, for generating the first block data according to financial asset data;Second block module, for according to the first block data with
And examination & verification data generate the second block data;3rd block module, for according to the second block data and payment data generation
3rd block data;And chain code deployment module, for the 3rd block data to be issued to complete finance data chain code portion
Administration.
In a kind of exemplary embodiment of the disclosure, the first block module, the second block module and the 3rd block mould
Common recognition mechanism confirmation is carried out by algorithm of knowing together between block.
According to an aspect of the invention, it is proposed that a kind of electronic equipment, the electronic equipment includes:Processor;Memory, storage
Controlled for processor such as the instruction of operation above.
According to method, device and the electronic equipment that finance data is shared of being used for of the present invention, asset securitization ensure that
The authenticity of service provider's bottom data.
It should be appreciated that the general description of the above and detailed description hereinafter are only exemplary, this can not be limited
Invention.
Specific embodiment
Example embodiment is described more fully with referring now to accompanying drawing.However, example embodiment can be real in a variety of forms
Apply, and be not understood as limited to embodiment set forth herein;On the contrary, thesing embodiments are provided so that the present invention will be comprehensively and complete
It is whole, and the design of example embodiment is comprehensively conveyed into those skilled in the art.Identical reference is represented in figure
Same or similar part, thus repetition thereof will be omitted.
Implement in addition, described feature, structure or characteristic can be combined in any suitable manner one or more
In example.Embodiments of the invention are fully understood so as to provide there is provided many details in the following description.However,
It will be appreciated by persons skilled in the art that technical scheme can be put into practice without one or more in specific detail,
Or can be using other methods, constituent element, device, step etc..In other cases, it is not shown in detail or describes known side
Method, device, realization operate to avoid fuzzy each aspect of the present invention.
Block diagram shown in accompanying drawing is only functional entity, not necessarily must be corresponding with physically separate entity.
I.e., it is possible to realize these functional entitys using software form, or realized in one or more hardware modules or integrated circuit
These functional entitys, or realize in heterogeneous networks and/or processor device and/or microcontroller device these functional entitys.
Flow chart shown in accompanying drawing is merely illustrative, it is not necessary to including all contents and operation/step,
It is not required to perform by described order.For example, some operation/steps can also be decomposed, and some operation/steps can be closed
And or part merge, therefore the actual order performed is possible to be changed according to actual conditions.
It should be understood that although term first, second, third, etc. may be used to describe various assemblies herein, these groups
Part should not be limited by these terms.These terms are to distinguish a component and another component.Therefore, first group be discussed herein below
Part can be described as teaching of second component without departing from disclosure concept.As used herein, term " and/or " include it is associated
All combinations for listing any one and one or more in project.
It will be understood by those skilled in the art that accompanying drawing is the schematic diagram of example embodiment, module or flow in accompanying drawing
Not necessarily implement the present invention necessary, therefore cannot be used for limiting the scope of the invention.
Disclosure example embodiment is described in detail below in conjunction with the accompanying drawings.
Fig. 1 is a kind of flow chart of method shared for finance data according to an exemplary embodiment.
As shown in figure 1, in S102, the first block data is generated according to financial asset data.Financial asset data can example
As being the assets related data from asset side.What asset side was represented is that all assets of enterprise include fixed assets, flowing money
Production, intangible asset.According to being described above, assets can be carried out financial instrument relevant treatment by asset side.Asset side can root
According to its financial asset data, the first block data is generated.Can also for example, finance data to be carried out to predetermined encapsulation process, and then
Generate the first block data.Predetermined encapsulation process can for example including:The gold is encapsulated according to predefined first transaction field
Melt asset data, to generate the first encapsulation of data;Indicate the first processing public key;Indicate the first transaction event;To first envelope
Fill data, the first processing public key and the first transaction event and carry out signature authentication, generate the first block data.
In S104, the second block data is generated according to the first block data and examination & verification data.Can be for example, fund root
Carry out assets examination & verification according to the first block data, can for example, examination & verification loan list, repayment schedule, the examination & verification of financial asset in itself etc.,
Generation examination & verification data after examination & verification.And it can also indicate for example, the first block data is together packaged with the examination & verification data
After the operation such as public key and next step transaction event, signature authentication generates the second block data.
In S106, the 3rd block data is generated according to the second block data and payment data.Can be for example, being responsible for progress
The payment channel root of financial payment carries out making loans operation according to the second block data, makes loans and generates payment data after operating, by the
Two block datas and payment data are packaged, and are indicated after the operation such as various associated public key and transaction event, by label
Name certification generates the 3rd block data.
In S108, the 3rd block data is issued to complete the deployment of finance data chain code.Can be for example, by
Three block datas are broadcast in financial system, to complete chain code deployment.Can also be for example, the 3rd block data be issued with complete
Into the chain code deployment of alliance's chain of finance data.
According to the method that finance data is shared that is used for of the present invention, by way of finance data is carried out into chain code deployment,
Using block chain decentralization, the characteristic of anti-tamper and distributed account book carries out data fidelity, once by nothing after entering chain
Method is distorted privately by folk prescription, ensure that the authenticity of asset securitization service provider bottom data.
It will be clearly understood that the present disclosure describe how forming and use particular example, but the principle of the present invention is not limited to
Any details of these examples.On the contrary, the teaching based on present disclosure, these principles can be applied to many other
Embodiment.
It is described to be issued the 3rd block data to complete finance in a kind of exemplary embodiment of the disclosure
Code data link is disposed, including:The chain code that 3rd block data is issued to alliance's chain to complete finance data
Deployment.
Block chain is substantially the general designation of several technical schemes, including point-to-point peer-to-peer network host-host protocol, cryptography
The Game Design of AES, distributed common recognition mechanism, and Nash Equilibrium.Based on the combination of this several technology, Ke Yishi
The authentic data storehouse trusted is gone in existing decentralization, ensures that the traceable of recorded information is traced back on chain using algorithm proof mechanism
Source, can not be forged, and can not be distorted.Alliance's block chain refers to the block chain that its common recognition process is controlled by preselected node;For example, not
The community of one Ge You15Ge financial institutions of harm imagination composition, each mechanism runs a node, and in order that each
Block, which comes into force, needs the confirmation for obtaining wherein 10 mechanisms (2/3 confirms).Block chain perhaps allows everyone can be read, or
It is limited only in participant, or walks mixed type route, root Hash and its API (application programming interfaces) external disclosure of such as block,
API can allow the extraneous inquiry for being used for making finite number of time and the information for obtaining block chain state.These block chains can be considered " part
Decentralization ".Alliance's chain uses multicenter mode, and participant node is also set in advance, and by knowing together, mechanism confirms.In connection
In alliance's chain, be different from it is publicly-owned have chain, authority setting and control can be carried out, possess higher apply and scalability.
, can also be for example, in the present embodiment, the multiple check posts of deployment may be, for example, 4 checking sections according to some embodiments
Point, asset side, fund side, and fund passage side respectively grasp one private key, each local (or high in the clouds) portion of checking node
A set of distributed account book database is affixed one's name to.Generation in block chain management system per transaction is required for all nodes to reach common understanding
Chain can just be entered afterwards.
According to the method that finance data is shared that is used for of the present invention, by the way that finance data is carried out into what alliance's chain chain code was disposed
Mode, can be greatly reduced read-write cost and the time in strange land, can provide simpler, more efficient common recognition service, while after
The advantage of decentralization is held, mitigates monopolization pressure.
In a kind of exemplary embodiment of the disclosure, first block data, second block data and institute
State between the 3rd block data and common recognition mechanism confirmation is carried out by algorithm of knowing together.In a kind of exemplary embodiment of the disclosure,
The common recognition algorithm includes:Byzantine failure tolerance algorithm.
PBFT is Practical Byzantine Fault Tolerance abbreviation, means Byzantine failure tolerance algorithm.Should
Algorithm is that Miguel Castro (Karstlo) and Barbara Liskov (Li Sikefu) put forward in 1999, is solved
The problem of original Byzantine failure tolerance efficiency of algorithm is not high.The Byzantine failure tolerance algorithm of early stage or the vacation based on synchronization system
If, or because performance is too low and can not operate in systems in practice.The confirmation of POW (Prove of Work) algorithm is fast simultaneously
Degree is too slow, while needing to consume substantial amounts of resource.The basic ideas of BFT algorithms are as follows:Client can send it is a series of ask to
Each replicas node performs corresponding operation, and BFT algorithms ensure that all normal replicas nodes perform identical sequence
The operation of row.Because all replicas nodes are all deterministic, and original state is all identical, according to state
Machine principle (state machine replication), these replicas can produce identical result phase.When Client is received
During the result returned to f+1 replicas node, if these results are all, because BFT algorithms ensure that be up to f is individual
Replicas goes wrong, so at least one replicas is correct, then these results that Client is received all are
Correctly.But state machine replication difficult point is to ensure that normal replicas nodes all with identical
Sequence performs some same requests, specifically how comes to face Byzantine faults.And this utilization copy replications of PBFT
(replication) method solves the problems, such as Byzantine failure tolerance, it is possible to allow the algorithm to be operated in asynchronous environment, and sound
Answer more than performance boost an order of magnitude.The NFS (NFS) of Byzantine failure tolerance, performance are realized with this algorithm
Test demonstrates the system only slow than the standard NFS without copy replication 3%.
According to the method that finance data is shared that is used for of the present invention, finance data is carried out by chain by Byzantine failure tolerance algorithm
The mode of code deployment, enables to the shared method work of the finance data in asynchronous mode, and accelerate finance data
Processing speed.
Fig. 2 is a kind of flow chart of method shared for finance data according to another exemplary embodiment.
As shown in Fig. 2 in S202, the financial asset data are encapsulated according to predefined first transaction field, with life
Into the first encapsulation of data.Finance data is handled according to pre-defined transaction field, encapsulated.
In S204, the first processing public key is indicated.Can be for example, indicating the public key of next step processor.
In S206, the first transaction event is indicated.Can be for example, indicating the transaction event of next step processing.
In S208, first encapsulation of data, the first processing public key and the first transaction event are signed
Certification, generates first block data.
It is described to generate the first block data according to financial asset data in a kind of exemplary embodiment of the disclosure, also
Including:First block data is synchronized to cache database.
It is described to generate second according to the first block data and examination & verification data in a kind of exemplary embodiment of the disclosure
Block data, including:First block data and the examination & verification data are encapsulated according to predefined second transaction field, with life
Into the second encapsulation of data;Indicate second processing public key;Indicate the second transaction event;To second encapsulation of data, described second
Handle public key and the second transaction event carries out signature authentication, generate second block data.The generation of second block can be joined
The generation processing of above the first block data is examined, here is omitted.
It is described to generate second according to the first block data and examination & verification data in a kind of exemplary embodiment of the disclosure
Block data, in addition to:Monitored data, obtains first block data, and second block data is synchronized to slow
Deposit data storehouse.
It is described to generate the 3rd according to the second block data and payment data in a kind of exemplary embodiment of the disclosure
Block data, including:Second block data and the payment data, generation are encapsulated according to predefined 3rd transaction field
3rd encapsulation of data indicates the 3rd processing public key;Indicate the 3rd transaction event;To the 3rd encapsulation of data, the 3rd processing
Public key and the 3rd transaction event carry out signature authentication, generate the 3rd block data.The generation of 3rd block is referred to
The generation processing of first block data in text, here is omitted.
It is described to generate the 3rd according to the second block data and payment data in a kind of exemplary embodiment of the disclosure
Block data, in addition to:Monitored data, obtains second block data, and the 3rd block data is synchronized to slow
Deposit data storehouse.
In a kind of exemplary embodiment of the disclosure, in addition to:To first block data, second block counts
According to this and the 3rd block data write-in data side carry out control of authority.
According to some embodiments, asset side loaning bill flow chart can be walked as set forth in the present embodiment with asset side refund flow
It is rapid to carry out.The application of every loan in financial system, examination & approval, it is to be saved by block chain by each checking to make loans with the circulation such as returned money
Point common recognition is completed.Once one is borrowed money and is audited by the investment decision engine of financial system and by specifying payment channel to complete to make loans
Afterwards, payment channel can return to transaction journal exclusive evidence in real time and write block chain, and complete loan assets enters chain.So
Facilitator system ensure that the true of bottom asset data by block chain and can not distort.
It will be appreciated by those skilled in the art that realizing that all or part of step of above-described embodiment is implemented as being performed by CPU
Computer program.When the computer program is performed by CPU, the above-mentioned work(that the above method of the invention provided is limited is performed
Energy.Described program can be stored in a kind of computer-readable recording medium, and the storage medium can be read-only storage, magnetic
Disk or CD etc..
Further, it should be noted that above-mentioned accompanying drawing is only the place included by method according to an exemplary embodiment of the present invention
That manages schematically illustrates, rather than limitation purpose.It can be readily appreciated that above-mentioned processing shown in the drawings is not intended that or limited at these
The time sequencing of reason.In addition, being also easy to understand, these processing for example can be performed either synchronously or asynchronously in multiple modules.
Following is apparatus of the present invention embodiment, can be used for performing the inventive method embodiment.It is real for apparatus of the present invention
The details not disclosed in example is applied, the inventive method embodiment is refer to.
Fig. 3 is a kind of block diagram of device shared for finance data according to an exemplary embodiment.
Wherein, the first block module 302 is used to generate the first block data according to financial asset data.
Second block module 304 is used to generate the second block data according to the first block data and examination & verification data.
3rd block module 306 is used to generate the 3rd block data according to the second block data and payment data.
Chain code deployment module 308 is used to be issued the 3rd block data to complete the deployment of finance data chain code.
In a kind of exemplary embodiment of the disclosure, the first block module, the second block module and institute
State between the 3rd block module and common recognition mechanism confirmation is carried out by algorithm of knowing together.
According to the device that finance data is shared that is used for of the present invention, by way of finance data is carried out into chain code deployment,
Using block chain decentralization, the characteristic of anti-tamper and distributed account book carries out data fidelity, once by nothing after entering chain
Method is distorted privately by folk prescription, ensure that the authenticity of asset securitization service provider bottom data.
Fig. 4 is a kind of block diagram of device shared for finance data according to an exemplary embodiment.
The device block diagram can be used for realizing function above shown by method, can be for example, the framework by system constructing
Main point three layers, one is infrastructure service layer, is mainly made up of checking node and non-authentication node, in addition to member management service,
The functions such as authentication, rights management, block common recognition can be realized;Two be based on the Business Logic in service layer, can be such as
It is chaincode (chain code), is deployed on block chain, the interface that can be provided by Fabric chaincode realizes complexity
Service logic, while externally provide deployment, call and query interface;Three be application software, i.e. client SDK, and it is encapsulated
Into standard interface, private key keeping, trading signature, data buffer storage, chain code can be provided and the function such as call;Additionally provide block simultaneously
Chain browser, it is possible to achieve to node, the real-time monitoring of transaction, be easy to intuitively, clearly understand the operation shape of current system
State.
Fabric has single member management module, i.e. membersrvc.The username and password of each participant is protected
In the presence of in customization SDK, the operation system of participant calls it to customize SDK and initiates operation flow, customize SDK by username and password
It is attached in transaction interface, and generates static registration certificate (ECerts) and be saved in Fabric service architectures layer.Service logic
Layer can receive the username and password that participant customization SDK is uploaded before REST API requests are sent, and log on block chain,
Must provide corresponding user name during operation chain code could dispose and call chain code.
Fig. 5 is the block diagram of a kind of electronic equipment according to another exemplary embodiment.
As shown in figure 5, electronic equipment 50 may include processor 510, memory 520, transmitter 530 and receiver 540.
Memory 520 can store the instruction for the processing of the control operation of processor 510.Memory 520 may include volatibility
Or nonvolatile memory, such as static RAM (SRAM), Electrically Erasable Read Only Memory (EEPROM),
Erasable Programmable Read Only Memory EPROM (EPROM), programmable read only memory (PROM), read-only storage (ROM) etc., the present invention
It is not limited in this respect.
Processor 510 can call the instruction stored in memory 520 to control associative operation.According to an embodiment, memory
520 store and control the instruction that operates below for processor 510:The first block data is generated according to financial asset data;According to
First block data and examination & verification data generate the second block data;According to the second block data and payment data generation the 3rd
Block data;And issued the 3rd block data to complete the deployment of finance data chain code.It can be readily appreciated that memory
520 can also store the instruction that other operations according to embodiments of the present invention are controlled for processor 510, repeat no more here.
It will be appreciated by those skilled in the art that above-mentioned each module can be distributed in device according to the description of embodiment, also may be used
To carry out respective change uniquely different from one or more devices of the present embodiment.The module of above-described embodiment can be merged into
One module, can also be further split into multiple submodule.
The description of embodiment more than, those skilled in the art is it can be readily appreciated that example embodiment described herein
It can be realized, can also be realized by way of software combines necessary hardware by software.Therefore, according to present invention implementation
The technical scheme of example can be embodied in the form of software product, and the software product can be stored in a non-volatile memories
In medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) or on network, including some instructions are make it that a computing device (can
To be personal computer, server, mobile terminal or network equipment etc.) perform method according to embodiments of the present invention.
Detailed description more than, those skilled in the art are it can be readily appreciated that according to embodiments of the present invention is used for gold
Method, device and the electronic equipment for melting data sharing have one or more of the following advantages.
According to some embodiments, of the invention is used for the method that finance data is shared, by the way that finance data is carried out into chain code
The mode of deployment, using block chain decentralization, the characteristic of anti-tamper and distributed account book carries out data fidelity, once enter
It will be unable to be distorted privately by folk prescription after chain, ensure that the authenticity of asset securitization service provider bottom data.
According to other embodiments, of the invention is used for the method that finance data is shared, by the way that finance data is joined
The mode of alliance's chain chain code deployment, can be greatly reduced read-write cost and the time in strange land, can provide simpler, more efficient is total to
Know service, while inheriting the advantage of decentralization, mitigate monopolization pressure.
According to other embodiments, of the invention is used for the method that finance data is shared, will by Byzantine failure tolerance algorithm
Finance data carries out the mode of chain code deployment, enables to the shared method work of the finance data in asynchronous mode, and
Accelerate the processing speed of finance data.
The exemplary embodiment of the present invention is particularly shown and described above.It should be appreciated that the invention is not restricted to
Detailed construction described herein, set-up mode or implementation method;On the contrary, it is intended to cover included in appended claims
Various modifications and equivalence setting in spirit and scope.
In addition, structure, ratio, size shown by this specification Figure of description etc., only to coordinate specification institute
Disclosure, for skilled in the art realises that with reading, be not limited to the enforceable qualifications of the disclosure, therefore
Do not have technical essential meaning, the modification of any structure, the change of proportionate relationship or the adjustment of size are not influenceing the disclosure
Under the technique effect that can be generated and achieved purpose, it all should still fall and obtain and can cover in the technology contents disclosed in the disclosure
In the range of.Meanwhile, in this specification it is cited such as " on ", " first ", the term of " second " and " one ", be also only and be easy to
Narration understands, and is not used to limit the enforceable scope of the disclosure, and its relativeness is altered or modified, without substantive change
Under technology contents, when being also considered as enforceable category of the invention.