Disclosure of Invention
In order to solve the problems in the prior art, the invention aims to provide a complaint evidence-storing system based on a blockchain technology and an operation method, and aims to solve the problems of difficulty in evidence obtaining of a complaint scene, forging of transaction information and data safety.
A block chain technology based forensic evidence-preserving system comprising: an application access layer, a business logic layer, an intelligent contract layer and a blockchain storage layer; the application access layer, namely the SDK, is used as a middleware for the interaction of upper-layer application and the blockchain, and the main functions comprise basic identity authentication, data encryption and decryption and basic authority verification; the service logic layer functions include: uploading a storage certificate, downloading the storage certificate, comparing hash, managing authority and managing operation and maintenance; the intelligent contract layer is mainly responsible for storing the data processing result of the logic layer to the blockchain storage layer.
Preferably, in the application access layer, after the SDK obtains the certificate data request submitted by the service system, the SDK sends request information to the blockchain node to which the mechanism belongs, and returns to the uplink result after waiting for successful uplink of all the blockchain nodes; the service system can inquire the data on the blockchain node through the SDK to be stored locally, and can also share the acquired certification data to a third party organization for notarization.
Preferably, the certificate uploading includes: providing a general evidence-storing data uploading api, wherein the evidence-storing data comprises an original financial data source file and a corresponding Hash value, and the original financial data source file comprises: contract documents, business notes, transaction records, financial assets, mortgage assets;
the certificate downloading comprises the following steps: providing general evidence-storing data inquiry and downloading api;
the hash comparison includes: the method has the advantages that the Hash value comparison of the local source file and the target file on the blockchain is realized, the file authenticity and the non-tamper-evident general method are verified, and file change records at any time point from the start of file generation to the current time can be tracked;
the rights management includes: the authority design is based on a conventional role-based access control strategy, different users have different roles, and the roles have different authorities, so that the control of data read-write of various sensitive levels can be even accurate; the certification system role design comprises a daily operation role, a transaction role, a developer role, an operation and maintenance manager role and a supervisor role; the manager supports dynamically increasing authority control points according to the use scene of the participants through managing terminal authority-giving role authorities including contract deployment, contract modification, intra-contract data access, full-system parameter access and modification, capacity expansion of block chain nodes and data query;
the operation and maintenance management comprises: the system provides a virtual machine monitoring operation and maintenance API, including modifying system configuration, controlling application start and stop, checking logs, node capacity expansion, and various indexes including CPU (Central processing Unit) duty ratio, memory use duty ratio, disk IO (input/output), disk use, network connection number and flow in the running process; the unified block node monitoring API is provided, and comprises block height in a block chain node, transaction amount, block out voting condition of a consensus node, contract calling counting, contract calling time consuming condition and contract calling success rate.
Preferably, the intelligent contract layer is deployed on a blockchain bottom layer platform, and provides a universal contract method for a business logic layer, and the functions of the intelligent contract layer include: authentication contracts, data verification contracts, data upload contracts, data download contracts.
Preferably, the blockchain storage layer is a distributed database that is de-centralized throughout the forensic system, wherein each blockchain node has independent computing, sharing, and synchronous transaction mechanism capabilities.
Preferably, the method includes submitting and querying legal evidence data, and the submitting step includes:
s1: the application system complains about the certification system through an SDK access method;
s2: the block chain node receives the transaction data of the sender and performs verification judgment, and if the verification is qualified, the transaction data is broadcasted to consensus nodes of other block chains;
s3: the consensus node verifies and executes the received transaction data and sends the execution result to other consensus nodes;
s4: and after all the consensus nodes finally agree on the execution results of the transaction blocks, the consensus nodes execute the block-out operation.
Preferably, the S1 includes: verifying a file format through a standard tool class provided by the SDK, respectively calling a certificate storage data uploading api according to a file service type, uploading a source file to a block chain node to which an organization belongs, acquiring a serial number returned after successful uploading, and synchronously uploading a Hash value of the source file, and locally storing the serial number and the Hash; each time the sending application provides a private key to the SDK to sign the transaction to verify that the data is a legitimate sender.
Preferably, the S2 includes: the method comprises the steps that firstly, the validity of a transaction is verified in a transaction signature verification mode, and if the transaction is illegal, the transaction is directly discarded; secondly, checking whether the transaction is repeated, if not, adding the transaction into a node transaction cache pool, otherwise, directly discarding the transaction; third, the transaction is broadcast to other blockchain consensus nodes known to that node.
Preferably, the block-out operation in S4 includes: and broadcasting respective execution results among the block chain nodes, wherein more than 2/3 of the nodes have the same execution results in the voting process, which indicates that the consensus nodes reach consensus, the consensus nodes form blocks, and the transaction confirmation is successful.
Preferably, the querying step includes: when the application system needs to download or inquire the evidence-storing data, the flow number locally stored by S1 is used as an inquiry parameter, and an inquiry API is used for acquiring the evidence-storing source file and a corresponding Hash value from a block chain point; and (3) comparing the Hash value of the source file with the Hash value obtained by the query on the chain, and determining the authenticity and accuracy of the evidence-stored data. The beneficial effects of the invention include:
the invention autonomously realizes a legal complaint evidence-storing system based on a alliance chain technology, which comprises evidence-storing data uploading, evidence-storing data downloading or inquiring and evidence-storing data Hash value checking service. Through the self-developed SDK access terminal, a user accesses the certification system at low cost, and the participating members can share various data on the alliance chain only by opening the access rights.
The invention stores the legal evidence-storing data on the blockchain by using the blockchain technology, and compared with the traditional notarization evidence-storing and third party evidence-storing modes, the invention has the characteristics of tamper resistance, damage resistance, loss resistance and the like, and fully solves the problems of difficult evidence obtaining of legal scenes, transaction information counterfeiting and data security.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are only some embodiments of the present application, but not all embodiments. Thus, the following detailed description of the embodiments of the present application, as provided in the accompanying drawings, is not intended to limit the scope of the application, as claimed, but is merely representative of selected embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, are intended to be within the scope of the present application.
Example 1
Specific embodiments of the present invention will be described in detail below with reference to fig. 1-4;
a block chain technology-based complaint certification system in this embodiment is specifically:
1. participant(s)
The method is characterized in that a system construction party of the legal evidence storage system is constructed by a new network bank and a Chengdu prime number Stokes science and technology limited company, wherein the new network bank is responsible for landing a service scene, realizing upper-layer service of the evidence storage system, completing network construction of six blockchain nodes and constructing a server, and the main service scene comprises: securitization of assets, supply chain finance, etc., the Chengdu Stokes technology Co., ltd, provides the financial blockchain underlying platform, the client SDK, and technical support in the use of the system.
The legal prosecution certification system user is shown in fig. 1, and comprises: the system comprises a new network bank, yunnan letter, a famous mountain court, a third party evidence-storing institution and the like, wherein the uplink data of the new network bank comprises original financial data such as contract files, business bills, transaction records and the like, the uplink data of the Yunnan letter comprises asset data such as financial assets, mortgage assets and the like, the famous mountain court is a query party of the online data, and the uplink data of the third party evidence-storing institution comprises identity information, logistics information, an article list, notary files, ticket splitting transfer data and the like.
The main work responsibility of the supervisory mechanism roles in the legal prosecution evidence-depositing system is to ensure the correctness of the data flow direction on the chain, the compliance of various operation behaviors of the user and the like
2. Physical deployment map
As shown in fig. 2, the blockchain method complains about a networking mode of deploying 5 mechanisms 1 group 6 nodes by the system design, in order to facilitate the integration and convenient use of the participant system, the design of the alliance chain is built on public cloud, wherein the classification of the blockchain nodes is as shown in table 1:
TABLE 1 blockchain node assignment
| Sequence number | MechanismName of the name | Blockchain node number | Remarks |
| 1 | New network bank | 2 | New network bank deployment by adopting double nodes |
| 2 | Mingshan court | 1 | |
| 3 | Yunnan letter | 1 | |
| 4 | Third party certificate deposit organization | 1 | |
| 5 | Supervision mechanism | 1 | |
3. Application architecture
Based on the actual application scene, the design adopts a client/server (C/S) architecture, as shown in FIG. 3, and the design comprises 4 layers from top to bottom in sequence: an application access layer, a business logic layer, an intelligent contract layer and a blockchain storage layer.
(1) And the application access layer is used for accessing the service system to the whole system through the SDK provided by the block chain complaint and storage system. The blockchain SDK is used as a middleware for the interaction of an upper layer application and the blockchain, and the main functions comprise basic identity authentication, data encryption, decryption and basic authority verification. After the SDK acquires the certification data request submitted by the service system, the SDK sends request information to the block chain nodes of the mechanism, and returns to the uplink result after waiting for successful uplink of all the block chain nodes. The service system can inquire the data on the blockchain node through the SDK to be stored locally, and can also share the acquired certification data to a third party organization for notarization.
(2) Business logic layer: the method mainly comprises the functions of certificate uploading, certificate downloading, hash comparison, authority management and operation and maintenance management.
Uploading the certificate: providing general evidence-preserving data uploading api, wherein the evidence-preserving data comprises but is not limited to: raw financial data source files such as contract files, business documents, transaction records, financial assets, mortgage assets and the like, and corresponding Hash values.
And (5) downloading the certificate: providing a universal forensic data query and download api, the query and download forensic data including, but not limited to: raw financial data source files such as contract files, business documents, transaction records, financial assets, mortgage assets and the like, and corresponding Hash values.
Hash comparison: the method for comparing the Hash value of the target file on the local source file and the Hash value of the target file on the blockchain, verifying the authenticity and the non-tamper property of the file, and tracking the file change record at any time point from the start of file generation to the current time.
Rights management: the authority design is based on a conventional role-based access control strategy, different users have different roles, and the roles have different authorities, so that the control of data read-write of various sensitive levels can be even accurate. The certification system role is designed into a daily operation role, a transaction role, a developer role, an operation and maintenance manager role, a supervisor role and the like. The manager supports dynamically increasing authority control points according to the use scenes of the participants through different authorities such as contract deployment, contract modification, intra-contract data access, full-system parameter access and modification, expansion of block chain nodes, data query and the like.
And (3) operation and maintenance management: the system provides a virtual machine monitoring operation and maintenance API (application program interface) and comprises general methods of modifying system configuration, controlling application start and stop, checking logs, expanding capacity of nodes and the like, and various indexes in the running process, such as CPU (Central processing Unit) duty ratio, memory use duty ratio, disk IO (input output), disk use, network connection number and flow. And providing a unified block node monitoring API, wherein the method comprises the methods of block height in a block chain node, transaction amount, block out voting condition of a consensus node, contract call counting, contract call time consuming condition, contract call success rate and the like.
(3) Intelligent contract layer: the universal contract method is provided for the business logic layer to use on the deployment block chain bottom layer platform, which comprises the following steps: the intelligent contract layer is mainly responsible for storing the data processing results of the logic layer into the blockchain storage layer.
(4) A blockchain storage layer: is a distributed database with the whole legal evidence storage system decentralised, wherein each blockchain node has independent computing, sharing and synchronous transaction mechanism capabilities.
4. Operation method of legal complaint storage system based on block chain technology
The method specifically comprises the steps of submitting and inquiring legal evidence data, and as shown in fig. 4, the method mainly comprises 5 steps:
(1) The application system complains about the certification system through an SDK access method. And verifying the file format by using a standard tool class provided by the SDK, respectively calling the certificate storage data uploading api according to the file service type, uploading the source file to a block chain node to which an organization belongs, acquiring a serial number returned after successful uploading, and synchronously uploading the Hash value of the source file, and storing the serial number and the Hash locally. Each time the sending application provides a private key to the SDK to sign the transaction to verify that the data is a legitimate sender.
(2) After the block link point receives the transaction data of the sender, in the first step, the validity of a transaction is verified in a mode of verifying a transaction signature, and if the transaction is illegal, the transaction is directly discarded; secondly, checking whether the transaction is repeated, if not, adding the transaction into a node transaction cache pool, otherwise, directly discarding the transaction; third, the transaction is broadcast to other blockchain consensus nodes known to that node.
(3) After receiving the block, the consensus node also verifies the transaction, and after the verification is successful, the block verifier is called to take the transaction out of the block one by one for execution, and if the execution is successful, the result and the state of the transaction execution are written into the transaction return license and returned to the sender, and meanwhile, the transaction return license is sent to other consensus nodes.
(4) And after all the consensus nodes finally agree on the execution results of the transaction blocks, the consensus nodes execute the block-out operation. The concrete flow of the block is as follows: after each node executes the step 3 logic processing, the execution results of the nodes are broadcasted, more than 2/3 of the nodes are counted to be the same in the voting process, the fact that the consensus nodes reach consensus is indicated, the consensus nodes output blocks, and the transaction confirmation is successful.
(5) When the application system needs to download or inquire the evidence-storing data, the evidence-storing source file and the corresponding Hash value can be obtained from the block chain link point by using the inquiry API through taking the locally stored serial number of step 1 as the inquiry parameter. And (3) comparing the Hash value of the source file with the Hash value obtained by the query on the chain, and determining the authenticity and accuracy of the evidence-stored data.
Compared with the prior art, the block chain bottom layer platform provided by the invention is realized by Chengdu Prime Stokes technology limited company and has complete independent intellectual property rights; based on the platform, the new network bank self-researches intelligent contracts such as intelligent contracts for legal evidence storage special purpose SDK client, alliance chain identity authentication, and intelligent contracts such as uploading, downloading, verifying, comparing and hash computing of legal evidence storage metadata, and performs personalized custom development on legal evidence scenes, and participants access the intelligent contracts through the SDK at low cost, so that application of actual legal evidence scenes is met, user requirements are met, and user participation is more convenient.
The foregoing examples merely represent specific embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that, for those skilled in the art, several variations and modifications can be made without departing from the technical solution of the present application, which fall within the protection scope of the present application.