Search

CN-121543136-B - Financial certificate tamper-proof method and system based on blockchain

CN121543136BCN 121543136 BCN121543136 BCN 121543136BCN-121543136-B

Abstract

The invention discloses a financial certificate tamper-proof method and a system based on a blockchain, which relate to the technical field of blockchains, the method detects the complete flow of the comprehensive credibility assessment through credential acquisition, data standardization processing, path consistency verification and time consensus. The financial voucher generation node is specifically arranged around, voucher data can be collected in real time and transmitted to the blockchain system through TLS1.3 protocol encryption, so that real-time uplink and structured transmission of the voucher data are realized, and the data synchronization efficiency between voucher generation and uplink is remarkably improved. By establishing the distributed node database and the associated tracking calculation unit, the credential information has verifiability and tamper resistance in the whole process of acquisition, transmission, verification and comparison, and the problems of data counterfeiting, loss and node counterfeiting possibly occurring in the credential transmission process in the traditional financial system are effectively avoided.

Inventors

  • Tao qinghua
  • WU YUFENG
  • ZHANG SHUANG

Assignees

  • 江苏航运职业技术学院

Dates

Publication Date
20260508
Application Date
20260121

Claims (7)

  1. 1. A financial certificate tamper-proof method based on a blockchain is characterized by comprising the following steps: S1, setting a voucher acquisition point around a financial voucher generation node, acquiring voucher data in real time, transmitting the voucher data to a blockchain system, and preprocessing the voucher data to obtain a standard voucher data set; S2, carrying out credential association consistency analysis based on a standard credential data set, and carrying out preliminary judgment on the continuous credibility of the credential association path based on a credential association consistency analysis result; The S2 comprises S21; S21, carrying out credential association consistency analysis by adopting an improved structure of a Merkle path matching algorithm based on a standardized credential data set, and outputting a credential association consistency coefficient Cassoc, wherein the credential association consistency analysis comprises a path construction stage, a node hash calculation stage and a path integration stage; the path construction stage establishes a hierarchical credential association tree structure according to the credential number Vid and the upstream credential number Pid; the node hash calculation stage generates a path matching function value by carrying out hash comparison on each pair of adjacent credential nodes; The path integration stage outputs a credential association consistency coefficient Cassoc by counting the number of successfully matched nodes in the whole credential chain; The credential correlation consistency coefficient Cassoc is calculated and output through the following algorithm formula; ; Wherein N represents the number of nodes in the credential chain, vid i represents the credential number of the ith financial credential in the blockchain system, pid i represents the upstream credential number of the ith financial credential in the blockchain system, vid i+1 represents the credential number of the (i+1) th financial credential in the blockchain system, pid i+1 represents the upstream credential number of the (i+1) th financial credential in the blockchain system, hash represents a Hash mapping function, match represents a Hash matching function, and credential association consistency coefficient Cassoc outputs that the result belongs to [0,1]; s3, when the continuous credibility of the credential association path is initially judged to be abnormal, automatically triggering time consensus detection, extracting a time feature vector and carrying out dynamic conflict consistency analysis; The S3 comprises S31; S31, after preliminary judgment triggering time consensus detection, setting a dynamic time consensus window delta T in a block chain system, wherein the dynamic time consensus window delta T is generated in a dynamic self-adaptive manner by the sum of average consensus delay and 2 times of delay standard deviation based on a historical block chain system; In a dynamic time consensus window delta T, synchronously acquiring time parameters from two time acquisition points by a block chain system; the time acquisition points comprise a first time acquisition point and a second time acquisition point; The time parameters comprise a credential generation time T1 and a block confirmation time T3; The step S3 further comprises the step S32; s31, carrying out dynamic conflict consistency analysis based on time parameters, and outputting a dynamic conflict consistency coefficient Cconf, wherein the dynamic conflict consistency coefficient Cconf is calculated and output through the following algorithm formula; ; Wherein M represents the number of detected certificates in a dynamic time consensus window Deltat, uT represents average consensus delay, pT represents delay standard deviation, T3 i represents block confirmation time of an ith financial certificate in a blockchain system, T1 i represents certificate generation time of the ith financial certificate in the blockchain system, S4, comprehensively analyzing a dynamic conflict consistency analysis result and a certificate association consistency analysis result, comprehensively evaluating reliability based on the comprehensive analysis result, and executing corresponding treatment based on the reliability comprehensive evaluation result.
  2. 2. The method for tamper resistance of blockchain-based financial credentials of claim 1, wherein S1 comprises S11; S11, setting a voucher acquisition point around a financial voucher generation node, setting an acquisition tool in the acquisition point, and acquiring voucher data in real time, packaging the voucher data into a data block structure after acquisition, and encrypting and transmitting the data block structure to a blockchain system through a secure transmission protocol TLS 1.3; The acquisition point comprises a certificate identification node, a time node, a signature node and an amount node; The credential data includes a credential number Vid, an upstream credential number Pid, a credential amount Am, and a generation time Ts.
  3. 3. The method for tamper resistance of blockchain-based financial credentials of claim 2, wherein S1 further comprises S12; S12, carrying out unpacking treatment on the data block structure of the credential data package to extract the credential data, and carrying out pretreatment on the credential data to obtain a standardized credential data set, wherein the pretreatment comprises verification treatment, data cleaning and dimensionless treatment; The verification process verifies the validity of the identity of the credential generating node according to the node signature NodeSig, detects the repetition and conflict between the credential number Vid and the upstream credential number Pid, calls the credential correction logic when the repeated credential number is detected, and carries out the number regeneration operation on the credential with the repeated number to form the unique credential number Vid; the data cleaning is carried out by carrying out standardized processing on the voucher amount Am, including unified conversion of currency, correction of tax rate and decimal accuracy adjustment, forming a standard amount field AmStd; The dimensionless processing is carried out on the credential data after the data cleaning and checking processing by adopting a range normalization method, so that the unit dimension difference between the credential data is eliminated; And summarizing all the data after dimensionless processing to generate a standardized credential data set.
  4. 4. The method for tamper resistance of blockchain-based financial credentials of claim 1, wherein S2 further comprises S22; S21, based on the output result of the credential association consistency coefficient Cassoc and a preset consistency threshold Th1, preliminary judgment is carried out, and the continuous credibility of the credential association path is judged, wherein the specific judgment content is as follows: when the consistency coefficient Cassoc of the certificate association is more than or equal to the consistency threshold Th1, judging that the certificate association path is continuously trusted, and archiving the current certificate chain into a trusted chain; When the consistency coefficient Cassoc of the certificate association is smaller than the consistency threshold Th1, the continuous credibility is judged to be abnormal, and the time consensus detection is automatically triggered.
  5. 5. The blockchain-based financial credential tamper-proofing method of claim 1, wherein S4 comprises S41; S41, carrying out dynamic conflict consistency analysis and credential association consistency analysis, and carrying out comprehensive analysis on the output dynamic conflict consistency coefficient Cconf and the credential association consistency coefficient Cassoc, wherein the comprehensive analysis calculates and outputs a comprehensive credibility assessment index Sfinal through the mean value of the dynamic conflict consistency coefficient Cconf and the credential association consistency coefficient Cassoc.
  6. 6. The method for tamper-proofing a blockchain-based financial credential of claim 5, wherein S4 further comprises S42; s42, performing reliability comprehensive assessment based on comprehensive reliability assessment indexes Sfinal output by comprehensive analysis, and executing corresponding treatment based on reliability comprehensive assessment results, wherein the specific assessment contents are as follows: When the comprehensive credibility evaluation index Sfinal is more than or equal to 0.9, judging that the voucher family spectrum chain is completely credible, and allowing uplink confirmation; when the comprehensive credibility evaluation index Sfinal is smaller than or equal to 0.7 and smaller than 0.9, judging that the credential chain has moderate risk, and transferring the credential chain into a manual review buffer area for secondary verification; when the integrated reliability evaluation index Sfinal is less than 0.7, the abnormal credential chain is judged, and a freezing and alarming mechanism is triggered.
  7. 7. The blockchain-based financial certificate tamper-proof system is applied to the blockchain-based financial certificate tamper-proof method as set forth in any one of claims 1-6, and is characterized by comprising a certificate acquisition module, a consistency analysis module, a dynamic conflict analysis module and a comprehensive analysis module; the voucher collection module is used for collecting voucher data in real time by arranging voucher collection points around the financial voucher generation node, transmitting the voucher data to the blockchain system, and preprocessing the voucher data to obtain a standard voucher data set; The consistency analysis module performs consistency analysis of the certificate association based on a standard certificate data set, and performs preliminary judgment on the continuous credibility of the certificate association path based on a result of the consistency analysis of the certificate association; the dynamic conflict analysis module automatically triggers time consensus detection when the continuous credibility of the credential association path is initially judged to be abnormal, extracts a time feature vector and performs dynamic conflict consistency analysis; The comprehensive analysis module performs comprehensive analysis on the dynamic conflict consistency analysis result and the certificate association consistency analysis result, performs reliability comprehensive assessment based on the comprehensive analysis result, and performs corresponding treatment based on the reliability comprehensive assessment result.

Description

Financial certificate tamper-proof method and system based on blockchain Technical Field The invention relates to the technical field of blockchains, in particular to a financial certificate tamper-proof method and system based on a blockchain. Background With the rapid development of blockchain technology, digital financial management and intelligent audit systems, the problems of data security and credibility and tamper resistance of financial certificates gradually become important technical directions of enterprise internal control and compliance audit, and electronic financial certificates, such as electronic bills of invoices, contracts, payment certificates, reimbursement sheets and the like, generated, transferred and archived in enterprise or institution financial systems are oriented. In the existing financial voucher management system at present, although some enterprises already adopt blockchains to carry out voucher uplink and evidence storage, the existing scheme only realizes hash tamper resistance of 'single voucher level', and lacks a structured association management and verifiable tracking mechanism between vouchers. The evidence-storing mode can not describe the upstream and downstream relation of the evidence in the business flow, so that the correspondence between the source evidence and the sub-evidence in the financial evidence chain is lost, and an audit department needs to rely on an offline system or manual comparison when tracing the flow direction of funds or the evidence source, so that the efficiency is low and the error is easy to occur. In addition, the traditional scheme does not establish a logic path matching mechanism between the certificates, and when the certificates are tampered, forged or reused in the transmission or splitting process, the blockchain system cannot automatically identify the broken paths or the repeated certificates, so that the overall continuous credibility of the certificate chain cannot be quantitatively evaluated. Such defects lead to significant reduction in anti-counterfeiting and tamper-proofing capabilities of the system in the face of complex business scenarios such as fund flows, multi-stage reimbursement, subcontracting settlement and the like. The main reason for the above problem is that the blockchain certification system in the prior art lacks a hierarchical model and a timing verification mechanism of the credential association structure. The data uplink process is usually mainly based on single-node writing, and the parent-child relation mapping of the 'family tree' between the certificates is lacked, so that the certificate tracing path presents fragmentation. Further, since the blockchain system only records the transaction packaging time in the time dimension, and does not model the time characteristics of the whole process of credential generation, broadcasting and confirmation, when a plurality of nodes submit credentials concurrently in a short time, the system is difficult to distinguish normal synchronous delay from malicious repeated submission. Disclosure of Invention Aiming at the defects of the prior art, the invention provides a financial certificate tamper-proof method and a financial certificate tamper-proof system based on a block chain, which solve the problems in the background art. In order to achieve the above purpose, the invention is realized by the following technical scheme that the method comprises the following steps: S1, setting a voucher acquisition point around a financial voucher generation node, acquiring voucher data in real time, transmitting the voucher data to a blockchain system, and preprocessing the voucher data to obtain a standard voucher data set; S2, carrying out credential association consistency analysis based on a standard credential data set, and carrying out preliminary judgment on the continuous credibility of the credential association path based on a credential association consistency analysis result; s3, when the continuous credibility of the credential association path is initially judged to be abnormal, automatically triggering time consensus detection, extracting a time feature vector and carrying out dynamic conflict consistency analysis; S4, comprehensively analyzing the dynamic conflict consistency analysis result and the certificate association consistency analysis result, carrying out reliability comprehensive assessment based on the comprehensive analysis result, and executing corresponding treatment based on the reliability comprehensive assessment result. Preferably, the S1 includes S11; S11, setting a voucher acquisition point around a financial voucher generation node, setting an acquisition tool in the acquisition point, and acquiring voucher data in real time, packaging the voucher data into a data block structure after acquisition, and encrypting and transmitting the data block structure to a blockchain system through a secure transmission protocol TLS 1.3; The acqui