Disclosure of Invention
In view of at least one aspect of the above-described problems, some embodiments of the present disclosure provide a blockchain-based file management method, apparatus, electronic device, and computer-readable storage medium.
According to an aspect of the embodiments of the present disclosure, there is provided a blockchain-based file management method applied to a blockchain network node, the file including a specification of a financial product, wherein the blockchain-based file management method includes the steps of:
acquiring an update request, wherein the update request comprises product information of a financial product and update contents of the instruction;
querying product information of the financial product in response to the update request to determine an update type, wherein the update type comprises new construction and modification;
According to the update request, a check intelligent contract is called to check the specification of the financial product, wherein the check intelligent contract at least comprises a check rule for checking the specification of the financial product, and
And when the verification is passed, updating the specification of the financial product according to the updating type, the product information of the financial product and the updating content of the specification, and storing the updating result on the blockchain.
According to some exemplary embodiments, the verification intelligent contract includes at least one of a specification template corresponding to the product information, user-defined verification rules, intelligently generated verification rules, and verification rules extracted from a financial regulatory document.
According to some exemplary embodiments, the verifying the smart contract includes a description template corresponding to the product information, wherein the invoking the verifying the smart contract includes verifying the content of the fixed format portion of the description of the financial product according to the description template.
According to some exemplary embodiments, the check smart contract includes a set of product parameter check rules including a plurality of product parameters of the financial product and a plurality of check values, the plurality of parameters corresponding to the plurality of check values, respectively.
According to some exemplary embodiments, the invoking the check smart contract, the checking the specification of the financial product includes extracting a plurality of product parameters and a plurality of product parameter values in the specification, and comparing the plurality of product parameter values with the plurality of check values, respectively.
According to some exemplary embodiments, the check intelligence contract includes a set of user-defined check rules, and the blockchain-based file management method further includes user-defining a set of product parameters to be checked and check values of the product parameters according to product information included in the update request.
According to some exemplary embodiments, the check intelligence contract includes a set of intelligently generated check rules, and the blockchain-based file management method further includes determining similar financial products according to product information included in the update request, wherein the similar financial products have a specified first similarity with financial products included in the update request, extracting the check rules of specifications of the similar financial products, and generating the check rules of specifications of financial products to be checked according to the check rules of the specifications of the similar financial products.
According to some exemplary embodiments, the verification intelligent contract comprises a verification rule extracted according to a financial supervision file, and the blockchain-based file management method further comprises the steps of obtaining the financial supervision file, extracting supervision information related to product information included in the update request in the financial supervision file, and generating a verification rule of a specification of a financial product to be verified according to the supervision information.
According to some exemplary embodiments, the update request includes a product code, a parameter value, an instruction template code, an update content of an instruction, and a time stamp.
According to some exemplary embodiments, the blockchain querying the product information of the financial product in response to the update request to determine an update type includes determining that the update type is a description of a modified financial product when the product information included in the update request is queried in the blockchain, and determining that the update type is a description of a newly created financial product when the product information included in the update request is not queried in the blockchain.
According to some exemplary embodiments, verifying the content of the fixed-format portion of the specification of the financial product according to the specification template includes extracting keywords of the specification and corresponding portions of the specification template, respectively, through a neural network model, and calculating a second similarity between the keywords in the specification and the keywords in the specification template to verify the content of the fixed-format portion of the specification of the financial product.
According to some exemplary embodiments, the extracting the keywords of the corresponding parts in the specification and the specification template through the neural network model includes extracting a plurality of sentences from the fixed format part of the specification of the financial product and the specification template, respectively, inputting the extracted sentences into the bi-directional cyclic neural network model, outputting the probability of occurrence of the word by the bi-directional cyclic neural network model, and determining the word as the keyword when the probability of occurrence of the word is greater than a preset value.
According to some exemplary embodiments, the second similarity is a cosine similarity.
According to some exemplary embodiments, the blockchain-based file management method further includes updating the specification template.
According to some exemplary embodiments, the updating the specification template includes obtaining a specification template update request, validating the specification template update request to determine that the specification template update request is sent by an authorized financial institution, and invoking a specification template intelligence contract in response to the specification template update request to update a specified specification template and store the update result on the blockchain.
According to some exemplary embodiments, the blockchain-based file management method further includes updating user-defined verification rules.
According to some exemplary embodiments, the updating the user-defined verification rules includes obtaining a verification rule update request, validating the verification rule update request to determine that the verification rule update request is sent by an authorized financial institution, and invoking a verification rule smart contract in response to the verification rule update request to update the specified user-defined verification rule and storing the update result on the blockchain.
According to some exemplary embodiments, the determining similar financial products according to the product information included in the update request includes searching a set of similar financial products according to the product parameters in the update request using a clustering algorithm, wherein the set of similar financial products includes a plurality of preliminary similar financial products, calculating a third similarity between the product parameters of each preliminary similar financial product and the product parameters in the update request, and determining preliminary similar financial products having the third similarity within a specified range as similar financial products.
According to some exemplary embodiments, the verification rule of the specification of the financial product to be verified according to the verification rule of the specification of the similar financial product comprises the steps of extracting parameters and parameter values included in the verification rule of the similar financial product, predicting the parameters and the parameter values of the financial product to be verified by using a machine learning algorithm based on the extracted parameters and the parameter values of the similar financial product, and determining the predicted parameters and the parameter values as at least one part of the verification rule of the specification of the financial product to be verified.
According to some exemplary embodiments, the verification rule of the specification of the financial product to be verified according to the supervision information comprises word segmentation processing is conducted on text corresponding to the supervision information to obtain word sequences, the word sequences are converted into word vectors, the word vectors are used as input, a convolutional neural network is used for calculating fourth similarity between the supervision information and product information of the verification rule, supervision information with the fourth similarity within a specified range is screened out, and the verification rule is updated by the screened supervision information.
According to some exemplary embodiments, the blockchain-based file management method further includes validating the update request to determine that the update request is sent by an authorized financial institution.
According to some exemplary embodiments, the blockchain-based file management method further includes feeding back a reason for the failed verification when the verification fails.
According to some exemplary embodiments, the blockchain-based file management method further includes, when the verification fails, transferring the update request stream to a secondary verification link, wherein the secondary verification link is a manual audit link.
According to some exemplary embodiments, the blockchain-based file management method further includes invoking the smart contract to update the specification of the financial product and storing the update result on the blockchain when a secondary verification link passes.
According to another aspect of the embodiment of the present disclosure, there is provided a blockchain-based file management method applied to a financial institution node, the file including a specification of a financial product, wherein the blockchain-based file management method includes the steps of transmitting an update request to the blockchain, wherein the update request includes product information of the financial product and update contents of the specification, and receiving an update result when the contents of the update request are verified, wherein the update result is used to indicate that the specification update of the financial product is successful.
According to some exemplary embodiments, the blockchain-based file management method further includes sending at least one of a specification template update request and a verification rule update request to the blockchain.
According to yet another aspect of embodiments of the present disclosure, there is provided a blockchain-based file management device for use on a blockchain network node, the file including a description of a financial product, wherein the blockchain-based file management device includes:
an update request acquisition module, wherein the update request comprises product information of a financial product and update content of the instruction;
the updating type determining module is used for responding to the updating request and inquiring the product information of the financial product to determine the updating type, wherein the updating type comprises new construction and modification;
A verification module for calling a verification intelligent contract to verify the specification of the financial product according to the update request, and
And the file updating module is used for updating the specifications of the financial products according to the updating type, the product information of the financial products and the updating content of the specifications when the verification is passed, and storing the updating result on the blockchain.
According to yet another aspect of the disclosed embodiments, there is provided an electronic device including one or more processors, and a storage device for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the blockchain-based file management method described above.
According to yet another aspect of embodiments of the present disclosure, there is provided a computer-readable storage medium having stored thereon executable instructions that, when executed by a processor, cause the processor to perform the above-described blockchain-based file management method.
According to yet another aspect of embodiments of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the blockchain-based file management method described above.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
In this context, the expression "financial product" may denote a banking product as defined in the banking product description Specification (GB/T32319-2015), which may be a financial service offered to the marketplace for a financial institution such as a bank to meet a customer's needs and to enable the customer to obtain certainty or possibly benefit.
Herein, the expression "specification of a financial product" means a document of a financial product description provided to a banking customer. For example, a "description of a financial product" typically includes due information, beneficial information, and available information. Where the due information is the content that each financial product should describe, if the due information is incompletely described and unclear, it will lead to that the customer cannot understand the financial product correctly. The information is descriptive of each financial product, and the information enables the customer to build a complete, clear and accurate knowledge of the financial product. The available information is a belief that the issuer of the financial product believes that there is a need to indicate to the customer that there is no mention in the due and due information.
In this context, the specification template of the financial product may include fixed content and fixed format, for example, may include several parts of risk prompt, product element, investment range, product operation instruction, product income instruction, information disclosure, etc., wherein the content of the product element, etc. may be changed according to the value of the product parameter, and the content of the parameter hook is stored in the specification as a variable.
Embodiments of the present disclosure provide a blockchain-based file management method, apparatus, electronic device, and computer-readable storage medium. For example, the blockchain-based file management method is applied to a blockchain network node, the file comprises a specification of a financial product, the blockchain-based file management method comprises the steps of obtaining an update request, responding to the update request, inquiring the product information of the financial product to determine an update type, wherein the update type comprises new construction and modification, calling a check intelligent contract according to the update request, checking the specification of the financial product, wherein the check intelligent contract at least comprises a check rule for checking the specification of the financial product, and updating the specification of the financial product according to the update type, the product information of the financial product and the update content of the specification when the check passes, and storing an update result on the blockchain. In the embodiment of the disclosure, by combining the characteristics of tamper-proof and retrospective of the blockchain technology and the like, dynamic iteration update information of files such as specifications of financial products and the like is stored on the blockchain in an intelligent contract manner, and file contents are checked to realize real-time sharing of data, ensure accurate file contents, ensure tamper-proof files and facilitate improvement of file security.
Specifically, blockchains are a new set of application technologies for computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. From a data perspective, a blockchain combines data blocks in a sequential manner in time order into a chained data structure that is cryptographically secured against tampering and counterfeiting. From a technical perspective, blockchain technology integrates a number of different technologies by building a blockchain network such that each node in the blockchain network obtains a complete database copy and maintains updates to the blockchain-based database based on consensus mechanisms and competing computations. Therefore, the data storage and management are decentralised and the signaling is removed through an end-to-end network formed by communication of a plurality of nodes. In the embodiment of the disclosure, based on the above characteristics of the blockchain technology, dynamic iteration update information of files such as specifications of financial products and the like can be stored on the blockchain, and file contents are checked, so that real-time sharing of data is realized, the file contents are ensured to be accurate, meanwhile, the files are ensured to be untampered, and the improvement of the safety of the files is facilitated.
FIG. 1 is a schematic block diagram of a blockchain-based file management system in accordance with some exemplary embodiments of the present disclosure. Referring to fig. 1, from a hardware device perspective, the blockchain-based file management system may include a financial institution node device 11, a client node device 12, and a blockchain network 13, wherein the blockchain network 13 may include a plurality of blockchain network nodes 130 therein. Illustratively, a product management system is installed in the financial institution node facility 11, and a terminal sales system is installed in the customer node facility 12. The blockchain network node 130 stores therein an intelligent contract by which documents such as specifications of financial products are managed. For example, the number of the financial institution node devices 11 and the client node devices 12 may be one or more, and the financial institution node devices 11, the client node devices 12, and the blockchain network 13 may be connected to each other by communication through the network. For example, the financial institution node device 11 may include a PC computer or the like provided at the financial institution side, and the client node device 12 may include a mobile terminal, a PC computer, an intelligent terminal or the like provided at the client side. The network may include a wireless network (e.g., bluetooth, WIFI, etc.), a wired network, etc., which may be the internet or a local area network.
Fig. 2 is a flow diagram in a blockchain-based file management method that schematically illustrates execution of the file management method between a financial institution node device, a blockchain network, and a client node device, in accordance with some exemplary embodiments of the present disclosure. FIG. 3 is a flowchart of a blockchain-based file management method that schematically illustrates execution of the file management method on a blockchain network, in accordance with some exemplary embodiments of the present disclosure.
For example, referring to fig. 2, after the financial institution node device 11 updates the product specification template and the verification rule by interacting with the blockchain network 13, the financial institution node device 11 sends a product information update request to the blockchain network 13, and the node 130 in the blockchain network 13 invokes the information query module to confirm the update type, invokes the intelligent contract to verify the content of the product specification, and performs consensus on the product specification update result information and adds the same to the blockchain. The client node device 12 obtains and displays the updated product specification through interaction with the blockchain network 13.
According to some exemplary embodiments, a blockchain-based file management method is provided for use on a blockchain network node, the file including instructions for a financial product. Referring to fig. 2 and 3 in combination, the blockchain-based file management method 100 may include the following steps or operations.
In operation S310, an update request is acquired, wherein the update request includes product information of a financial product and update contents of the specification.
For example, the update request includes a product code, a parameter value, a specification template code, updated contents of the specification, and a time stamp.
In response to the update request, product information of the financial product is queried to determine an update type, wherein the update type includes new and modification, in operation S320.
For example, the blockchain querying the product information of the financial product in response to the update request to determine an update type includes determining that the update type is a description of modifying the financial product when the product information included in the update request is queried in the blockchain, and determining that the update type is a description of a newly created financial product when the product information included in the update request is not queried in the blockchain.
In operation S330, according to the update request, a verification smart contract is invoked to verify the specification of the financial product, where the verification smart contract includes at least a verification rule for verifying the specification of the financial product.
When the verification is passed, the specification of the financial product is updated according to the update type, the product information of the financial product, and the update content of the specification, and the update result is stored on the blockchain in operation S340.
FIG. 4 is a detailed flow diagram of a blockchain-based file management method that schematically illustrates execution of the file management method on a blockchain network, in accordance with some exemplary embodiments of the present disclosure. Referring to fig. 2,3 and 4 in combination, the blockchain-based file management method 100 may include the following steps or operations.
In operation S410, an update request is acquired. For example, the update request may come from a product management system on the financial institution node facility 11. The update request may include information to update a file, such as a financial product description. For example, the update request may include information of a newly added or modified product code, a parameter code and a parameter value, a product template, a product description template code, a product description, a modification time stamp, and the like.
It should be noted that, in the embodiment of the present disclosure, the number of the financial institution node apparatuses 11 may be one or more. Therefore, the product management system on each of the financial institution node apparatuses 11 may have different rights. In this case, the blockchain-based file management method 100 may further include validating the update request to determine that the update request is sent by an authorized financial institution. For example, upon receiving an update request from a product management system, the blockchain network node 130 needs to verify that the update request is an update request issued by a financial institution that is entitled to update. For example, the verification method may specifically be a public-private key signature verification method.
In response to the update request, product information of the financial product is queried to determine an update type, wherein the update type includes new and modification, in operation S420.
In operation S430, a verification smart contract is invoked to verify the specification of the financial product according to the update request, wherein the verification smart contract includes at least a verification rule for verifying the specification of the financial product.
For example, the check intelligence contract may be synchronized onto each blockchain network node 130. When the verification intelligent contract is executed, the product specification template and the verification rule corresponding to the product template information can be queried according to the product template information in the update request as an index, and then verification is performed.
For example, the check rules may include an internally sourced check rule and an externally sourced check rule. For another example, the verification rule of the internal source may include a specification template of the financial product set by the user, and may further include a verification rule customized by the user and a verification rule intelligently generated by the system. The externally sourced verification rules may include verification rules extracted for the latest regulatory body.
In operation S440, it is determined whether the specification checks pass.
When the blockchain network receives the verification pass instruction, the intelligent contract is invoked to update the parameters of the specified product and the content of the specification according to the update type of the update request, and the update result is added to the blockchain network in operation S450.
The intelligent contracts are synchronized to each block chain network node, if the update type is new, the new product intelligent contracts are called to write the product information and the description in the update request into the block chain network, if the update type is modification, the product information and the description in the update request are mapped with the product information and the description in the block chain network to obtain a mapping result, and the mapping result is written into the block chain network in a consensus way.
In operation S460, when the verification fails, a reason that the verification fails is returned, and/or the update request is transferred to a secondary verification link, where the secondary verification link is a manual verification link.
In operation S470, it is determined whether the audit of the secondary verification link is passed. When the verification of the secondary verification link is passed, returning to operation S450, calling the intelligent contract to update the parameters of the specified product and the content of the specification according to the update type of the update request, and adding the update result to the blockchain network.
In operation S480, when the audit of the secondary verification link fails, the reasons and audit results of the failed audit are returned.
Fig. 5 is a flowchart of a blockchain-based file management method, schematically illustrating execution of the file management method on a financial institution node device, in accordance with some exemplary embodiments of the present disclosure. Referring to fig. 2,3 and 5 in combination, the blockchain-based file management method 200 may include the following steps or operations.
In operation S510, an update request is transmitted to the blockchain network 130, wherein the update request includes product information of the financial product and update contents of the specification.
In operation S520, when the content of the update request is verified, an update result is received, wherein the update result is used to indicate that the instruction for the financial product is successfully updated.
According to some exemplary embodiments, the verification intelligent contract includes at least one of a specification template corresponding to the product information, user-defined verification rules, intelligently generated verification rules, and verification rules extracted from a financial regulatory document.
For example, the check intelligence contract includes a specification template corresponding to the product information. In this embodiment, the invoking the check intelligence contract to verify the description of the financial product includes verifying the contents of the fixed format portion of the description of the financial product according to the description template.
FIG. 6 is a flowchart of a blockchain-based file management method that schematically illustrates the steps of verifying using a specification template in the file management method, in accordance with some exemplary embodiments of the present disclosure.
Referring to FIG. 6, in some embodiments, the verifying the contents of the fixed format portion of the specification of the financial product according to the specification template includes the following operations.
In operation S610, keywords of the specification and corresponding parts in the specification template are extracted through a neural network model, respectively.
Fig. 7 is a flowchart of a keyword extraction step of a blockchain-based file management method according to some exemplary embodiments of the present disclosure.
Specifically, referring to fig. 6 and 7, the extracting keywords of the specification and corresponding parts in the specification template by the neural network model, respectively, may include the following operations.
In operation S6101, a plurality of sentences are extracted from the fixed format portion of the specification of the financial product and the specification template, respectively.
In operation S6102, the extracted plurality of sentences are input into the bidirectional recurrent neural network model.
In operation S6103, the bi-directional recurrent neural network model outputs the probability of occurrence of a word.
In operation S6104, when the probability of occurrence of the word is greater than a preset value, the word is determined to be a keyword.
For example, a two-way cyclic LSTM neural network model may be employed. The LSTM neural network model can overcome the long-sequence input problem and can better store history information. Since each target word is associated with context information, the context of the target word can be captured simultaneously using the two-way recurrent neural network. Calculating the probability of the keywords in each sentence of the specification template through the LSTM neural network model, wherein the keywords are the keywords of the sentence when the probability is larger than a preset value. Specifically, each group of vocabulary in an input sentence can be converted into word vectors by using a word2vec model, then the word vectors are spliced to be used as input of an LSTM neural network model, the output of the double-layer LSTM neural network model is integrated, finally the probability of keywords is output, and the keywords of the sentence are judged by a preset probability value.
In operation S620, a second similarity between the keywords in the specification and the keywords in the specification template is calculated to verify the content of the fixed format part of the specification of the financial product.
In some embodiments, the second similarity is a cosine similarity. For example, first, the keywords identified by the neural network model are converted into corresponding vector forms, cosine distances between the keyword vectors of the specification and the specification template are calculated, cosine values are close to 1, which indicates that the vectors are more similar, and cosine values are close to 0, which indicates that the vectors are less similar. And checking whether the specification and the specification template are matched through cosine similarity, so that the content of the fixed format part of the specification of the financial product is checked.
In some embodiments of the present disclosure, verification is performed according to a user-set specification template (i.e., a specification having a fixed text and a fixed format). The verification of the fixed format portion of the specification content is performed according to the specification template, for example, the context verification may be performed by using a neural network algorithm through keywords set in the specification template. Firstly, extracting keywords of each sentence in the specification and the specification template through a neural network model, and checking through calculating cosine similarity among the keywords.
In some embodiments of the present disclosure, the check smart contract includes a set of product parameter check rules including a plurality of product parameters of the financial product and a plurality of check values, the plurality of parameters corresponding to the plurality of check values, respectively.
For example, the invoking the check smart contract, the checking the specification of the financial product includes extracting a plurality of product parameters and a plurality of product parameter values in the specification, and comparing the plurality of product parameter values with the plurality of check values, respectively.
In some embodiments of the present disclosure, the verification intelligence contract includes a set of user-defined verification rules. In this embodiment, the blockchain-based file management method further includes the step of user-defining a group of product parameters to be verified and verification values of the product parameters according to product information included in the update request.
For example, the verification may be performed according to user-defined verification rules. For example, the user sets rules that in a product where the product specification template is "structural deposit class (person)", the parameter "customer risk level" must be PR1 and equal to the product risk rating. In this case, it is determined whether the product parameter "customer risk level" is equal to PR1. If the rule is not checked, the rule is checked to be passed, and if the rule is not checked to be passed, the rule is checked to be not passed.
In some embodiments of the present disclosure, the check intelligence contract includes a set of intelligently generated check rules. That is, similar financial products can be determined according to the financial products to be verified, and parameter verification rules of the same type of products can be intelligently generated, so that the system can comprehensively verify the specification text of the financial products.
FIG. 8 is a flowchart of a blockchain-based file management method that schematically illustrates steps in the file management method for verification using intelligently generated verification rules, in accordance with some exemplary embodiments of the present disclosure. Referring to fig. 8, the blockchain-based file management method may further include the following operations.
In operation S810, a similar financial product is determined according to product information included in the update request, wherein the similar financial product has a prescribed first similarity with the financial product included in the update request.
In operation S820, a verification rule of a specification of the similar financial product is extracted.
In operation S830, a verification rule of the specification of the financial product to be verified is generated according to the verification rule of the specification of the similar financial product.
For example, the determining similar financial products according to the product information included in the update request may specifically include searching a set of similar financial products including a plurality of preliminary similar financial products using a clustering algorithm according to the product parameters in the update request, calculating a third similarity between the product parameters of the respective preliminary similar financial products and the product parameters in the update request, and determining the preliminary similar financial products having the third similarity within a prescribed range as similar financial products.
For another example, the verification rule for generating the specification of the financial product to be verified according to the verification rule of the specification of the similar financial product may specifically include extracting parameters and parameter values included in the verification rule of the similar financial product, predicting the parameters and parameter values of the financial product to be verified by using a machine learning algorithm based on the extracted parameters and parameter values of the similar financial product, and determining the predicted parameters and parameter values as at least a part of the verification rule of the specification of the financial product to be verified.
In some embodiments, referring to fig. 9, in a file management method according to an embodiment of the present disclosure, verification using intelligently generated verification rules may be performed in accordance with the following steps or operations.
In operation S910, a verified parameter range is determined from the product parameters in the update request.
In operation S920, similar financial products are searched for by using a clustering algorithm according to the product template, the product name and the product type parameter in the update request, and the similarity between the products is calculated. For example, similar product searches may employ machine learning unsupervised algorithms (e.g., K-means algorithms). Samples can be divided into K clusters according to the distance between the samples and the cluster center. The method comprises the following steps of (1) collecting characteristic information such as product names, product type parameters and the like corresponding to the stock products, and updating product templates, product names and product type information in the request. (2) Sample division, namely K value selection is carried out in a cross verification mode, the mass center of the K value is initialized, the cluster division of the samples is output through calculation of the distances between the samples and the mass center, and the same cluster product is a similar product. And according to the K-Means algorithm sample division result, finding similar financial products corresponding to the product parameters in the update request. For example, the warranty type financial products may be categorized as one type, and the non-warranty type financial products may be categorized as one type.
In operation S930, products having similarity within a prescribed range are confirmed as similar products, and verification parameters of similar financial products are found. According to the clustering result of step S920, product parameters of similar products with product names divided into the same cluster in the update request are searched and used as verification parameters, including but not limited to product line, risk level, recruitment period, etc. For example, the K-Means algorithm output values are: c=c { C1, C2, C3.......and wherein, c1, C2 and C3 are similar financial products.
In step S940, a machine learning algorithm is used to calculate a predicted value of the verification parameter, and an estimated range of the verification parameter is determined, so as to intelligently generate a verification rule. The range prediction is performed on the parameter value of each parameter according to the parameters of the similar financial products determined in step S930.
For example, the prediction method may employ an algorithm of machine learning regression. Specifically, a linear regression function y=ax 1+bx2 +b+e can be employed, where Y is randomly varied with the argument x 1、x2, e is an error function, a, b, etc. are constants. The range interval of the product parameter Y is predicted by inputting the boundary value of the argument x 1、x2.
In the above prediction method, first, training data of a model can be obtained. All similar product parameters and parameter values of the financial products obtained in the clustering algorithm are taken as input x 1、x2 of an input regression function, for example, the total number of similar products is 2, and the product limit value is expressed as x 1、x2 and is taken as input. And obtaining boundary values Y1 and Y2 through a regression algorithm, wherein the range of the product parameters is [ Y1, Y2]. The data may then be predicted. And updating the product type parameter X in the request, and predicting by the model, wherein the output value is a predicted value Y. And checking through the predicted value Y and the interval value output by the sample. For example, for the yield parameter of the product parameter of the update request, the value of the yield parameter of all the warranty financial products is input as a model, and the prediction range of the yield parameter of the product of the update request is calculated to be 1.00% -2.00%, in which case, the intelligent rule that the yield parameter of the product needs to be checked in the output of the update request is "the yield must be in the range of 1.00% -2.00%).
In some embodiments of the present disclosure, the check intelligence contract includes a check rule extracted from a financial regulatory document. The supervision authorities frequently issue texts, so that the specification check rules of the financial products frequently change and become strict. In order to enable the verification compliance of the specifications of the financial products to meet the supervision requirement, the policy writing of the supervision authorities for the specifications of the financial products can be periodically crawled, and related verification rules are extracted so as to comprehensively verify the texts of the specifications of the products.
FIG. 10 is a flowchart of a blockchain-based file management method that schematically illustrates the steps of verifying using verification rules extracted by a financial regulatory file in the file management method, in accordance with some exemplary embodiments of the present disclosure. Referring to fig. 10, the blockchain-based file management method may further include the following operations.
In operation S1010, a financial supervision file is acquired.
For example, the user-set links to the financial regulatory authorities, web page structure, business types, keywords, etc. may be obtained. For example, the web links may include web URL links of national banking, and the like. In one possible scenario, the web links may be user-defined. The web page structure includes labels corresponding to the titles and texts of web page articles, for example, all the articles of the web page are stored under an ul label with a class of xxx_list, each il corresponds to an article, the titles of the articles are stored in the title attribute of an a label under the il label, and the texts are stored under a div label with an id of xxx_box.
In operation S1020, regulatory information related to product information included in the update request in the financial regulatory file is extracted.
For example, an automatic crawling module may be invoked to periodically initiate crawling tasks to obtain the textbooks of the authorities' topics associated with the business types. Specifically, a network request is initiated, a webpage source code is obtained, URL links of each page in the official network are constructed, list titles of each page of articles are obtained, and text paragraph contents of the corresponding articles are obtained when the list titles are judged to be matched with the business type keywords.
In operation S1030, a verification rule of the specification of the financial product to be verified is generated according to the supervision information.
In some embodiments, referring to fig. 11, in the file management method according to an embodiment of the present disclosure, the above-described operation S1030 may be performed according to the following steps or operations.
In operation S1110, word segmentation is performed on the text corresponding to the supervision information, so as to obtain a word sequence.
In operation S1120, the word sequence is converted into a word vector.
In operation S1130, a fourth similarity of the supervision information to the product information of the verification rule is calculated using a convolutional neural network with the word vector as an input.
In operation S1140, the regulatory information having the fourth similarity within the prescribed range is screened out.
In operation S1150, the verification rule is updated using the screened supervision information.
For example, extraction of the validation rule may be achieved by computing text similarity through a convolutional neural network. First, text vectorization is performed. Word segmentation is carried out on the text of the supervision file and the manually marked rule template parameters to obtain Word sequences, and Word2vec models are utilized to convert the Word sequences into corresponding Word vectors. Next, feature extraction is performed. And taking a matrix formed by splicing the parameter word vectors of the rule templates as a convolution kernel, taking the text word vector matrix of the supervision file as the input of a convolution layer, respectively convolving with the text vector matrix of the supervision file in the convolution layer through the convolution kernel, extracting features, finally splicing the feature vectors through the full connection layer, and outputting the similarity of the text of the supervision file and the templates by utilizing a softmax function. Sentences with the highest similarity can be extracted as check rules corresponding to the rule templates.
For example, according to the notice of the structured deposit business of further standardization of commercial banks by the regulatory release paper "China Bank guard office" which is related to the structured deposit business and is crawled from the official website of China national banking guard "extracted in the last step, the content is extracted according to the key word" sales file "that" invest cold period of not less than twenty four hours is contracted in the sales file "and the rights of investors in the investment cold period are specified. During the cold period of investment, if the investor changes the decision, the commercial bank should follow the investor's wishes, release the signed sales document, and refund the investor's full investment in time. The investment cold period is counted from the signature verification of the sales document, and the verification rule about the cold period parameter can be extracted that the cold period must be longer than 24 hours in the specification of the financial product of the structural deposit business.
In some exemplary embodiments, the blockchain-based file management method 100 further includes updating a specification template. Referring to fig. 12, the update specification template may include the following operations.
In operation S1210, a specification template update request is acquired.
In operation S1220, the description template update request is validated to determine that the description template update request is sent by an authorized financial institution. For example, a public-private key signed verification method may be employed to verify the specification template update request.
In operation S1230, a specification template smart contract is invoked in response to the specification template update request, the specified specification template is updated, and the update result is stored on the blockchain.
In some exemplary embodiments, the blockchain-based file management method 100 further includes updating user-defined verification rules. Referring to fig. 13, the updating of the user-defined verification rule may include the following operations.
In operation S1310, a verification rule update request is acquired.
For example, the verification rule update request may include a product template code, a product parameter type, constraint content, and the like. Product parameter types include word typical, numeric, range, text, etc. The constraint content comprises a value range constraint of the product parameter and a product parameter association constraint. For example, the value range constraint of a dictionary-type parameter includes whether the parameter value is contained in a set dictionary range. If a product belongs to a certain product template, the dictionary of the parameter must be constrained for a certain set dictionary value or the like. For example, the value range constraints for a numeric parameter include constraints such as whether the parameter value is between a minimum value and a maximum value. For example, range-type range constraints may include constraints such as a range maximum must be greater than 0, cannot be greater than 9999999999999, a maximum must be greater than a minimum, and so on. For example, the text-based value range constraints may include constraints where the parameter value contains up to 60 characters, about 30 Chinese characters, and so on. For example, the product parameter association constraint may include an association constraint rule between parameters. For example, when the value of the parameter a of the product is fixed to the set value, the parameter B of the product can only take a certain specific value.
In operation S1320, the verification rule update request is validated to determine that the verification rule update request is sent by an authorized financial institution. For example, a public-private key signed verification method may be employed to verify the verification rule update request.
In operation S1330, in response to the check rule update request, a check rule smart contract is invoked to update the specified user-defined check rule and store the update result on the blockchain.
Accordingly, the blockchain-based file management method 200 also includes sending at least one of a specification template update request and a verification rule update request to the blockchain.
In an embodiment of the disclosure, the verification intelligent contract includes at least one of a specification template corresponding to the product information, a user-defined verification rule, an intelligently generated verification rule, and a verification rule extracted according to a financial supervision file. For example, the verification intelligent contract includes one, two, three or four of a specification template corresponding to the product information, a user-defined verification rule, an intelligently generated verification rule and a verification rule extracted according to a financial supervision file. For example, the verification intelligent contract includes a user-defined verification rule, an intelligently generated verification rule, and a specification template corresponding to the product information according to one of the verification rules extracted from the financial supervision document, that is, the specification is verified by verifying the specification and the specification template and verifying one of the specification and three verification rules. For another example, the verification intelligent contract includes three of user-defined verification rules, intelligently generated verification rules and verification rules extracted according to the financial supervision document and a specification template corresponding to the product information, that is, the specification is verified by verifying the specification and the specification template and verifying the specification and the three verification rules.
In the following, a blockchain-based file management method according to embodiments of the present disclosure is exemplarily described in conjunction with a specific example.
In the embodiment of the disclosure, a user may create a product AXBBL01 through the product management system, input parameter settings, and generate a product specification.
First, an update request may be obtained. For example, the update request includes information of a product code, a parameter value, a product template, a product specification template code, a product specification, a modification timestamp, and the like. For example, table 1 exemplarily shows product parameter information contained in the update request, and table 2 exemplarily shows part of the contents of the specification of the financial product contained in the update request.
Table 1 product parameter information contained in update request
Product specification information contained in the update request described in Table 2
And then, responding to the update request, and inquiring the product information of the financial product to determine an update type, wherein the update type comprises new construction and modification. For example, in the exemplary embodiment, a query module may be invoked to query product information based on the product code (AXBBL) to determine the type of update in response to the update request. For example, if the query result is no data, the output update type is "new product".
And then, according to the updating request, calling a check intelligent contract to check the specification of the financial product. For example, according to the above update request, specifically, the rule of the required verification is called according to the information of the product specification template, the update parameter, the product template and the like in the update request. For example, according to the product template 'structural deposit class (person)' in the update request as an index, the product specification template and the verification rule corresponding to the product template information are queried. For example, table 3 exemplarily shows specification templates required for verification, and table 4 exemplarily shows verification rules required for verification.
Table 3 specification templates for verification
TABLE 4 verification rules for verification
In this exemplary embodiment, the verification may be performed as follows.
In a first operation, a fixed format portion of the specification content is verified according to the specification template.
And in the second operation, checking parameters in the current checking range in the specification according to the checking rule. For example, in the verification process, the "product risk rating: PR2" in the specification to be verified is identified, and the specification template of the structural deposit (personal) product is not in accordance with the rule that the client risk rating must be PR1 and equal to the product risk rating, so that the verification rule and the verification result are recorded and sent to the manual secondary verification link. If the requirements are met, the verification of the next step is continued. For another example, the yield rate must be within the range of 1.00% -2.00% according to the intelligently generated verification rule, whether the yield rate of the product is within the rule range is judged, if the yield rate is within the rule range, the verification is recorded and passed, the verification of the next step is continued, and if the yield rate exceeds 2.00%, the verification rule and the verification result are recorded and sent to the manual secondary verification link. For another example, parameters in the specification within the current verification range are verified according to the verification rules extracted from the financial supervision file. For example, according to the verification rule "the cold static period must be greater than 24 hours" extracted from the financial supervision file, it is determined whether the cold static period parameter in the specification satisfies the rule. If the result is not met, recording the check rule and the check result, and sending the result to a manual secondary check link.
And in the third operation, if the fixed text and the parameters of the instruction book meet the verification rules in the verification process, the updating module is called to update the parameters and the instruction book of the appointed product, and the updating result is added into the blockchain. And if one of the verification rules does not pass the verification, returning the verification rule and the result of the verification failure to the manual secondary verification module. And the user with the auditing role logs in the blockchain network to conduct secondary auditing for the data which is not checked. And then, the block chain network acquires an audit result of the manual secondary audit. And if the secondary audit is passed, an updating module is called to update the parameters and the specifications of the appointed product, and the updating result is added into the blockchain. And if the auditing is not passed, returning the reasons and auditing results of the failed auditing to the product management system.
Some exemplary embodiments of the present disclosure also provide a blockchain-based file management apparatus. The blockchain-based file management device will be described in detail below in conjunction with fig. 14. Fig. 14 schematically illustrates a block diagram of a blockchain-based file management device in accordance with an embodiment of the present disclosure. As shown in fig. 14, the blockchain-based file management apparatus 300 may include an update request acquisition module 1410, an update type determination module 1420, a verification module 1430, and a file update module 1440.
The update request acquisition module 1410 is configured to acquire an update request, where the update request includes product information of a financial product and update content of the specification.
The update type determination module 1420 is configured to query product information of the financial product in response to the update request to determine an update type, where the update type includes new and modified.
And the verification module 1430 is used for calling a verification intelligent contract according to the update request to verify the specification of the financial product.
In some example embodiments, blockchain-based file management apparatus 300 may further include a rule acquisition module 1450 and a manual secondary verification module 1460.
For example, the rule acquisition module 1450 may include an internal rule acquisition module and an external rule acquisition module.
The internal rule acquisition module can be used for acquiring the product specification template and the verification rule set by the user, and comprises a specification template acquisition module, a user-defined verification rule acquisition module and an intelligently generated verification rule acquisition module. The instruction template acquisition module is used for acquiring the content of the same text in the instruction template. The user-defined verification rule acquisition module is used for acquiring the user-defined verification rule. The intelligently generated verification rule acquisition module is used for acquiring the intelligently generated verification rule of the system according to the same type of product parameters. The external rule acquisition module may be used to acquire verification rules extracted for the latest regulatory policy posting. For example, the external rule acquisition module may include a official network setting module, an automatic crawling module, a rule extraction module. The official network setting module can be used for setting up the website and the webpage structure for crawling the supervision policy posting by the user. The automatic crawling module can be used for executing crawling tasks according to the website and the webpage structure set by the user to acquire supervision texts. The rule extraction module may be used to extract relevant verification rules from the supervision messages.
Accordingly, the verification module 1430 may include a specification template verification module 1431, a user-defined rule verification module 1432, an intelligent rule verification module 1433, and a supervisory rule verification module 1434.
For example, the specification template verification module 1431 may be used to verify fixed format portions of the specification content from a specification template.
The user-defined rule checking module 1432 may be configured to check the content of the specification according to a set of user-defined product parameter checking rules.
The intelligent rule checking module 1433 may be configured to check the content of the specification based on a set of system-intelligently generated product parameter checking rules.
The supervision rule verification module 1434 may be configured to verify the fixed text and the parameter value according to the supervision verification rule acquired by the external rule acquisition module.
For another example, the manual secondary verification module 1460 may be configured to receive data from the verification module 1430 that is not verified to pass, and perform a manual secondary audit. And carrying out secondary judgment by manually checking the reasons for which the verification is not passed.
The file updating module 1440 is configured to update the specification of the financial product according to the update type, the product information of the financial product, and the update content of the specification when the verification passes, and store the update result on the blockchain.
Optionally, the file management apparatus may further include a permission verification module, configured to verify the permission of the sender of the update product specification, the product specification template, and the verification rule update request.
Optionally, the file management device can further comprise a first processing module, wherein the first processing module is used for calling the intelligent contract after receiving the update request and generating a product specification according to the specification template.
Optionally, the file management device further comprises a description template updating module, a verification rule updating module, a failure information recording unit, an updating result feedback unit and an updating detail inquiring unit, wherein the description template updating module is used for receiving and updating a description template set by the platform, the verification rule updating module is used for receiving and updating a verification rule set by the platform, the failure information recording unit is used for recording a description updating result as failure when the description is not verified, the updating result is added into a blockchain, the updating result feedback unit is used for feeding back the description updating result to the product management system, and the updating detail inquiring unit is used for inquiring all updating submitters and updating details of the description by a user with authority.
According to an embodiment of the present disclosure, any of the modules and units in the above-described file management apparatus may be incorporated in one module to be implemented, or any of the modules may be split into a plurality of modules. Or at least some of the functionality of one or more of the modules may be combined with, and implemented in, at least some of the functionality of other modules. According to embodiments of the present disclosure, at least one of the modules and units in the above-described file management apparatus may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware, such as any other reasonable way of integrating or packaging the circuits, or in any one of or a suitable combination of three of software, hardware and firmware. Or at least one of the modules and units in the file management apparatus described above may be at least partly implemented as computer program modules which, when executed, perform the corresponding functions.
In the file management method and the file management device based on the blockchain according to the embodiments of the present disclosure, after the financial product is released, the product parameters and the specifications of the financial product are uploaded to the blockchain together, and by calling the intelligent contract, the specifications can be verified according to the specifications and the product parameters, and the specifications can be verified according to at least one of the specification template, the user-defined verification rule, the intelligently generated verification rule and the verification rule extracted from the latest supervision release, and the detail data and the verification result are stored on the blockchain. The latest instruction book can be read in real time in the process that the customer purchases the financial product through different channel devices. Therefore, the file management method and the file management device based on the blockchain can ensure the real-time performance of the instruction information update of the financial product, and improve the accuracy and the reliability of the instruction storage and the update of the financial product.
Fig. 15 schematically illustrates a block diagram of an electronic device adapted to implement the blockchain-based file management method described above, in accordance with an embodiment of the present disclosure.
As shown in fig. 15, an electronic device 1500 according to an embodiment of the present disclosure includes a processor 1501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 1502 or a program loaded from a storage section 1508 into a Random Access Memory (RAM) 1503. The processor 1501 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 1501 may also include on-board memory for caching purposes. The processor 1501 may include a single processing unit or multiple processing units for performing different actions of the method flows according to embodiments of the present disclosure.
In the RAM 1503, various programs and data necessary for the operation of the electronic device 1500 are stored. The processor 1501, the ROM 1502, and the RAM 1503 are connected to each other through a bus 1504. The processor 1501 performs various operations of the method flow according to an embodiment of the present disclosure by executing programs in the ROM 1502 and/or the RAM 1503. Note that the program may be stored in one or more memories other than the ROM 1502 and the RAM 1503. The processor 1501 may also perform various operations of the method flow according to an embodiment of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the disclosure, the electronic device 1500 may also include an input/output (I/O) interface 1505, the input/output (I/O) interface 1505 also being connected to the bus 1504. The electronic device 1500 may also include one or more of an input portion 1506 including a keyboard, mouse, etc., an output portion 1507 including a Cathode Ray Tube (CRT), liquid Crystal Display (LCD), etc., and speaker, etc., a storage portion 1508 including a hard disk, etc., and a communication portion 1509 including a network interface card, such as a LAN card, modem, etc., connected to the I/O interface 1505. The communication section 1509 performs communication processing via a network such as the internet. A drive 1510 is also connected to the I/O interface 1505 as needed. Removable media 1511, such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like, is mounted on the drive 1510 as needed so that a computer program read therefrom is mounted into the storage section 1508 as needed.
The present disclosure also provides a computer-readable storage medium that may be included in the apparatus/device/system described in the above embodiments, or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example, but is not limited to, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 1502 and/or RAM 1503 described above and/or one or more memories other than ROM 1502 and RAM 1503.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the methods shown in the flowcharts. The program code, when executed in a computer system, causes the computer system to implement the item recommendation method provided by embodiments of the present disclosure.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1501. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program can also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication portion 1509, and/or installed from the removable medium 1511. The computer program may comprise program code that is transmitted using any appropriate network medium, including but not limited to wireless, wireline, etc., or any suitable combination of the preceding.
In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1509, and/or installed from the removable medium 1511. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 1501. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be provided in a variety of combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.