Current location - Quotes Website - Signature design - One of the top ten blockchain government cases Ant Blockchain-Hangzhou Internet Court Judicial Chain Case
One of the top ten blockchain government cases Ant Blockchain-Hangzhou Internet Court Judicial Chain Case

According to Hangzhou Daily, on September 18, 2018, the Hangzhou Internet Court announced that the judicial blockchain was officially launched online, becoming the first court in the country to apply blockchain technology to resolve disputes. The judicial blockchain makes the entire process of electronic data generation, storage, dissemination, and use trustworthy.

The complainant can submit electronic evidence such as the contract, rights protection process, service process details, etc. online through the online complaint portal, which will be submitted to the notary office, judicial appraisal center, CA/RA agency, court, Ant Financial and other chains. Go to the node to provide one-stop witness and endorsement, providing one-stop service for prosecutors. The judicial chain has greatly reduced the cost of offline evidence storage and collection, and improved the efficiency of the judgment process. This has enabled many cases that were previously unworthy of prosecution due to the high cost of rights protection to be able to achieve better rights protection through the blockchain; judicial The chain solves the problem of low judicial service efficiency, realizes the integration and sharing of judicial data, and breaks down data silos; the judicial chain promotes the construction of a social credit system, reduces judicial costs, uses technology as an engine, promotes innovative development, and leads the transformation, upgrading and reduction of judicial services.

Citing the analysis of the "Blockchain Judicial Evidence Application White Paper" from the Trusted Blockchain Promotion Plan, with the rapid advancement of informatization, a large amount of evidence in litigation is presented in the form of electronic data. The specific manifestations of electronic evidence in judicial practice are becoming increasingly diverse, and the frequency of use and data volume of electronic data storage have increased significantly. Different types of electronic evidence are formed in different ways, but they generally have the characteristics of being easy to perish, easily tampered with, and highly dependent on technology. Compared with traditional physical evidence, it is more difficult to determine the authenticity, legality, and relevance of electronic evidence in judicial review. .

In judicial practice, parties generally lack the ability to produce evidence, and the electronic evidence provided to the court is of poor quality. There are a large number of problems such as improper evidence collection procedures, incomplete evidence, and poor pointing to the facts of the case, which directly affects the electronic evidence. The proportion of evidence admitted in litigation.

The traditional evidence storage method of electronic evidence is essentially a centralized evidence storage method, which may easily lead to the loss of evidence data or the possibility of being compromised.

At the same time, electronic data relies on electronic media for storage. For storage security, multiple backups and other methods are often needed. In addition, electronic media have a long service life, which makes storage costs higher.

(2) Problems in evidence collection

Currently, when some locally generated electronic data are collected for evidence, the originals are intelligently retained in the device that generated the electronic data, and the original evidence and Devices are indivisible. Once the original evidence leaves the device, it becomes a copy and cannot become the basis for a final verdict. This results in many limitations in litigation cases.

In addition, the Internet software service provider cannot give a definite answer as to whether the so-called original is the real, original and complete data at the time when the time occurred. It is also doubtful whether the evidence obtained is the original.

(3) Problems in demonstration

Electronic data display and fixation are important aspects of data use. Since electronic data exists in the form of electronic information stored in electronic hardware, To obtain its content, you need to use responsive software to read and display it, which makes it difficult to demonstrate. It may also increase the burden of proof on the parties due to the need for notarization, and waste social judicial resources.

(4) Issues in Evidence

In litigation, both parties will submit their own electronic data as evidence. When the parties individually control their own data, it is easy for the evidence submitted by both parties to be inconsistent or even contradictory. In the absence of other supporting evidence, it is very difficult to determine the authenticity of the evidence, and the electronic data submitted by both parties cannot be used as the basis for deciding the case. In this situation where the facts of the case cannot be determined, the judge is likely to have to rely on assigning the burden of proof to decide the case. The general principle of allocating the burden of proof is that whoever makes the claim must provide evidence. If he cannot provide evidence, he will bear the consequences of losing the case. In this case, a party that actively tamperes with its own data can benefit from this burden of proof arrangement.

(5) Problems in evidence identification

All evidence “must be verified to be true before it can be used as the basis for finalizing a case”, which is the most important and universal evidence in the world. One of the principles of justice. The identification of evidence is usually a process of identifying the "three properties" of evidence, namely the authenticity, legality and relevance of the evidence. Electronic data used as evidence also needs to pass the "three characteristics" judgment. Due to the large amount of data, strong real-time nature of electronic data, high storage costs, and difficulty in identifying the originals, it is still difficult to identify the "three properties" of evidence. Electronic data often cannot support the case because it is difficult to identify, which is detrimental to the case. Both the judge and the parties caused greater pressure.

Quoting from the sharing by Li Zhiguo, head of Ant Financial’s judicial evidence deposit products, on the theme of “Ant Blockchain’s Exploration in the Field of Judicial Evidence”, he believes that in the past 20 years, the Internet industry has The key word is connection.

In the PC Internet era, terminals were connected through PC interconnection. At that time, companies that discovered this trend seized huge business opportunities such as portals and search engines. In 2013, we entered the era of mobile Internet. In this era, many smart terminals and personal devices are connected together through the mobile Internet. The number of terminal devices and online time have been greatly improved. Those who seized the opportunity at this stage created super applications such as Weibo, WeChat, and Alipay. A very important change that we are currently paying attention to is that as the changes in connections continue to expand, the quality of connections has also changed greatly. This is called the second curve. The original object of connection was information, but now it is likely to become assets.

So what is the difference between assets and information? There are three main differences.

First, assets are unique, while information can be copied infinitely. In the Internet era, the cost of information transmission can be minimized through copying. However, when the connected object is an asset, there is a fatal flaw, that is, it cannot be transmitted through copying. After the asset is given to a person, It cannot be given to anyone else.

The second point is that assets are more fragile and precious than information. Assets are money. In the process of information digitization, it is easy to put information on the Internet, but for assets, this does not work, because behind the assets are real interests.

The third point: Compared with assets and information, assets have very high security requirements, and many problems must be faced, including hackers, competitor attacks, fraud, etc., these are linked assets Problems that need to be solved. This is the third difference between assets and information. If there is a dispute over assets, they need to be resolved. In reality, it can be resolved by the court, but if it is on the Internet, it is difficult to deal with it.

The three characteristics of assets mentioned above are difficult to solve through traditional Internet methods. At the same time, the development of the Internet has made people lazier and lazier. If 10 years ago, many people could accept that asset connection would take a long time, but now it is difficult for people to accept it. For example, in order to sign a contract, it takes two to three days. It takes weeks to mail, and frequent visits to many traditional institutions in order to make a cross-border payment cost a lot. And compared with the connection methods 20 years ago, the current Internet connection is much more difficult, because many people find that after information is connected, the data becomes very valuable. What to do if it is valuable? The only way is to sink the value. When it sinks, it becomes a deep well of value. The larger the scale, the deeper the value. At the same time, another problem will be formed called data island. These issues need to be considered and resolved by the judicial chain.

Now, the court is standing at a historical opportunity node and has the opportunity to become a basic component of data generation and completion of connections. Disputes will inevitably occur over assets, and after a dispute occurs, the court will conduct a full-link review. This is a unique value, the value of the last mile of the Internet. By connecting assets, breaking data islands and value wells, this is the real value completion. This model actually belongs to small and medium-sized enterprises, including For individual users, the above is the value basis of the judicial chain.

If there is an island of value and it needs to be connected, there must be various connection methods. There are four main ways to connect.

The first is not to connect. , put it in a bank safe;

The second way is a bad connection, that is, through the leadership and inequality of technology, and through hacking technology to deprive the ownership of data assets, when there is no legal When connecting, bad connections must exist;

The third type is a connection that seems to be a good connection, but is actually a fragile connection. Nowadays, there are many ways to connect. When the market situation is relatively good, it is a bubble. In relatively large cases, it has a certain market, but once it encounters real value, it breaks down;

The fourth type is the judicial chain, which can be summarized in 15 words, that is, the whole process record, the whole chain The road is trustworthy and witnessed by all nodes.

How can the judicial chain be technically credible and institutionally credible at a low cost?

First of all, the first problem is that assets are fragile, so when connecting assets, they must have the basic characteristics of real security. Security includes privacy protection, which is not a simple matter. The first day Alipay was born started with secured transactions, solving the problem of the authenticity of previous transactions between buyers and sellers. Later, based on Alipay, Sesame Credit was proposed, and many Everyone has Zhima Credit points, and through past credit records, big data and artificial intelligence are provided as a reference for whether the user can fulfill the contract, making real security a step further. Next comes the blockchain. The blockchain provides a very important capability, that is, authenticity cannot be tampered with, which makes trust a big step forward in the level of real security.

Therefore, the first problem solved by the judicial chain is to ensure that the bottom connector is real and safe when connecting assets. This real safety is not something you talk about in words, nor is it a technology in a laboratory, but a technology in a laboratory. It has been recognized by users, tested by the market and tested by large-scale business volume.

The second question is very critical. When everyone is connected through a real and secure connector, once the data assets are compromised, how to deal with disputes? The judicial blockchain has been moving in this direction in the past two years. By bringing notary offices, judicial appraisal centers, and courts to the bottom of the judicial chain, the data is authenticated accordingly, ensuring that once a dispute arises about data assets, it can be be dealt with fairly and effectively. This is a very powerful system, which is the fundamental reason why the judicial chain is the real solution to the last mile problem of the Internet. So far, the judicial chain has ensured technical credibility and institutional credibility.

The third problem is that in the interconnection of assets, the cost of connection cannot be too high. Users have developed the habit of obtaining countless information with just a click of the mouse and a search button. Blockchain has been popular for many years, but so far there are less than 20 million real users, and the daily activity is very low. The first reason is that it is too difficult to use, and the second reason is that the cost of use is too high. Therefore, when connecting assets, it must be very simple, very easy to use, and low cost. Just like when Alipay first implemented real-name authentication, it could quickly complete user payments through face scanning, and at the same time, the security level was very high. Therefore, real connectors must have the characteristics of low cost and high applicability.

The judicial chain achieves technical credibility and institutional credibility, and the connection cost is not high, opening a new era of blockchain for asset connection.

The judicial blockchain of Hangzhou Internet Court makes the entire process of electronic data generation, storage, dissemination, and use credible. Through the overall complete structure, it can solve the entire life cycle of electronic data generation, storage, dissemination, and use on the Internet, especially the whole-process trust issue at the generation end.

The blockchain consists of a three-layer structure:

1). The first is the blockchain program. Users can directly record the entire process of operation behavior in the blockchain through the program. , such as online submission of electronic evidence such as electronic contracts, rights protection processes, service process details, etc.;

2), The second is the full-link capability layer of the blockchain, which mainly provides real-name authentication, electronic signature, time Stamping, data storage and trusted services throughout the blockchain process;

3) The third is the judicial alliance layer, which uses blockchain technology to integrate notary offices, CA/RA institutions, forensic appraisal centers and The courts are connected together in the alliance chain, and each unit becomes a node on the chain.

The electronic evidence platform launched on the judicial chain of Hangzhou Internet Court directly establishes a special data channel between evidence and trial, making the collection, fixation, transmission and use of evidence more convenient and efficient.

In the past, when going to the Internet Court for litigation, evidence was submitted electronically and then uploaded to the "Hangzhou Internet Court Litigation Platform" (www.netcourt.gov.cn). For example, notarized documents are usually uploaded by scanning. The electronic evidence platform launched today first has a long "tentacle", and it can achieve seamless connection with other electronic data, such as notary offices. Then the notarized documents can be uploaded to the electronic evidence platform with one click and used directly as litigation evidence. For another example, when involving transaction disputes on e-commerce platforms such as Taobao and JD.com, mutual financial platforms, and wealth management platforms, third-party data service providers (such as operator platforms, electronic contracting platforms, and certificate depository institution platforms) can also directly transmit electronic data. The electronic evidence platform effectively solves the difficulties faced by parties in collecting electronic data evidence on their own and greatly saves the economic and energy costs of producing and cross-examining evidence in court trials.

The "electronic" evidence that was originally just scanned or typed has truly transformed into "electronic evidence". Through the third-party storage platform, "electronic data" is easily lost and tampered with. The magic spell forms a unique “data ID card” that cannot be tampered with, and is synchronized and backed up to the electronic evidence platform in real time. After entering the litigation process, the "data ID card" that has been saved on the electronic evidence platform will be automatically compared with the original electronic data to determine whether the electronic evidence has been tampered with later, thus ensuring the authenticity of the electronic evidence.

These electronic data have coded ID cards, which become the "elements" of each case. The platform classifies these elements and then matches them to each case. In this way, the system automatically matches The key element is to import electronic evidence into each case to form a system that automatically files cases without a judge. We can imagine that we will soon be able to achieve a case filing speed of tens or hundreds per minute.

Finally, when these evidences become electronic data and are stored on the platform, in addition to the Hangzhou Internet Court, which can carry out judicial use on the platform during the trial of the case, other relevant institutions (such as other people with permission) Courts, judicial appraisal agencies, notary agencies, filing agencies) can all retrieve relevant evidence from the platform in accordance with the procedures, and the complete sharing of resource data will also be achieved.

Taking the Shanghai Pudong Notary Office’s data storage platform that has opened up the Hangzhou Mutual Judicial Chain as an example, we will introduce the complete closed-loop process from the data protection platform to judicial litigation.

1. Register the business platform and perform real-name authentication

Enterprise A, a design company, opens the Shanghai Pudong Notary Office data storage platform page and completes real-name identity authentication after registration.

2. Original data storage

When design company A completes the design of a work and archives the original work data, it initiates a remote storage call through its own business system Interface, call the RESTful API of the notary office's data storage platform to complete the storage of the design work file HASH and related elements. The deposit certificate will also be sent to the Judicial Blockchain, Pudong Notary Chain and China Time Service Center simultaneously. After all are successful, a certificate of deposit with the corresponding LOGO will be obtained. The HASH fingerprint data of the work files that are completely consistent on each chain and platform shows the validity and non-tamperability of this certificate.

5. Log in to Hanghu Court to submit a complaint and verify the legality of the evidence

The Judicial Chain is a specific application case of Ant Blockchain BaaS. Ant Blockchain BaaS (Blockchain as a Service) is an open "blockchain as a service" platform based on the Ant Financial Alliance blockchain technology and Alibaba Cloud. It outputs blockchain as a cloud service, supports numerous business scenarios and on-chain data traffic, and is the foundation of industry blockchain solutions. Ant Blockchain BaaS is committed to building an open and collaborative platform to provide convenient services to enterprises and individuals around the world.

The above picture is the product map of Ant Blockchain, in which the technical architecture of BaaS is mainly divided into three layers:

1. The bottom layer is BaaS Core

The BaaS Core layer is based on a cloud resource management platform that provides flexible support for hosts and containers, enabling convenient cross-platform operation and deployment. For trusted hardware, Alibaba Cloud's Shenlong server provides corresponding hardware services and can provide a trusted execution environment with high reliability and high privacy protection. In addition to the certificate deposit platform and smart contract platform, heterogeneous chain cross-chain services will soon be launched based on the homogeneous chain cross-chain services. In the current market, a single chain or a single chain has its own limitations. In the future, cross-chain technology will become a very important part of establishing trust infrastructure and a mutual trust ecosystem. At present, the BaaS platform has achieved internal interconnection through cross-chain services. It can also access trusted data sources on the external Internet through smart contracts and cross-chain services. In addition, BaaS Core has corresponding functions and support for other basic capabilities, such as alliance management, security and privacy, certificate key management, etc. While providing the self-developed Ant blockchain system, the BaaS platform also supports open source systems to better meet the diverse needs of customers, including enterprise Ethereum Quorum and Hyperledger Fabric.

2. The upper layer is BaaS Plus

The BaaS Plus layer encapsulates and services the underlying services and capabilities, and opens them into standardized interfaces to provide partners with access and use. This can greatly reduce customers' investment in basic resources and significantly shorten the time it takes to access services. So far, the platform has launched services such as trusted certificates, universal traceability, real person certification, and enterprise certification, and will gradually launch more services in the future.

3. The top layer is the BaaS Marketplace and solutions

Ant’s many partners can provide their capabilities in the marketplace. At the same time, practical applications implemented in different scenarios will precipitate a set of standard application solution templates, making it easier for customers to learn from the platform capabilities of other similar scenarios in their own applications. The Pudong Notary Office data storage platform can become a member of the BaaS Marketplace.

1. Account system

All transaction operations on Ant Blockchain are carried out around the account system, so before sending and executing transactions, you need to ensure that you have created a corresponding transaction in Ant Blockchain account, and then you can use the created account to submit transactions, and you can also complete modifications to the relevant account configuration based on the account structure.

The specific account data structure model fields and descriptions are as follows:

Among them, accounts contain three types of keys:

Ant Blockchain adopts the account It is implemented in a decoupled manner from the key, which to a certain extent prevents security risks such as data loss on the chain caused by key loss. The main account operations supported by Ant Blockchain include:

2. Privacy Protection

Ant Blockchain supports the privacy protection capabilities of sensitive account information data by introducing some features of cryptography. , by extending the relevant command functions at the smart contract level to realize the encrypted storage and addition and subtraction operations of the amount in the smart contract. Only individuals who obtain a valid key can decrypt the sensitive data in the smart contract and view the original amount information.

At present, the cryptographic features introduced by Ant Blockchain include zero-knowledge proof, that is, by introducing zero-knowledge proof, the legality of the transfer amount can be proved under the condition of encrypted ciphertext.

3. Cross-chain service

Ant Blockchain cross-chain service is an on-chain data service provided for smart contracts. This service deploys cross-chain services in the customer's blockchain environment. Contract/chain code, and provides an API interface for user contracts/chain codes to call and use. The cross-link service currently provides two types of services: ledger data access and contract message push, and their corresponding API interfaces. The ledger data access service can help user smart contracts obtain data on other blockchain ledgers, including but not limited to block headers, complete blocks, transactions, etc. The contract message push service can help communicate messages between smart contracts on different blockchains that have deployed cross-chain data services, satisfying scenarios such as cross-chain business association processing.

On May 22, 2019, Shanghai No. 1 Intermediate People's Court, Hangzhou Internet Court, Hefei Intermediate People's Court, Suzhou Intermediate People's Court, and *** in Wuhu, Anhui signed a letter of intent to cooperate. Relying on the judicial blockchain platform of the Hangzhou Internet Court, the four places are interconnected and jointly build the Yangtze River Delta judicial chain to create a judicial-level trust mechanism with "full process records, full link credibility, and full node witness",** *Promote the integrated development of justice in the Yangtze River Delta region. It was introduced at the meeting that the judicial blockchain operating mechanism of the Hangzhou Internet Court has become increasingly mature, and has collected 390 million pieces of electronic data. The dismissal rate of relevant cases has reached more than 96%. played an important role.

The technology provider of the Hangzhou Internet Court’s judicial chain is Ant Financial Blockchain, which has the world’s leading core patented technology, 20,000 TPS high-performance certificate storage capabilities, and extremely high privacy security protection capabilities. , top-level security prevention and control capabilities protect the judicial chain. Its Ant Blockchain trusted certificate storage platform supports third parties to access the judicial chain.

In terms of specific aspects, for example, the judicial chain has greatly improved the effect of users’ rights protection. For example, in China, copyright protection is very backward. For example, only 5% of the pictures are genuine, and the rest are pirated. However, from the filing of the case to the trial, the first instance takes 8 months, and the compensation received is only 500. -600 yuan, but the time cost and economic cost far exceed the compensation amount. However, the emergence of the judicial chain can reduce the cost of rights protection by one to two orders of magnitude. Secondly, the judicial chain can enhance the trust of the brand. On the one hand, it enables enterprises to stand together with the judicial chain and the brands and platforms recognized by the government. On the other hand, it enables enterprises to clearly and transparently tell their business models through trust connection. users, giving users a very strong sense of trust. Entrepreneurs, in particular, can have huge traffic in the early stages. Finally, the judicial chain solves the problem of the last mile of the Internet, which greatly reduces the user's cost of use. Therefore, using the judicial chain model really upgrades the traditional business model into a trust business model.

Contributor Wang Denghui introduced:

Copyright chain/notarization chain project CTO of Hangzhou Xiabi Youshen Technology Company,

Shanghai partner of HiBlock technology community,

Focusing on the "Blockchain+" industry implementation and implementation plan, we hope to preach blockchain together with industry practitioners.