The Safe Financial ProcessingMethod for Realizing Supply Chain Integrated Business Intelligence Using Blockchain Application Scenarios

In order to improve the nancial processing eect of supply chain integrated business intelligence, this study applies blockchain technology to the nancial processing of supply chain integrated business intelligence and conducts an evolutionary game analysis on the factors that aect the selection of information-sharing strategies for logistic service supply chain nodes. By establishing the evolutionary game model of logistic service integrators and logistic service providers under the strategy of information sharing and information nonsharing, the value of information sharing in the logistic service supply chain is discussed from a qualitative and quantitative perspective. In addition, this study constructs the expected prot mathematical model of a two-level logistic service supply chain composed of logistic service integrators and logistic service providers. e experimental research results show that the safe nancial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios has good results.


Introduction
Nowadays, with the development of science and technology and the continuous improvement of people's demand for a high-quality life, the entire social needs, production methods, and social division of labor are constantly changing. e production of commodities has changed from a model of complete production by a single company to a model of cooperative production by multiple companies. Moreover, market competition has evolved from simple customer competition to competition between the entire supply chain involving multiple links in commodity production [1]. Banks and other funding parties radiatenancial products and services to the upstream and downstream and even the entire industry chain around relevant core companies to solve the nancial problems of corporate procurement, sales, and inventory in the supply chain. is nancial operation mode is called supply chain nance. Supply chain nance mainly includes nancing services such as goods mortgage, advance payment, and accounts receivable. e supply chain nance business is mainly participated by banks and other funders, large-scale core enterprises, small and medium-sized suppliers, and other enterprises. Due to the special requirements of the supply chain nance industry for information privacy and security, the current supply chain nance system has many problems [2]. e blockchain technology is an organic collection of many existing technologies, which mainly include cryptography, consensus algorithms, and distributed systems. e blockchain is simply a distributed ledger, which allows every distributed node in the blockchain network to participate in the blockchain, and each participant shares the same permanent and transparent transaction record ledger. Blockchain technology uses cryptography-related technologies to realize that every transaction in the blockchain can be traced back, and it ensures that no one can change the transactions recorded in the blockchain shared ledger. At the same time, the distributed consensus algorithm protocol is used to allow each participant of the blockchain to reach a consensus on the transaction result and record it in the shared ledger. Blockchain smart contract technology can replace manual operations, set the trigger conditions of the smart contract in advance, and automatically execute the smart contract to complete the transfer of assets after the transaction is executed to a certain stage [3].
e blockchain system can be regarded as a distributed multinode shared database ledger. Each distributed node in the blockchain system communicates through a peer-to-peer protocol, that is, P2P technology; and each transaction in the system can use a one-way hash function, asymmetric encryption, and other related cryptography technologies to achieve high security. Since the blockchain is equivalent to a distributed system in which all participants share the ledger, any company participating in the same blockchain has a copy of the entire ledger as the upstream supplier of the financial participants of the blockchain supply chain. Downstream buyers, core companies, and financial institutions can share benefits from related financing businesses, while minimizing policy and operating risks without the need to build a financial system.
is study combines the blockchain technology to analyze the security financial management of the supply chain integrated business intelligence, builds an intelligent system, and verifies the performance of the system to improve the security financial management effect of the supply chain integrated business intelligence.

Related Work
e "ghost protocol" proposed in document [4] ensures the integrity of the blockchain, records the entire process of value transfer (transaction) immutably, and uses decentralization and trustless methods to collectively maintain the reliability of a databook sexual solution; this databook is completely public and not under the control of any organization. Literature [5] proposes that blockchain is a technology with breakthrough significance across the ages, and the core ideas behind this technology, such as decentralization, trustlessness, and national accounting, are its greatness. erefore, blockchain technology will be the core technology that has the most potential to trigger the fourth industrial revolution after steam engine, electricity, information, and internet technology. e core feature of blockchain technology is that the transaction information on the chain cannot be tampered with, and it is difficult to interfere, modify, or delete it under the existing technical conditions. Literature [6] proposes that immutability is also the most important difficulty in realizing landing applications. e immutability of blockchain may turn its advantages into disadvantages in the activities of reversing financial services. Literature [7] pointed out that for some time, blockchain technology wanted to replace legal currency in the form of blockchain tokens, and even wanted to replace government agencies with decentralized functions, but it was difficult to achieve in actual operation. Yes, blockchain technology is just a technology, and it needs to find an application scenario suitable for this technology in order to play its own role. Literature [8] believes that the blockchain has an "impossible triangle" in the three aspects of "decentralization," "high efficiency and low energy," and "security." It is difficult to achieve three goals at the same time. To achieve two of them, it is necessary to abandon another goal, which means that if two of the attributes are strengthened, the third attribute will be automatically weakened. e premise of the use of blockchain technology is that users should keep the private key they generated. Once the private key is lost, they cannot perform any operations on the assets in their account. Individual ordinary users or users without much technical experience may feel private. If the key is lost, it is enough to apply for a replacement like an ID card, but in fact, it is impossible. Literature [9] believes that with the development of society, a large number of mathematical algorithms have been developed, resulting in the blockchain algorithm that may be cracked by new algorithms, so it may be a blockchain formed by mathematical principles someday in the future. e algorithmic security of the technology will be threatened. Such risks may not exist in the short term but may exist in the long term. erefore, the application of blockchain technology to the business process of the securitization of accounts receivable assets may bring risks. e blockchain technology is an emerging field of research. Domestic and foreign scholars in various industries use the theory of blockchain technology to solve problems that arise. Most scholars analyze the application of this technology theoretically. Literature [10] believes that the development of blockchain technology can not only make the asset securitization of accounts receivable become a reality but can also become a boost to social development; taking the application of blockchain technology in various industries as the research direction, the new intermediary will be based on blockchain technology, which provides the possibility to build a trust mechanism that does not rely on third-party platforms. One argument for the popularity of blockchain in society is that blockchain technology can rebuild business models, so it will change the production relations of traditional society. In essence, it is a human cognitive revolution, and capital is profit-seeking. Yes, the financial industry takes the lead after the emergence of a new technology. e literature [11] surveyed more than 1,300 financial institutions around the world. It can be seen that the number of financial institutions that use the combination of blockchain technology and traditional business processes will account for 55%; in 2020, it will reach 77%. Literature [12] starts with the business process of asset securitization of accounts receivable. e problems encountered in the business process of the asset securitization of accounts receivable are reflected in the following aspects [13]: the authenticity of the relevant assets in the pool cannot be effectively determined; the lack of repayment rules after the financial institution itself has problems; in accounts receivable, the characteristics of asset securitization products are that there are many trading entities, the transaction structure of securitization products is relatively complicated, and the data transmission chain is long.
ese difficulties also indirectly lead to deeper problems, that is, it is difficult to obtain low capital costs for issuing securitized products, and the cost limits its further development [14]. Literature [15] believes that the traditional problem of the securitization of accounts receivable assets is that the transaction structure is complicated, the transaction chain of the participants is very long, and there may be external uncertain factors, which further trigger the problem of information asymmetry. Literature [16] proposes to establish a negative list system. Starting from the top level, the regulatory authorities play an intermediate role to solve the relationship between blockchain service organizations and specific landing application scenarios, and better regulate the development of blockchain technology.

Blockchain-Based Supply Chain Business
Intelligence Security Financial Processing Model e final profit of the game subject is determined by the strategy chosen by itself and the strategy chosen by the other party in the game. It represents the expected return when the two parties in the game choose to share or not share information.
Game party 1 adopts the information-sharing strategy, and the expected benefits are [17] as follows: Game party 1 adopts the information nonsharing strategy, and the expected benefits are as follows: e average expected return of the game party 1 is as follows: Game party 1 chooses the copy dynamic equation of the information-sharing strategy as [18] follows: Substituting formulas (1)-(3) into (4), we get the following: According to formula (5), when dx/dt � 0, three possible equilibrium solutions can be obtained as follows: However, these three solutions are not necessarily all evolutionary stable strategies. According to the stability theorem of differential equations, when dx/dt � 0 and F ′ (x) < 0 are satisfied, it is an evolutionary stable strategy in a stable state. erefore, when we find the first derivative of formula (5), we get the following: rough formulas (5) and (6), it can be analyzed that the evolutionary stable strategies of game party 1 are [19] as follows: (1) If y � y * � C 1 + θQ 1 /K 1 Q 2 (g − 1) + αQ 1 , then dx/dt ≡ 0, which shows that the three solutions are all evolutionary stable strategies.
erefore, the different situations of When It can be seen that in the case of C 1 + θQ 1 < K 1 Q 2 (g − 1) + αQ 1 , the steady state is affected by the value of y * . e larger the y * is, the smaller the probability that y will fall within the interval [y * , 1], and the probability that game party 1 chooses the informationsharing strategy will decrease accordingly.
Game party 2 chooses the expected benefits of the information-sharing strategy as [20]follows: e expected return of the game party 2 who chooses the information nonsharing strategy is as follows: e average expected return of the game party 2 is as follows: e copy dynamic equation for the game party 2 to choose the information-sharing strategy is as follows: Substituting formulas (7)-(9) into (10), we get the following:

Mobile Information Systems
According to formula (11), when dy/dt � 0, three possible stable solutions can be obtained as follows: However, these three solutions do not necessarily belong to evolutionary stable strategies. From the stability theorem of differential equations, we know that when dy/dt � 0 and F ′ (y) < 0, it is an evolutionary stable strategy in a stable state.
erefore, by taking the first-order derivative of equation (11), we obtain the following: rough formulas (11) and (12), it can be analyzed that the evolutionary stable strategies of game party 2 are as follows: dy/dt ≡ 0, which means that the three solutions are all evolutionary stable strategies, and the results of the two strategies of information sharing and nonsharing for game party 2 are the same.
is the evolutionary stable strategy of game party 2.
It can be seen from the above that in the case of C 2 + θQ 2 < K 2 Q 1 (g − 1) + αQ 2 , the steady state is affected by the value of x * . e larger the x * , the smaller the probability that x falls within the [x * , 1] interval, and the possibility of the player 2 choosing the information-sharing strategy will decrease. e two parties of the game are independent of each other. However, it requires the cooperation of both parties to form a stable evolution strategy. is is not only to analyze the evolution process of information-sharing behavior among supply chain members but also to consider the situation of both parties. From formulas 5 and 11, it can be seen that the possible stable strategies are (0, 0), (0, 1), (1, 0), (1, 1), (x * ,y * ), and the existing evolutionary situations are as follows: 2 , the additional benefits obtained by both parties of the game by taking information-sharing behaviors are small, and they are not enough to make up for the cost and existing risks of information-sharing inputs. As shown in Figure 1(a), the evolution process converges to x * � 0, y * � 0, and the stable point is (0,0). e evolutionary stable strategy of integrators and providers is (not sharing and not sharing). 2 , the cost and risk borne by the integrator for information sharing are higher than the benefits that can be obtained by information sharing. However, the additional benefits obtained by the provider's choice of information-sharing strategy are greater than the costs and risks involved in information sharing. As shown in Figure 1(b), the evolution process converges to x * � 0, y * � 1, and the stable point is (0,1). e evolutionary and stable strategy of integrators and providers is (not sharing and sharing). (a) Dynamic evolution phase diagram of case 1.
when the integrator's information cost and risk are less than the shared benefits, information sharing is the best strategy for the integrator. However, the cost and risk of provider information sharing exceed the benefits obtained, and the best strategy is to not share information. erefore, as shown in Figure 2(a), the evolution process ends at x * � 1, y * � 0, the stable point is (1,0), and the evolutionary stability strategy is (shared and not shared). In the two situations shown in formulas (2) and (3), the game player unilaterally adopts an informationsharing strategy, with one party choosing information sharing and the other party choosing not to share. Entities that adopt information-sharing strategies can obtain greater additional benefits when they begin to share. However, as the game process is repeated, the information input cost and information-sharing risk of the information-sharing party will gradually rise. In the end, it will also evolve into unwillingness to share information. erefore, in both cases, the final result of the information-sharing game between integrators and providers is that information is not shared, and the evolutionary stability point is (0, 0), as shown in Figure 2 , C 2 + θQ 2 < K 2 Q 1 (g − 1) + αQ 2 , the benefits obtained by the integrator and the provider by adopting the information-sharing strategy are greater than the cost and risk of the input. However, there are two evolutionary stable points (0,0) and (1,1) for both parties, which are (shared and shared) and (not shared and not shared), as shown in Figure 3. e broken line ADC is the dividing line of the two evolutionary results (0,0) and (1,1). In the OADC region, the evolution process converges to x * � 0, y * � 0, and the stable point is (0,0). In the end, both parties of the game will choose the information nonsharing strategy. In the ABCD region, the evolution process gradually converges to x * � 1, y * � 1, the final stable state is (1,1), and both players in the game choose to share information. e critical point D(x * , y * ) determines the final result of the evolutionary game, and the strategic choice of the game player will change with the change in the critical point. When the critical point D(x * , y * ) is close to the origin, the area OADC decreases and the area ABCD increases, and the game player is more likely to choose an information-sharing strategy. Conversely, if the value of the critical point D(x * , y * ) becomes larger, the area of OABC becomes larger, the area of ABCD decreases, and the two sides of the game are more likely to tend to nonsharing of information. e change in the critical point D(x * , y * ) is closely related to the parameters of both parties. Among them, the area of ABCD is as follows: From the above evolutionary game analysis process, it can be seen that whether a logistic service supply chain node enterprise will choose to share information depends on the enterprise's own capabilities, the payment matrix of the evolutionary game, and the initial values of various    is study uses critical points D(x * , y * ) to analyze various parameters that may affect the outcome of the evolutionary game. From , it can be seen that the information-sharing cost, risk coefficient, incentive coefficient, synergy coefficient, information absorption and utilization capacity, and information-sharing degree of each node of the supply chain are important factors that affect the size of the critical point.
Under uncertain market conditions, customer demand is generally price-sensitive. erefore, the market logistic service demand Q faced by integrators is uncertain. Here, the random variable Q has the characteristics of the probability distribution F (Q), and the customer enterprise logistic service demand can be expressed by the following formula: Among them, initial demand volume is the initial demand for logistic services, volume decrease rate is the slope of change in service demand, volume variation range is the range of change in service demand, and variation cycle is the price cycle of service demand changes. e change in customer demand described by a sine curve is shown in Figure 4.
From Figure 4 above, we can see the impact of price changes on the anticipated demand for logistic services by client companies. Demirkan (2008) uses a normal distribution function to describe the effect of random demand on price. In order to facilitate model analysis and calculation, this study uses a uniform distribution function to express the demand price sensitivity in the logistic service supply chain model, that is, we assume that the demand for logistic services of price-sensitive client companies in a period is uniformly distributed in the interval [Q(p) − θ, Q(p) + θ] (θ is the demand fluctuation coefficient, θ > 0), as shown in Figure 5 below as follows: Among them, a is a known constant, such as the actual demand in the previous cycle. b is a constant, which is the price sensitivity coefficient of market demand, a>, and b > 0.
In order to simplify the model, this study does not consider the marginal cost of both the supply chain and the demand side, and directly uses revenue instead of profit for calculation. According to the uniform distribution probability density function F (Q) in the above figure, the expected profit function of the integrator is as follows: e first term in formula (15) represents the income when the actual logistic service demand is less than the logistic service capacity S purchased by the integrator. e second term represents the income when the actual logistic service demand is greater than the logistic service capacity S purchased by the integrator. e income of the logistic service provider is equal to the product of the logistic service capability S purchased by the integrator and the unit logistic service price V. e cost of the provider is mainly composed of two parts. One is the unit logistic service capacity cost m, such as fixed costs such as logistic elements, which reflect the normal economic scope of capacity. e other is the operation and management cost n, which is related to the management of the enterprise and mainly includes the cost of improving the management ability and the increase in the complexity of the business model.
at is, the profit function of the logistic service provider is as follows: Due to the randomness of customer demand, uncertain market demand will affect the logistic service costs of integrators and providers. When the logistic service capabilities cannot meet customer needs, integrators and provider groups will incur lost opportunity costs. When the logistic service capacity is higher than the customer's demand, this will produce waste. e expected cost when the logistic service capacity purchased by the integrator is lower than the actual logistic demand is as follows: e parameter α represents the opportunity cost of unit loss caused when the customer's needs cannot be met. erefore, the expected cost when the logistic service capability purchased by the integrator is higher than the logistic demand is as follows: Unlike the product supply chain, logistic services are intangible and perishable. erefore, excess service capacity neither generates inventory nor residual value. e single-loop information flow mode refers to the unidirectional flow of information on the chain. In this model, logistic service supply chain integrators and providers independently predict the logistic demand of the market, and there is no demand information sharing between the two. e integrator makes the logistic service integration planning decision based on the customer's demand information, and the provider makes the logistic service supply planning decision based on the integrator's order information, as shown in Figure 6.
Under the single-loop information-sharing model, integrators and providers reach a consensus on services through negotiation. In this mode, because the integrator directly contacts with the customer and grasps important customer information and market demand status, it belongs to the dominant party, and the provider belongs to the follower. erefore, the logistic service integrator first maximizes its expected profit and determines the optimal purchase amount S. However, integrators will generate uncertain capacity risks and need to bear the uncertain cost of logistic service volume. erefore, the expected profit function of the integrator is as follows: However, the provider's profit function is Ψ Supply � Π Supply , and the provider determines the optimal price V through the integrator's service purchase volume S. We assume that dΨ Supply /dS � V − m − 2nS � 0, and the relationship between the provider's optimal pricing and purchase volume can be obtained as follows:

Mobile Information Systems
Incorporating formula (20) into the integrator's profit function equation (19), when the following two conditions are met, the integrator's own expected profit is the largest as follows: According to equation (22), the optimal purchase quantity of the integrator can be obtained as follows: It is the optimal logistic service volume of the logistic service supply chain, and the provider determines the optimal unit logistic service capacity price V through the optimal purchase volume S to maximize its own revenue. en, the total expected profit of the logistic service supply chain is as follows: We bring the optimal solution S 1 into formulas (16), (19), and (23) to obtain the expected profits of logistic service providers, integrators, and the entire supply chain, respectively. e collaborative control information flow model is an information-sharing model led by logistic service integrators.
e integrator takes the initiative to share the customer's logistic service demand information with the provider for collaboration. In this mode, the provider makes   logistic service supply planning decisions based on the integrator's order information and the customer's service demand information, as shown in Figure 7.
Under this information flow model, information asymmetry may occur between the integrator and the provider. at is, the order volume predicted by the integrator differs from the customer demand predicted by the provider. At this time, the provider coordinates the supply chain by adjusting the number S of logistic service capabilities. erefore, the cost of uncertain capacity is borne by the provider. However, the integrator only needs to bear the purchase cost of the logistic service capability, that is, the expected profit function of the integrator is as follows: When formula (15) satisfies the following two conditions, the integrator expects the profit to be maximized as follows: From equation (26), the optimal purchase amount of the integrator can be obtained as follows: is shows that when integrators do not have to bear the cost of uncertain capabilities; in order to meet customer needs, integrators always tend to purchase the maximum amount of logistic services.  Substituting formula (26) into the expected profit function of the provider, we get the following: We assume that dΨ Supply /dS � − 2nS + V − m � 0, and the optimal service volume of the available provider is S Supply � V − m/2n, that is, V � m + 2nS. It shows that no matter how the cost of the provider changes, the optimal pricing strategy is always only related to the volume of logistic services. In order to balance the capabilities of the entire supply chain, the integrator's purchase volume should be equal to the provider's supply volume. We assume dS collection /dP � − b < 0, and S collection is a monotonically decreasing function of P. We assume dS Supply /dV � 1/2n > 0, and S Supply is a monotonically increasing function of V. It shows that there must be a unique equilibrium solution for S collection � S Supply to maximize the profits of both, that is, P � 2n(a + θ) − V + m/2nb. e provider decides the price V that maximizes its own interests based on the integrator's maximum purchase volume, and the integrator decides the price P for the customer on the basis of the provider's price V. e total expected profit of the logistic service supply chain is as follows: We bring the optimal solution of S 2 � S collection � S Supply into formulas (15), (23), and (26) to obtain the expected profits of logistic service integrators, providers, and the entire supply chain. e centralized control information flow model is a way to use information technology to share information in the supply chain network. In this model, a decentralized supply chain can achieve optimal organizational performance. Information sharing among supply chain members can produce  deterministic changes, such as reducing or eliminating the "bullwhip effect." e use of information transmission and interaction technology to increase vertical information sharing can improve the service performance of providers in the logistic service supply chain and the entire supply chain. Providers use information-sharing technology to shorten the distance with customers and can synchronize with integrators to obtain customer logistic demand information in the market, and providers can directly make service supply chain decisions based on customer demand information. In this way, the provider can take the initiative to adopt corresponding strategies to support the integrator's decision-making, in order to achieve the balance of capabilities of the entire logistic service supply chain, as shown in Figure 8.
Under this information-sharing model, in the logistic service supply chain of integrators, providers, and customer enterprises, each member shares market demand information and makes unified decisions, with the goal of maximizing the overall benefits of the logistic service supply chain. erefore, the expected profit of the entire supply chain is the sum of the expected profit of the integrator and the provider. Subsequently, the uncertain capacity cost is eliminated, and the cost is ultimately borne by the integrator and the provider. To simplify the model and     Figure 11: e processing effect of the safe financial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios.
calculations, we assume that the commitment ratio is 1 : 1, that is, . erefore, the total revenue of the supply chain is simply calculated as follows: In order to maximize the total revenue of the supply chain, the following two conditions must be met as follows: According to formula (29), the optimal logistic service volume of the supply chain is as follows: We assume that dΨ collection /dS � − 2P − V + α/4θS We assume that dΨ Supply /dS � − (V + α/4θ + 2n)S + V + α/4θ(a − bP + θ) + V/2m � 0, and the optimal service volume of the available provider is

The Safe Financial Processing Method for Realizing Supply Chain Integrated Business Intelligence Using Blockchain Application Scenarios
On the basis of the above algorithm analysis, the blockchain application scenario is used to realize the secure financial processing of supply chain integrated business intelligence, and the model in this study is constructed and the performance is analyzed. e behaviors and activities of multiple participating entities involved in the development of supply chain finance business, banks, core enterprises, upstream and downstream enterprises, and related service entities must comply with commercial rules and contract requirements. However, the complex structure and sophistication of business operations increase the difficulty of risk control for banks. e characteristics of blockchain technology can effectively meet the control of the causes of supply chain financial risks. e application of blockchain to the supply chain financial business can effectively reduce the difficulty of business risk management, thereby reducing the probability of risk occurrence. Figure 9 shows the operating mechanism of blockchain technology embedded in supply chain financial services.
As shown in Figure 10, the core functions of the supply chain platform mainly include four parts: real-name authentication, credential management, financing management, and capital management and control.
Based on the above model, the safe financial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios was validated, and the results shown in Figure 11 below were obtained. From the results shown in Figure 11 above, the safe financial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios has good results. On this basis, this study clusters the effects of the model and obtains the results shown in Figure 12.
From the above analysis, it can be seen that the safe financial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios has good results and can play an important role in the safe financial processing of supply chain integrated business intelligence.

Conclusions
e blockchain-based supply chain financial system mainly uses core companies and suppliers to record the information involved in transactions. When the core enterprise participates in the transaction in the supply chain financial system, it only needs to confirm the transaction order with the corresponding private key, which reduces the risk of banks and other financial institutions in the supply chain to a certain extent. Furthermore, the reduction in financing risks has further reduced the financing costs of participating companies in the supply chain and promoted the efficient operation of the supply chain financial system. In addition, the blockchain-based supply chain financial system uses smart contracts to replace manual operations.
is study combines the blockchain technology to analyze the security financial management of the supply chain integrated business intelligence, builds an intelligent system, and verifies the performance of the system to improve the security financial management effect of the supply chain integrated business intelligence. e experimental research results show that the safe financial processing method for realizing supply chain integrated business intelligence using blockchain application scenarios has good results.

Data Availability
e data used to support the findings of this study are included within the article.

Conflicts of Interest
e authors declare that there are no conflicts of interest regarding this work.