CN115442108A - Data transmission method and device based on alliance chain - Google Patents

Data transmission method and device based on alliance chain Download PDF

Info

Publication number
CN115442108A
CN115442108A CN202211054455.2A CN202211054455A CN115442108A CN 115442108 A CN115442108 A CN 115442108A CN 202211054455 A CN202211054455 A CN 202211054455A CN 115442108 A CN115442108 A CN 115442108A
Authority
CN
China
Prior art keywords
user
target node
data
node
sent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211054455.2A
Other languages
Chinese (zh)
Inventor
洪烨嵘
赵尊晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211054455.2A priority Critical patent/CN115442108A/en
Publication of CN115442108A publication Critical patent/CN115442108A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The application discloses a data transmission method and device based on a alliance chain, which are applied to the technical field of alliance chains. The method comprises the following steps: the method comprises the steps that first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node are received; and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node. The first alliance chain determined based on the plurality of user nodes in the application can receive first data which are sent by the first user node and comprise user credit investigation information, and then the first data can be sent to a target node. Therefore, a plurality of nodes form a federation chain, a plurality of organizations participate in management together, and each organization or organization manages one or more nodes, so that data can be transmitted among the plurality of nodes and data can be read and written. The problem that the user credit investigation information among various banks or financial institutions is not intercommunicated in the prior art is solved.

Description

Data transmission method and device based on alliance chain
Technical Field
The present application relates to the field of alliance chain technology, and in particular, to a data transmission method based on alliance chain.
Background
The credit investigation information can effectively reflect the income or the operation condition of the information main body, measure the repayment capacity of the information main body and well establish a payment credit information file for each enterprise and each individual. By establishing a credit investigation information account for each enterprise and each individual, the enterprises and the individuals can have self-owned rights for using credit information such as payment of the enterprises and the individuals, so that the purpose that 'my information is owned' is realized, and a credit record is established for 'credit white users'. Helping enterprises and individuals to carry out financing activities.
At present, each bank or financial institution has its own independent credit investigation system for managing the credit investigation of the user of the institution, but there is a problem that the credit investigation information of the user between the banks or financial institutions is not intercommunicated, for example, the user can not go to bank B to transact loan and other services through the credit investigation information of bank A. The information island problem exists, and the user satisfaction degree is poor.
Therefore, how to communicate credit information of users between banks or financial institutions and improve the satisfaction of users is a technical problem that needs to be solved urgently by those skilled in the art.
Disclosure of Invention
The application provides a data transmission method based on a alliance chain, so that the user credit investigation information among various banks or financial institutions can be communicated, the satisfaction degree of the user is improved, and the application also provides a mortgage device based on the block chain.
In a first aspect, the present application provides a data transmission method based on a federation chain, including:
receiving first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node; the first data comprises user credit investigation information;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
Optionally, before receiving the first data sent by the first user node, the method further includes:
acquiring a plurality of user nodes;
determining a first federation chain based on the plurality of user nodes, the first federation chain being used for inter-node transmission of data.
Optionally, the sending, in response to receiving decryption verification passing information sent by a target node, the first data to the target node according to a user credit information obtaining instruction sent by the target node, includes:
sending a first signature obtained by encrypting a first user node to a target node; so that the target node decrypts the first signature;
if the first digest obtained after the first signature is decrypted is equal to the second digest obtained by the target node, the decryption verification is passed, and decryption verification passing information sent by the target node is received;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
Optionally, the method further includes:
acquiring user data;
and determining the user portrait according to the user data and the user credit information.
Optionally, the method further includes:
and recommending intelligent products for the user according to the user portrait, and/or intercepting abnormal transactions for the user.
In a second aspect, the present application further provides a federation chain-based data transmission apparatus, including:
the first receiving unit is used for receiving first data sent by a first user node and a user credit information acquisition instruction sent by a target node; the first data comprises user credit investigation information;
and the response unit is used for responding to the decryption verification passing information sent by the receiving target node and sending the first data to the target node according to the instruction for acquiring the user credit investigation information sent by the target node.
Optionally, before receiving the first data sent by the first user node, the apparatus further includes:
a second obtaining unit, configured to obtain a plurality of user nodes;
a first determining unit, configured to determine a first federation chain based on the plurality of user nodes, where the first federation chain is used for inter-node data transmission.
Optionally, the method is specifically used for:
sending a first signature obtained by encrypting a first user node to a target node; so that the target node decrypts the first signature;
if the first digest obtained after the first signature is decrypted is equal to the second digest obtained by the target node, the decryption verification is passed, and decryption verification passing information sent by the target node is received;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
Optionally, the apparatus further comprises:
a third acquisition unit configured to acquire user data;
and the second determining unit is used for determining the user portrait according to the user data and the user credit information.
Optionally, the apparatus further comprises:
and the recommendation intercepting unit is used for recommending intelligent products for the user according to the user portrait and/or intercepting abnormal transactions for the user.
In a third aspect, an embodiment of the present application provides an apparatus, which includes a memory configured to store instructions or codes and a processor configured to execute the instructions or codes, so as to cause the apparatus to perform the method of any one of the foregoing first aspects.
In a fourth aspect, an embodiment of the present application provides a computer storage medium, where codes are stored in the computer storage medium, and when the codes are executed, an apparatus executing the codes implements the method according to any one of the foregoing first aspects.
Compared with the prior art, the method has the following beneficial effects:
the method comprises the steps of receiving first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node; the first data comprises user credit information; and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a command for acquiring user credit investigation information sent by the target node. The first alliance chain determined based on the plurality of user nodes can receive first data which are sent by the first user node and comprise user credit investigation information, and then the first data can be sent to a target node. Therefore, a plurality of private chains (each node bank node) form a alliance chain (shared platform), a plurality of organizations participate in management together, each organization or organization manages one or more nodes, and data can be transmitted among the plurality of nodes and read and write. The problem that in the prior art, user credit investigation information among various banks or financial institutions is not intercommunicated, and therefore information islanding is caused is solved.
Drawings
To illustrate the technical solutions in the present embodiment or the prior art more clearly, the drawings needed to be used in the description of the embodiment or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a flowchart of a data transmission method based on a federation chain according to an embodiment of the present application;
fig. 2 is a flowchart of another federation chain-based data transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an embodiment of a federation link-based data transmission apparatus provided in the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without any creative effort belong to the protection scope of the present application.
It should be noted that the data transmission method and apparatus based on the alliance chain provided by the present application are used in the technical field of block chains. The foregoing is merely an example, and does not limit the application field of the method and apparatus name provided in the present application.
The credit investigation information can effectively reflect the income or the operation condition of the information main body, measure the repayment capacity of the information main body and well establish a payment credit information file for each enterprise and each individual. By establishing a credit investigation information account for each enterprise and each individual, the enterprises and the individuals can have self-owned rights for using credit information such as payment of the enterprises and the individuals, so that the purpose that 'my information is owned' is realized, and a credit record is established for 'credit white users'. Helping enterprises and individuals to carry out financing activities.
At present, each bank or financial institution has an independent credit investigation system for managing credit investigation of users of the own institution, but the problem exists that the credit investigation information of the users between the banks or financial institutions is not intercommunicated, for example, the users can not go to bank B to transact services such as loan and the like through the credit investigation information of bank A. The information islanding problem exists, and the user satisfaction degree is poor.
The inventor provides the technical scheme of the application through research, and the application receives first data sent by a first user node and a user credit information acquisition instruction sent by a target node; the first data comprises user credit information; and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node. The first alliance chain determined based on the plurality of user nodes in the application can receive first data which are sent by the first user node and comprise user credit investigation information, and then the first data can be sent to a target node. Thus, a plurality of private chains (each node bank node) form a alliance chain (shared platform), a plurality of organizations participate in management together, each organization or organization manages one or more nodes, and data can be transmitted among the plurality of nodes and read and write data. The problem that in the prior art, user credit investigation information among various banks or financial institutions is not intercommunicated, and therefore information islanding is caused is solved. The method provided by the embodiment of the application can be applied to a block chain comprising at least one preset node and a plurality of third-party nodes.
In order that those skilled in the art will better understand the disclosure, the following detailed description is given with reference to the accompanying drawings. Take the first device as an example.
Fig. 1 is a flowchart of a data transmission method based on a federation chain according to an embodiment of the present application. As shown in fig. 1, the method includes:
s101: and receiving first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node.
The first device may acquire a plurality of user nodes, determine a first federation chain based on the plurality of user nodes, and then may receive first data sent by the first user node and a user credit information acquisition instruction sent by a target node. Wherein the first alliance chain is used for transmitting data among the nodes. The first data comprises user credit information instructions.
Further, a federation chain (shared platform) may be formed by multiple private chains (individual commercial bank nodes) with multiple enterprises participating in the administration, each organization or enterprise managing one or more nodes whose data only allows different enterprises in the federation chain to read, write, and send. Each node of the federation chain usually has an organization of the entity organization corresponding to the node, and can join and leave the network only after authorization. Organizations form interest-related alliances that collectively maintain healthy operation of blockchains. The data is not disclosed as default rather than in a public chain, and the data in the federation chain is limited to nodes in the federation for access.
The block chain of the alliance can be regarded as an account book, each block can be regarded as a page of account book, and the page of account book is formed by linking the block chains through recording the time sequence. The block is divided into a block head part and a block body part. The chunk header generally includes a header hash, a parent hash, a timestamp, and other information. The parent hash refers to the address of the last block. The block body contains a data record of all value exchanges that occur during the creation of the verified block. The system account book data on the chain is stored by adopting a 'Mercker tree'. All data service logs are recorded in leaf nodes of the tree, the data service logs are traced back from one level to the top and finally to a tree root, and otherwise, each transaction detail is traced back through the tree root. The tree root is the hash value of the whole transaction set, and as long as any node in the tree is tampered, the root node hashes cannot be matched, so that the aim of checking can be fulfilled.
S102: and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
And the first device receives decryption verification passing information sent by the target node, and sends first data to the target node according to a command for acquiring user credit investigation information sent by the target node.
Further, the digital identity authentication can be realized by a digital signature technology, and the specific process is as follows: the first user node can carry out hash operation on the original text information to obtain a hash value, namely a digital abstract MD; the first user node encrypts the digital abstract MD by using a private key PVA of the first user node and adopting an asymmetric RSA algorithm to obtain a digital signature DS; the first user node encrypts the original text information, the digital signature SD and the public key PBA of the certificate by using a symmetric key SK of a symmetric algorithm DES through a symmetric algorithm to obtain encrypted information E; the first user node encrypts the symmetric key SK with the public key PBB of the target node by adopting an RSA algorithm to form a digital envelope DE as if the symmetric key SK is installed in an envelope encrypted with the public key of the target node; the first user node sends the encryption information E and the digital envelope DE to a target node together through a alliance chain; after receiving the digital envelope DE, the target node firstly decrypts the digital envelope by using a private key PVB of the target node and takes out a symmetric key SK; then, decrypting the encrypted information E by using the symmetric key SK through a DES algorithm, and restoring original text information, a digital signature SD and a public key PBA of a first user node certificate; the target node verifies the digital signature, and the digital signature is decrypted by using a public key of the first user node to obtain a digital abstract MD; meanwhile, the original text information is subjected to the same Hash operation to obtain a new digital abstract MD'; and comparing the two digital digests MD and MD' to verify whether the original text is modified. If the two are equal, the data is not tampered, the signature is transmitted in a secret mode, the signature is real, the decryption verification is passed, and the first device can receive decryption verification passing information sent by the target node.
The method comprises the steps that first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node are received; the first data comprises user credit information; and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node. The first alliance chain determined based on the plurality of user nodes in the application can receive first data which are sent by the first user node and comprise user credit investigation information, and then the first data can be sent to a target node. Therefore, a plurality of private chains (each node bank node) form a alliance chain (shared platform), a plurality of organizations participate in management together, each organization or organization manages one or more nodes, and data can be transmitted among the plurality of nodes and read and write. The problem that in the prior art, user credit investigation information among various banks or financial institutions is not intercommunicated, and therefore information islanding is caused is solved.
Fig. 2 is a flowchart of another data transmission method based on a federation chain according to an embodiment of the present application, where the flowchart is shown in fig. 2 and includes:
s201: and receiving first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node.
The first data comprises user credit information;
s202: and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
S203: user data is obtained.
The first device can obtain user data, wherein the user data can be user transaction data, user transaction detail data and the like, a user information view, an account information view, a transaction counter-hand-turning rate, a transaction fluctuation rate, an asset liability ratio and the like of a user in a near preset time period are constructed, and the preset time period can be set according to requirements.
S204: and determining the user portrait according to the user data and the user credit information.
The first device may determine a user representation based on the user data and the user credit information.
S205: and recommending intelligent products for the user according to the user portrait, and/or intercepting abnormal transactions for the user.
The first device may recommend smart products to the user based on the user representation and/or intercept anomalous transactions for the user. For example, if the user is presumed to be a credit, credit-grade or high-consumption customer based on the user representation, financial products may be recommended to the user, or user transactions may be detected to intercept abnormal transactions for the user in order to prevent the user from being cheated and causing the user to lose money.
The foregoing provides some specific implementation manners of the data transmission method based on the federation chain for the embodiment of the present application, and based on this, the present application also provides a corresponding apparatus. In the following, a device provided in the embodiments of the present application will be described in terms of functional modularization, and the device and the above-described federation chain-based data transmission method may be referred to correspondingly.
Fig. 3 is a schematic structural diagram of an embodiment of a federation chain-based data transmission apparatus provided in the present application, which is referred to as an embodiment three, and the apparatus described with reference to fig. 3 may include:
a first receiving unit 300, configured to receive first data sent by a first user node and a user credit information acquisition instruction sent by a target node; the first data comprises user credit investigation information;
a responding unit 310, configured to, in response to receiving the decryption verification passing information sent by the target node, send the first data to the target node according to the instruction for obtaining user credit investigation information sent by the target node.
Optionally, before receiving the first data sent by the first user node, the apparatus further includes:
a second obtaining unit, configured to obtain a plurality of user nodes;
a first determining unit, configured to determine a first federation chain based on the plurality of user nodes, where the first federation chain is used for inter-node data transmission.
Optionally, the method is specifically used for:
sending a first signature obtained by encrypting a first user node to a target node; so that the target node decrypts the first signature;
if the first digest obtained after the first signature is decrypted is equal to the second digest obtained by the target node, the decryption verification is passed, and decryption verification passing information sent by the target node is received;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
Optionally, the apparatus further comprises:
a third acquiring unit for acquiring user data;
and the second determining unit is used for determining the user portrait according to the user data and the user credit information.
Optionally, the apparatus further comprises:
and the recommendation intercepting unit is used for recommending intelligent products for the user according to the user portrait and/or intercepting abnormal transactions for the user.
A first receiving unit 300 of the apparatus of the present application receives first data sent by a first user node and a user credit information obtaining instruction sent by a target node; the first data comprises user credit investigation information; the response unit 310 responds to receiving decryption verification passing information sent by a target node, and sends the first data to the target node according to a user credit information obtaining instruction sent by the target node. The apparatus of the present application may receive first data including user credit investigation information sent by a first user node based on a first federation chain determined by a plurality of user nodes, and then may send the first data to a target node. Thus, a plurality of private chains (each node bank node) form a alliance chain (shared platform), a plurality of organizations participate in management together, each organization or organization manages one or more nodes, and data can be transmitted among the plurality of nodes and read and write data. The problem that in the prior art, user credit investigation information among various banks or financial institutions is not intercommunicated, and therefore information islanding is caused is solved.
The embodiment of the application also provides corresponding equipment and a computer storage medium, which are used for realizing the scheme provided by the embodiment of the application.
Wherein the apparatus comprises a memory for storing instructions or code and a processor for executing the instructions or code to cause the apparatus to perform the method of any embodiment of the present application.
The computer storage medium has code stored therein, and when the code is executed, an apparatus for executing the code implements the method according to any embodiment of the present application.
In the embodiments of the present application, the names "first" and "second" (if present) in the names "first" and "second" are used for name identification, and do not represent the first and second in sequence.
As can be seen from the above description of the embodiments, those skilled in the art can clearly understand that all or part of the steps in the method of the above embodiments may be implemented by software plus a general hardware platform. Based on such understanding, the technical solution of the present application may be embodied in the form of a software product, which may be stored in a storage medium, such as a read-only memory (ROM)/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device (which may be a personal computer, a server, or a network communication device such as a router) to execute the method according to the embodiments or some parts of the embodiments of the present application.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, the apparatus embodiments are substantially similar to the method embodiments and therefore are described in a relatively simple manner, and reference may be made to some of the description of the method embodiments for relevant points. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement without inventive effort.
The above description is only an exemplary embodiment of the present application, and is not intended to limit the scope of the present application.

Claims (10)

1. A data transmission method based on a alliance chain is characterized by comprising the following steps:
receiving first data sent by a first user node and a user credit investigation information acquisition instruction sent by a target node; the first data comprises user credit information;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
2. The method of claim 1, wherein prior to receiving the first data transmitted by the first user node, the method further comprises:
acquiring a plurality of user nodes;
determining a first federation chain based on the plurality of user nodes, the first federation chain being used for inter-node transmission of data.
3. The method as claimed in claim 1, wherein said sending the first data to the target node according to the instruction for obtaining user credit information sent by the target node in response to receiving the decryption verification passing information sent by the target node comprises:
sending a first signature obtained by encrypting a first user node to a target node; so that the target node decrypts the first signature;
if the first digest obtained after the first signature is decrypted is equal to the second digest obtained by the target node, the decryption verification is passed, and decryption verification passing information sent by the target node is received;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a command for acquiring user credit investigation information sent by the target node.
4. The method of claim 1, further comprising:
acquiring user data;
and determining the user portrait according to the user data and the user credit information.
5. The method of claim 4, further comprising:
and recommending intelligent products for the user according to the user portrait, and/or intercepting abnormal transactions for the user.
6. A federation chain-based data transmission apparatus, comprising:
the first receiving unit is used for receiving first data sent by a first user node and a user credit information acquisition instruction sent by a target node; the first data comprises user credit information;
and the response unit is used for responding to the decryption verification passing information sent by the receiving target node and sending the first data to the target node according to the instruction for acquiring the user credit information sent by the target node.
7. The apparatus of claim 6, wherein prior to receiving the first data transmitted by the first user node, the apparatus further comprises:
a second obtaining unit, configured to obtain a plurality of user nodes;
a first determining unit, configured to determine a first federation chain based on the plurality of user nodes, where the first federation chain is used for inter-node data transmission.
8. The apparatus according to claim 6, wherein the response unit is specifically configured to:
sending a first signature obtained by encrypting a first user node to a target node; so that the target node decrypts the first signature;
if the first digest obtained after the first signature is decrypted is equal to the second digest obtained by the target node, the decryption verification is passed, and decryption verification passing information sent by the target node is received;
and responding to the received decryption verification passing information sent by the target node, and sending the first data to the target node according to a user credit information acquisition instruction sent by the target node.
9. The apparatus of claim 7, further comprising:
a third acquisition unit configured to acquire user data;
and the second determining unit is used for determining the user portrait according to the user data and the user credit information.
10. The apparatus of claim 9, further comprising:
and the recommendation intercepting unit is used for recommending intelligent products for the user according to the user portrait and/or intercepting abnormal transactions for the user.
CN202211054455.2A 2022-08-31 2022-08-31 Data transmission method and device based on alliance chain Pending CN115442108A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211054455.2A CN115442108A (en) 2022-08-31 2022-08-31 Data transmission method and device based on alliance chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211054455.2A CN115442108A (en) 2022-08-31 2022-08-31 Data transmission method and device based on alliance chain

Publications (1)

Publication Number Publication Date
CN115442108A true CN115442108A (en) 2022-12-06

Family

ID=84243805

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211054455.2A Pending CN115442108A (en) 2022-08-31 2022-08-31 Data transmission method and device based on alliance chain

Country Status (1)

Country Link
CN (1) CN115442108A (en)

Similar Documents

Publication Publication Date Title
CN109639753B (en) Data sharing method and system based on block chain
RU2726157C1 (en) Recovering encrypted transaction information in confidential transactions with blockchain
US10673632B2 (en) Method for managing a trusted identity
JP6524347B2 (en) Information sharing system
US11366910B2 (en) Method and system for secure applications using blockchain
US11962681B2 (en) Symmetric encryption for private smart contracts among multiple parties in a private peer-to-peer network
CN108683509A (en) A kind of method for secure transactions, apparatus and system based on block chain
CN110990855A (en) Block chain information recording and inquiring method, device and system
CN113347008B (en) Loan information storage method adopting addition homomorphic encryption
CN105022966A (en) Database data encryption and decryption method and system
CN112347517B (en) KYC compliance supervision system based on multi-party safety calculation
CN112991045B (en) Medical health consumption financing method, device, equipment and medium based on blockchain
US20220407729A1 (en) Data processing method and apparatus, device, and medium
CN113015991A (en) Secure digital wallet processing system
CN110135175A (en) Information processing, acquisition methods, device, equipment and medium based on block chain
KR102014647B1 (en) Electronic voting method based on blockchain
CN112801778A (en) Federated bad asset blockchain
CN111639938A (en) Data processing method, device, equipment and medium
KR102085997B1 (en) Method and system for real estate transaction service based on block chain
CN111861479A (en) Financial institution client identity recognition method based on block chain and 5G technology
KR102376783B1 (en) The blockchain-based transaction history confirmation system
CN102332068A (en) On-line logistics encryption, authentication and storage system using universal serial bus key (USBKEY)
CN116702195A (en) Transaction privacy protection method, device and storage medium based on blockchain
CN111861736B (en) Block chain based government affair data processing method, device, equipment and medium
CN115442108A (en) Data transmission method and device based on alliance chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination