CN107451485A - A kind of data processing method and equipment based on block chain - Google Patents

A kind of data processing method and equipment based on block chain Download PDF

Info

Publication number
CN107451485A
CN107451485A CN201710407238.XA CN201710407238A CN107451485A CN 107451485 A CN107451485 A CN 107451485A CN 201710407238 A CN201710407238 A CN 201710407238A CN 107451485 A CN107451485 A CN 107451485A
Authority
CN
China
Prior art keywords
data
user
contract
access
assessment
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710407238.XA
Other languages
Chinese (zh)
Other versions
CN107451485B (en
Inventor
赵星
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201710407238.XA priority Critical patent/CN107451485B/en
Publication of CN107451485A publication Critical patent/CN107451485A/en
Application granted granted Critical
Publication of CN107451485B publication Critical patent/CN107451485B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2149Restricted operating environment

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of data processing method and equipment based on block chain, including:Block chain node it is determined that established between the first user and second user contractual relation when, based on contractual relation, obtain the user behavior data associated with contractual relation, and determine the data access authority of user behavior data;According to the preset relation between data access authority and processing strategy, the processing strategy of user behavior data is determined, the processing rule to match with the data access authority is included during processing is tactful;The user behavior data is handled using processing strategy.Utilize block chain technology, it is different based on data access authority corresponding to user behavior data, using different processing modes, data storage after being handled with guarantee is in block chain node, data have been effectively ensured to be not tampered with, so that the accuracy of the credit data of the user subsequently obtained according to these data assessments improves, and then realize and the risk of internet financial business is control effectively.

Description

A kind of data processing method and equipment based on block chain
Technical field
The application is related to internet information processing technology field and field of computer technology, more particularly to one kind is based on area The data processing method and equipment of block chain.
Background technology
With the development of science and technology, economic form is from monetary economy form to credit economy Form Development.It is so-called Credit economy refers to realize the exchange of commodities or financial transaction using credit as the media of exchange.Here credit refers to be attached to A kind of relations of production of the mutual trust formed between different subjects between commodity transaction and social relationships.Based on this letter With can establish contractual relation among different users or between user and trade company, can be realized by this contractual relation The exchange of commodities or financial transaction.
So-called contract refer to relevant particular event that both sides or multi-party joint consultation conclude (such as:Dealing, mortgage, rent Rent) legal documents.Based on the legal documents, in both sides or multi-party the foundation contractual relation relevant with particular event. Defined in the legal documents and conclude both sides or multi-party rights and duties, both sides or needed in many ways according to the legal documents Described in rights and duties fulfil corresponding obligation.
With the development of Internet technology, internet financial business also gradually grows up.In order to reduce internet finance The risk of business is general at present that the carrying out of a contract ability of user is carried out using B2C (Business-to-Customer) modes Assess, and then obtain the credit data of the user, such internet financial service platform can be according to the letter of the obtained user With data corresponding internet financial service is provided for the user.
But the risk being tampered be present in the credit data for the user for analyzing to obtain by internet platform, once user Credit data be tampered, then financial service platform in internet is carried for the user further according to the credit data of the user after distorting For corresponding internet financial service, this will bring great risk to internet financial service platform.
As can be seen here, need a kind of data processing method badly, have what is be tampered for solving credit data in the prior art Problem.
The content of the invention
In view of this, the embodiment of the present application provides a kind of data processing method and equipment based on block chain, for solving Certainly in the prior art there is the problem of being tampered in credit data.
The embodiment of the present application uses following technical proposals:
The embodiment of the present application provides a kind of data processing method based on block chain, including:
Block chain node determines the contractual relation established between the first user and second user;
Based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and determine the use The data access authority of family behavioral data;
According to data access authority and the preset relation between strategy is handled, determines the processing plan of the user behavior data Slightly, the processing rule to match with the data access authority is included in the processing strategy;
The user behavior data is handled using the processing strategy.
The embodiment of the present application also provides a kind of data processing equipment based on block chain, including:
Determining unit, determine the contractual relation established between the first user and second user;
Acquiring unit, based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and really The data access authority of the fixed user behavior data;
Processing unit, according to the preset relation between data access authority and processing strategy, determine the user behavior number According to processing strategy, include the processing rule to match with the data access authority in the processing strategy;And described in utilizing Processing strategy is handled the user behavior data.
Above-mentioned at least one technical scheme that the embodiment of the present application uses can reach following beneficial effect:
In the technical scheme that the embodiment of the present application provides, block chain node is it is determined that between the first user and second user During the contractual relation of foundation, based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and really The data access authority of the fixed user behavior data;According to data access authority and the preset relation between strategy is handled, really The processing strategy of the fixed user behavior data, the processing to match with the data access authority is included during the processing is tactful Rule;The user behavior data is handled using the processing strategy.The contract that platform foundation is signed by contract is closed System, for the caused associated user behavior data during carrying out of a contract, using block chain technology, based on user behavior Data access authority corresponding to data is different, and using different processing modes, the data storage after being handled with guarantee is in block chain In node, data are effectively ensured and have been not tampered with so that the credit data of the user subsequently obtained according to these data assessments Accuracy improves, and then realizes and the risk of internet financial business is control effectively.
Brief description of the drawings
Accompanying drawing described herein is used for providing further understanding of the present application, forms the part of the application, this Shen Schematic description and description please is used to explain the application, does not form the improper restriction to the application.In the accompanying drawings:
Fig. 1 is a kind of schematic flow sheet for data processing method that the embodiment of the present application provides;
Fig. 2 is a kind of schematic flow sheet for data processing method that the embodiment of the present application provides;
Fig. 3 is a kind of schematic flow sheet for data processing method that the embodiment of the present application provides;
The contract that Fig. 4 is the first user that the embodiment of the present application provides signs request schematic diagram;
Fig. 5 is the carrying out of a contract schematic diagram for the first user that the embodiment of the present application provides;
Fig. 6 is that the contractual capacity for the second user that the embodiment of the present application provides assesses schematic diagram;
Fig. 7 is a kind of schematic flow sheet for data processing method based on block chain that the embodiment of the present application provides;
Fig. 8 is a kind of structural representation for data processing equipment that the embodiment of the present application provides;
Fig. 9 is a kind of structural representation for data processing equipment that the embodiment of the present application provides;
Figure 10 is a kind of structural representation for data processing equipment that the embodiment of the present application provides;
Figure 11 is a kind of structural representation for data processing equipment based on block chain that the embodiment of the present application provides;
Figure 12 is a kind of structural representation for data handling system that the embodiment of the present application provides.
Embodiment
In order to realize the purpose of the application, the embodiment of the present application provide a kind of data processing method based on block chain and Equipment, block chain node it is determined that established between the first user and second user contractual relation when, based on the contractual relation, The user behavior data associated with the contractual relation is obtained, and determines the data access authority of the user behavior data; According to the preset relation between data access authority and processing strategy, the processing strategy of the user behavior data is determined, it is described The processing rule to match with the data access authority is included in processing strategy;Using the processing strategy to user's row Handled for data.The contractual relation of platform foundation is signed by contract, for the caused correlation during carrying out of a contract The user behavior data of connection, it is different based on data access authority corresponding to user behavior data using block chain technology, using not Same processing mode, the data storage after being handled with guarantee have been effectively ensured data and have been not tampered with block chain node so that The accuracy of the credit data of the user subsequently obtained according to these data assessments improves, and then realizes to internet financial business Risk control effectively.
It should be noted that contract signing platform described in the embodiment of the present application can be real by way of microprogram One function module that is existing or being integrated in internet financial platform, is not specifically limited here.The embodiment of the present application In do not limited on the type of contractual relation, can be the buyer-seller relationship, loaning bill relation, mortgage relation of legal provisions;Also may be used To be the transactional relationship arranged in daily life between different user, such as:Housework distribution of agreement between husband and wife etc..
Specified relationship is pre-established between described second user and first user in the embodiment of the present application, it is described Specified relationship includes the one or more in kinship, friends, classmate's relation.
Described block chain network prioritizing selection alliance chain in the embodiment of the present application.
To make the purpose, technical scheme and advantage of the application clearer, below in conjunction with the application specific embodiment and Technical scheme is clearly and completely described corresponding accompanying drawing.Obviously, described embodiment is only the application one Section Example, rather than whole embodiments.Based on the embodiment in the application, those of ordinary skill in the art are not doing Go out under the premise of creative work the every other embodiment obtained, belong to the scope of the application protection.
Below in conjunction with accompanying drawing, the technical scheme that each embodiment of the application provides is described in detail.
Fig. 1 is a kind of schematic flow sheet for data processing method that the embodiment of the present application provides.Methods described can be as follows It is shown.The executive agent of the embodiment of the present application is that contract signs server corresponding to platform.
Step 101:The contract for receiving the first user transmission signs request.
The contract signs user's mark comprising second user and contract data, the contract data in request and is used for table Levy first user and the obligation fulfiled in setting time is promised to undertake to the second user.
Because the mode that contract is signed in actual applications typically concludes papery contract side using both sides or Multi Part Negotiation Formula and both sides or the mode that makes a verbal agreement in many ways, both modes exist system supervisory can not be carried out to carrying out of a contract Problem.Further, since both sides or it is multi-party between lack legal knowledge so that the papery contract signed is reached oral There is legal issue in agreement, legal dispute easily occurs when honouring an agreement, and make troubles for both sides or in many ways.
In view of above mentioned problem, provide in the embodiment of the present application contract sign platform, it is necessary to the both sides of sign a contract or Person can sign platform sign a contract by the contract in many ways, can so realize and both sides are signed to contract or multi-party are honoured an agreement Ability is monitored.
If the first user needs to sign contract between second user, then first user passes through used visitor Family end logs in the contract and signs platform, and contract event is determined in the contract signs platform.Here contract is included in contract event About type, carrying out of a contract time and first user are promised to undertake in setting time (or carrying out of a contract to the second user Time) in the obligation fulfiled.Client generates contract data based on the contract event that user inputs, and sends contract to server Request is about signed, the contract signs user's mark and the contract data comprising second user in request.
It should be noted that contract described in the embodiment of the present application can be a contract in legal sense, by What both sides or multi-party joint consultation were concluded;Can also be some promise of a user, such as:First user uses to second Promise to undertake at family:Following one week housework (such as:Including cooking, washing the dishes, cleaning, clothes etc. of doing washing) it is responsible for by the first user.It is false If the promise is the contract event of determination, then in order to be monitored to the contractual capacity of the first user, the first user can lead to Cross used client and log in contract signing platform, contract data, the contract data are generated in the contract signs platform In promised to undertake comprising carrying out of a contract time and first user to the second user in setting time (or during carrying out of a contract Between) in the obligation fulfiled, and the contract of the user for carrying the contract data and second user mark is signed into request and is sent to Server.
More preferably, in the embodiment of the present application, the first user can select that contract signs by about square, i.e., from described the One user, which pre-establishes, selects one of user to identify in user's identification sets of the second user of specified relationship, and by selection Second user corresponding to user's mark is defined as by about just, and the specified relationship includes kinship, friends, classmate One or more in relation.
It should be noted that when the first user logs in contract signing platform by used client, server can To be identified according to the user of first user, it is determined that the user that the second user of setting relation is established with first user identifies Collection, and user's identification sets are sent to the first user.
Step 102:The contract is signed into request and is sent to second user corresponding to user's mark of the second user.
In the embodiment of the present application, server is when the contract for receiving the first user transmission signs request, from the contract User's mark that second user is parsed in request is signed, and the contract is signed and asks the user for being sent to the second user to mark Second user corresponding to knowledge.
Step 103:Receive the confirmation that the second user returns.
In the embodiment of the present application, second user is when the contract for receiving server transmission signs request, further really The fixed contract that whether receives signs request.On the one hand it needs to be determined that the contract is signed described in the contract data included in request Obligation whether fairly;On the other hand determine that the contract signs whether request belongs to true intention expression.
If second user determines that receiving the contract signs request, and confirmation is sent to the server;Otherwise, to clothes Business device sends refusal information.
Step 104:According to the confirmation, the contract established between first user and the second user is closed System.
In the embodiment of the present application, server determines second user when receiving the confirmation of second user transmission Receive the contract and sign request, and the contractual relation established between first user and the second user, in order to follow-up The contractual capacity of the first user and/or second user are monitored for the contractual relation.
Illustrated below so that the contractual capacity to the first user is monitored as an example.
In the embodiment of the present application, when establishing the contractual relation between first user and the second user, root The carrying out of a contract time included in request is signed according to the contract, generates carrying out of a contract prompt message.
Wherein, the carrying out of a contract prompt message is used to prompt first user to fulfil justice corresponding to the contractual relation Business.
More preferably, methods described also includes:
When the setting time (i.e. carrying out of a contract time) reaches, carrying out of a contract prompting letter is sent to first user Breath.
In the embodiment of the present application, it is corresponding may to have fulfiled the contractual relation before the carrying out of a contract time by some users Obligation, illustrate that the contractual capacity of these users is stronger, therefore, to first user send carrying out of a contract prompt message Before, it is voluntary corresponding to the contractual relation to determine whether the first user has fulfiled.
When it is determined that first user not yet fulfils voluntary corresponding to the contractual relation, sent to first user Carrying out of a contract prompt message.
When it is determined that first user has fulfiled voluntary corresponding to the contractual relation, the shoe of first user is obtained About data.
Wherein, the contractual relation is included in the data of honouring an agreement, fulfils behavior voluntary corresponding to the contractual relation The generation time of data and the behavioral data.
More preferably, in the embodiment of the present application, methods described also includes:
The data of honouring an agreement that first user sends are received, and the data of honouring an agreement are sent to the second user.
It should be noted that the carrying out of a contract time described in the embodiment of the present application can be one (such as:Loaning bill contract About, the refund date of borrower is defined in the loan agreement) or multiple (such as:First user is to second user The promise to do housework made, this term of validity promised to undertake can be 7 days (No. 01~No. 07)), then what the first user sent Data of honouring an agreement can be a packet for the carrying out of a contract time, if the carrying out of a contract time is one, then should A data of honouring an agreement are included in packet;If the carrying out of a contract time is multiple, then is honoured an agreement in the packet comprising multiple Data (such as 7), each data of honouring an agreement are corresponding with the carrying out of a contract time.It it is a period of time for the carrying out of a contract time (including multiple time points), then when honouring an agreement data corresponding to each time point of generation, the first user can be by the time Data of being honoured an agreement corresponding to point are sent to server.
More preferably, in the embodiment of the present application, methods described also includes:
The assessment data that the second user is sent are received, the assessment data are used to characterize the second user according to institute State data of honouring an agreement to assess the contractual capacity of first user, included in the assessment data and whether honour an agreement, carry out on time One or more about in degree.
Specifically, second user receive server transmission honour an agreement data when, according to the data of honouring an agreement to described The contractual capacity of first user is assessed.
Here assessment can be for the contractual relation to the total evaluation made by the contractual capacity of the first user, Can a carrying out of a contract time point being directed in the contractual relation the first user be honoured an agreement at the carrying out of a contract time point Ability makes assessment, and comprehensive assessment is provided at the end of the carrying out of a contract phase, is not specifically limited here.
Here assessment comprising whether honour an agreement on time, the effect for completion of honouring an agreement how etc..
In order to ensure that second user can be assessed the contractual capacity of the first user in time, in the embodiment of the present application In, at the end of the satisfied term of the contractual relation, sent to the second user and assess prompt message, it is described to assess prompting letter Cease for prompting the second user to assess the contractual capacity of first user.
In the embodiment of the present application, methods described also includes:
The assessment data are sent to first user.
If there is objection in assessment data of first user to second user, then receive the objection that first user sends Data, the objection data are used to characterize objection of first user to the assessment data;
Store the contractual relation, the objection data and the mapping relations assessed between data.
More preferably, methods described also includes:
According to the mapping relations, the credit data of first user is handled.
In order to ensure subsequently being assessed based on assessment data the credit of the first user, objection number described in server storage According to the mapping relations between the assessment data, these assessment data of the angle-determining that can be analyzed by big data are to first The influence degree of the credit data of user, and then ensure that the accuracy for assessing the credit data of the first user.
In the embodiment of the present application, server after the assessment data of second user transmission are got, also wrap by methods described Include:
According to the assessment data, the credit data of first user is handled.
Specifically, according to the assessment data, the credit value of adjustment first user.
The factor of influence of the assessment data is determined, utilizes the factor of influence, the credit value of adjustment first user.
Specifically, according to the credit label assessed data and historical evaluation data, determine first user, institute The confidence level that credit label is used to characterize user is stated, and the user for establishing the credit label and first user identifies it Between mapping relations.
In the embodiment of the present application, credit label includes but is not limited to:Reliable label, credible label, label undetermined and not Credible label.The corresponding credit value section of different credit labels.
Wherein, credit value corresponding to reliable label is more than credit value corresponding to credible label;Credit corresponding to credible label Value is more than credit value corresponding to label undetermined;Credit value corresponding to label undetermined is more than credit value corresponding to insincere label.
In the embodiment of the present application, the first user, can also be in contract when the contract sent with second user signs request The disclosure authority for including result of honouring an agreement in request is about signed, i.e., the contractual relation included in for contract signing request fulfils knot , it is necessary to which whom will honour an agreement data and assessment data are sent to during beam, illustrate who possesses and check the power that this is honoured an agreement data and assesses data Limit.
Specifically, the disclosure authority of the result of honouring an agreement included in request is signed according to the contract, passes through the social activity of setting Platform issues the contractual relation and the assessment data so that other users corresponding with the disclosure authority pass through institute State social platform and access the assessment data.
Such as:The friend that authority is disclosed as the first user and second user can access, then be put down by the social activity of setting Platform issues the contractual relation and the assessment data, and friend is established with the first user and second user in the social platform The user of relation can access the assessment data;
Such as:The relatives that authority is disclosed as the first user and second user can access, then be put down by the social activity of setting Platform issues the contractual relation and the assessment data, and relatives are established with the first user and second user in the social platform The user of relation can access the assessment data.
The technical scheme provided by the embodiment of the present application, there is provided contract signs platform, signs on platform, connects in the contract The contract for receiving the first user transmission signs request, and the contract signs user's mark and contract number comprising second user in request According to the contract data are used to characterize the justice that first user is fulfiled to second user promise in setting time Business;The contract is signed into request and is sent to second user corresponding to user's mark of the second user;Receive described second The confirmation that user returns, and according to the confirmation, the contract established between first user and the second user About relation.In such manner, it is possible to effective monitoring is carried out to the carrying out of a contract between user and user, and then by the credit evaluation to user C2C (Customer-to-Customer) mode is extended to by B2C modes, credit evaluation mechanism is improved, effectively passes through acquisition Data are assessed caused by various contractual relations between different user, than more fully estimating the credit of user, effectively The accuracy assessed user credit is improved, and then the risk of internet financial business is control effectively.
Based on same inventive concept, Fig. 2 is a kind of flow signal for data processing method that the embodiment of the present application provides Figure.Methods described can be with as follows.The executive agent of the embodiment of the present application is that contract signs client corresponding to platform.
Step 201:Contract event is determined, and is used for based on contract event generation contract data, the contract data Characterize the first user and the obligation fulfiled in setting time is promised to undertake to second user.
More preferably, in the embodiment of the present application, methods described also includes:
Before contract data are generated, marked from the user for the second user that specified relationship is pre-established with first user Know to concentrate and select one of user mark, and second user corresponding to the user mark of selection is defined as by about square, The specified relationship includes the one or more in kinship, friends, classmate's relation.
Step 202:The contract of the mark and the contract data that carry the second user is signed into request and is sent to clothes Business device, the server is signed request to the contract and handle.
More preferably, in the embodiment of the present application, methods described also includes:
After it is determined that establishing contractual relation with the second user, when signing the setting included in request according to the contract Between, fulfil corresponding to the contractual relation voluntary, and caused behavioral data of fulfilling obligations, the behavioral data will be carried The server is sent in generation time and the data of honouring an agreement of the contractual relation.
Based on same inventive concept, Fig. 3 is a kind of flow signal for data processing method that the embodiment of the present application provides Figure.Methods described can be with as follows.The executive agent of the embodiment of the present application is that contract signs client corresponding to platform.
Step 301:The contract that the reception server is sent signs request.
Wherein, the contract signs user's mark and contract data comprising the first user, the contract data in request For characterizing first user obligation fulfiled in setting time is promised to undertake to second user.
Step 302:If it is determined that receiving the contract signs request, then confirmation is sent to the server, made described Server is according to the confirmation, the contractual relation established between first user and the second user.
More preferably, in the embodiment of the present application, methods described also includes:
Receive the data of honouring an agreement that the server is sent, in the data of honouring an agreement comprising the contractual relation, fulfil it is described The generation time of voluntary behavioral data and the behavioral data corresponding to contractual relation;
According to the data of honouring an agreement, the contractual capacity of first user is assessed, and generates assessment data, it is described Assess data in comprising whether honour an agreement on time, the one or more in degree of honouring an agreement;
The assessment data are sent to the server.
The contract that Fig. 4 is the first user that the embodiment of the present application provides signs request schematic diagram.
Figure 4, it is seen that client corresponding to first user's startup optimization contract signing platform, logs in the client Afterwards, signed in contract and show contract signing requests for page corresponding to platform in client, shown in the page contract type, by About square, carrying out of a contract time and the obligation executed one's promises etc..When the first user inputs the contract content of correlation in the page Afterwards, control is submitted in triggering, is considered as to server and is sent contract signing request.
Fig. 5 is the carrying out of a contract schematic diagram for the first user that the embodiment of the present application provides.
From figure 5 it can be seen that server, after the contractual relation between the first user and second user is established, first uses The carrying out of a contract page is shown in client used in family, comprising contractual relation, by about square, contract in the carrying out of a contract page Time and carrying out of a contract data are fulfiled, is included in the carrying out of a contract data and fulfils data, Ke Yitong caused by different time points Cross a page to show, can also be shown by multiple pages, be not specifically limited here.
Fig. 6 is that the contractual capacity for the second user that the embodiment of the present application provides assesses schematic diagram.
From fig. 6 it can be seen that second user is made after the contract for receiving the first user signs request in second user Display, which is honoured an agreement, in client assesses the page, promoter's (user's mark of the first user in the page comprising contractual relation Know), the first user send honour an agreement data and second user assessment data.When second user inputs assessment in the page After data, control is submitted in triggering, is considered as to send to server and is assessed data, is commented with the contractual capacity to the first user Estimate.
Generate the substantial amounts of data for being used to assess user credit in the above-described embodiments, in order to ensure these data not by Distort, Fig. 7 is a kind of schematic flow sheet for data processing method based on block chain that the embodiment of the present application provides.Methods described Can be with as follows.The executive agent of the embodiment of the present application is block chain node in block chain network.
Step 701:Block chain node determines the contractual relation established between the first user and second user.
In the embodiment of the present application, there is provided contract signs platform, and the contract is signed platform and can be used as in block chain network A block chain node.The block chain node can determine whether establish contractual relation between the first user and second user.
Specifically, first, receive the contract that the first user sends and sign request, the contract, which is signed, includes second in request The user's mark and contract data of user, the contract data exist for characterizing first user and being promised to undertake to the second user The obligation fulfiled in setting time.
Secondly, the contract is signed into request and is sent to second user corresponding to user's mark of the second user.
Finally, the confirmation that the second user returns is received, and according to the confirmation, establishes described first and uses Contractual relation between family and the second user.
Concrete implementation mode may refer to the content shown in Fig. 1, no longer repeat one by one here.
Further, since contractual relation belong to conclude both sides or it is multi-party between a kind of social relationships, this contractual relation Whether disclose and be also required to both sides or Multi Part Negotiation determination.In the embodiment of the present application, established in the first user and second user During contractual relation, the data of the first user or the second user caused user behavior data during carrying out of a contract can be consulted Access rights.Here data access authority can be understood as disclosing scope, i.e. which user is able to access that the first user or the Two users caused user behavior data during carrying out of a contract.Data access authority can basis in the embodiment of the present application Data type is determined, and can also be determined according to data source, is not specifically limited here.
Assuming that using data source as according to the data access authority for determining different user behavioral data, then in the first user When establishing contractual relation with second user, the data access rights comprising data source and user behavior data in the contractual relation Mapping relations between limit, such contract contract platform when getting user behavior data caused by different user, Ke Yigen According to the mapping relations, the data access authority of user behavior data is determined.
More preferably, in the embodiment of the present application, methods described also includes:
The contractual relation is stored into block chain.
It should be noted that when establishing contractual relation between the first user and second user, for the contractual relation Contract content can be stored in block chain according to existing block chain technology;The first user and second can also be utilized as to use The contract content is encrypted the private key of first public and private key centering of family configuration, the contract content quilt obtained after encryption It is stored in block chain, so, the contract content can only be concluded both sides' (i.e. the first user and second user) by the by contract The public key of one public and private key centering can browse.
Step 702:Block chain node is based on the contractual relation, obtains the user behavior associated with the contractual relation Data, and determine the data access authority of the user behavior data.
In the embodiment of the present application, once establishing certain contractual relation between the first user and second user, then First user or second user will produce user behavior data when fulfiling voluntary corresponding to the contractual relation, then block chain link Point can obtain the user behavior data associated with the contractual relation.
Due to storing the mapping between data source and the data access authority of user behavior data in contractual relation Relation, then based on described mapping relations, it may be determined that the data source of the user behavior data got, and be based on The data source, determines the data access authority of the user behavior data, and the data access authority is included and ordered by contract Vertical both sides access, accessed by the user that specified relationship is established with contract conclusion both sides, one kind in unrestricted access, described to specify Relation includes the one or more in kinship, friends, classmate's relation.
In the embodiment of the present application, the user behavior data associated with the contractual relation includes but is not limited to:Honour an agreement Data, assess data.
Specifically, the data of being honoured an agreement caused by during the contractual relation is fulfiled that first user sends are received, The contractual relation is included in the data of honouring an agreement, fulfils behavioral data voluntary corresponding to the contractual relation and the row For the generation time of data.
Here receive the first user and send the specific implementations of data of honouring an agreement and may refer to tool in embodiment illustrated in fig. 1 Hold in vivo, no longer repeat one by one here.
Get the first user transmission honour an agreement data when, if in the contractual relation comprising first user produce User behavior data corresponding to access rights be by contract conclude both sides access, then it is determined that the data of honouring an agreement data visit It is to conclude both sides by contract to access to ask authority.
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by first user With contract conclude both sides establish specified relationship user access, then it is determined that the data access authority of the data of honouring an agreement be by with Contract concludes user's access that both sides establish specified relationship.
More preferably, in the embodiment of the present application, methods described also includes:
The data of honouring an agreement are sent to the second user.
Specifically, the assessment number assessed the contractual capacity of first user that the second user is sent is received According to, it is described assessment data in comprising whether honour an agreement on time, the one or more in degree of honouring an agreement.
Here the specific implementation of reception second user transmission assessment data may refer to the tool in embodiment illustrated in fig. 1 Hold in vivo, no longer repeat one by one here.
When getting the assessment data of second user transmission, if being produced in the contractual relation comprising the second user User behavior data corresponding to access rights be by contract conclude both sides access, then determine it is described assessment data data visit It is to conclude both sides by contract to access to ask authority.
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by the second user With contract conclude both sides establish specified relationship user access, then determine it is described assessment data data access authority be by with Contract concludes user's access that both sides establish specified relationship.
Step 703:Block chain node determines the use according to the preset relation between data access authority and processing strategy The processing strategy of family behavioral data, the processing rule to match with the data access authority is included during the processing is tactful.
In the embodiment of the present application, block chain node can pre-establish reflecting between data access authority and processing strategy Relation is penetrated, so, once the data access authority of user behavior data is different, then and corresponding processing strategy is also different.
In the embodiment of the present application, can be, but not limited to data access authority being divided into following several:
1st, both sides are concluded by contract to access.Accessed that is, user behavior data only allows contract to conclude both sides, i.e., originally Apply for that the first user in embodiment and second user access.
2nd, accessed by the user that specified relationship is established with contract conclusion both sides.That is, user behavior data is not only permitted Perhaps contract is concluded both sides and accessed, i.e., the first user and second user in the embodiment of the present application access;Also allow and the first user The other users that specified relationship is established with second user access, such as:User's mark of first user and the user of second user Mark belongs to a customer group, then the other users in the customer group can be defined as and the first user and second user foundation The other users of specified relationship.
3rd, unrestricted access.That is, the access object for user behavior data does not limit.
In the embodiment of the present application, different processing strategies is determined for different data access authorities.
If data access authority is to conclude both sides by contract to access, then concludes both sides for contract in advance and distributes public and private key It is right, the public and private key to can contract conclude both sides establish contractual relation when for its distribution, it is determined that processing strategy can be The private key for being utilized as the public and private key centering that contract concludes both sides' distribution is handled caused user behavior data.
If data access authority is to be accessed by the user that specified relationship is established with contract conclusion both sides, then is in advance contract The customer group distribution public and private key pair belonging to both sides is concluded, the public and private key establishes contractual relation to that can conclude both sides in contract When for the customer group distribute, the mapping relations established between the group identification of customer group and the public and private key pair, it is determined that processing plan Slightly can be that the private key for being utilized as the public and private key centering that customer group is distributed is handled caused user behavior data.
Specifically, in the embodiment of the present application, for data of honouring an agreement/assessment data, if data access authority is by contract Conclude both sides access, then it is determined that processing strategy for be utilized as contract conclude both sides distribution public and private key centering private key pair Caused user behavior data is handled;If data access authority is the user by establishing specified relationship with contract conclusion both sides Access, then it is determined that processing strategy for be utilized as customer group distribution public and private key centering private key to caused user behavior Data are handled.
Step 704:Block chain node is handled the user behavior data using the processing strategy.
In the embodiment of the present application, however, it is determined that processing strategy for be utilized as contract conclude both sides distribution public and private key pair Caused user behavior data is handled, then accesses phase with concluding both sides by contract according to what is included in the processing strategy The processing rule of matching, it is defined as the first public and private key pair of first user and second user distribution;Using described The data of honouring an agreement/assessment data are encrypted the private key of first public and private key centering;And it will encrypt what is obtained The data of honouring an agreement/assessment data storage is into block chain.
If it is determined that processing strategy for be utilized as customer group distribution public and private key to entering to caused user behavior data Row processing, then access phase with the user by establishing specified relationship with contract conclusion both sides according to being included in the processing strategy The processing rule of matching, determines the second public and private key pair, and second public and private key is to being allocated to the use of first user Family identifies and the user of the second user identifies owning user group, is also included in the customer group with first user's The user at least one user that user identifies and the user of second user mark establishes specified relationship identifies;Using described The data of honouring an agreement/assessment data are encrypted the private key of second public and private key centering;And it will encrypt what is obtained The data of honouring an agreement/assessment data storage is into block chain.
It should be noted that described in the embodiment of the present application " the first public and private key to " and " the second public and private key to " In " first " and " second " there is no particular meaning, only represent different public and private key pair.
More preferably, in the embodiment of the present application, methods described also includes:
The assessment data access request that first user sends is received, is included in the assessment data access request described User's mark of second user and the contractual relation;
The assessment data after encryption are sent to first user, make first user public using described first The assessment data after the encryption that receives are decrypted the public key of private key centering, obtain the assessment data.
Or first user using the public key of the second public and private key centering to described in after the encryption that receives Assess data to be decrypted, obtain the assessment data.
The number for needing the first user to determine the assessment data is decrypted as the public key using which public and private key centering According to access rights, and then determine the public key of public and private key centering corresponding to the data access authority.
More preferably, in the embodiment of the present application, methods described also includes:
According to the assessment data, the credit data of first user is handled;
Credit data after processing is encrypted the private key for being utilized as the public and private key centering of the first user configuration;
The credit data that encryption obtains is stored into block chain.
Specifically, according to the assessment data, the credit value of adjustment first user.
Specifically, according to the credit label assessed data and historical evaluation data, determine first user, institute State the confidence level that credit label is used to characterize user;And establish first user user mark with the credit label it Between mapping relations.
In the embodiment of the present application, methods described also includes:
The assessment data are sent to first user;
The objection data that first user sends are received, the objection data are used to characterize first user to described Assess the objection of data;
Store the contractual relation, the objection data and the mapping relations assessed between data.
It should be noted that storage mode here can also be stored using cipher mode, how to encrypt to join According to the mode of above-mentioned record, no longer repeat one by one here.
The technical scheme provided by the embodiment of the present application, block chain node is it is determined that between the first user and second user During the contractual relation of foundation, based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and really The data access authority of the fixed user behavior data;According to data access authority and the preset relation between strategy is handled, really The processing strategy of the fixed user behavior data, the processing to match with the data access authority is included during the processing is tactful Rule;The user behavior data is handled using the processing strategy.The contract that platform foundation is signed by contract is closed System, for the caused associated user behavior data during carrying out of a contract, using block chain technology, based on user behavior Data access authority corresponding to data is different, and using different processing modes, the data storage after being handled with guarantee is in block chain In node, data are effectively ensured and have been not tampered with so that the credit data of the user subsequently obtained according to these data assessments Accuracy improves, and then realizes and the risk of internet financial business is control effectively.
Based on same inventive concept, Fig. 8 is a kind of structural representation for data processing equipment that the embodiment of the present application provides Figure.The data processing equipment includes:Receiving unit 801, transmitting element 802 and processing unit 803, wherein:
Receiving unit 801, receive the contract that the first user sends and sign request, the contract, which is signed, includes second in request The user's mark and contract data of user, the contract data exist for characterizing first user and being promised to undertake to the second user The obligation fulfiled in setting time;
Transmitting element 802, the contract is signed into request and is sent to second corresponding to user's mark of the second user User;
The receiving unit 801, receive the confirmation that the second user returns;
Processing unit 803, according to the confirmation, the contract established between first user and the second user Relation.
In another embodiment of the application, the transmitting element 802, when the setting time reaches, to described First user sends carrying out of a contract prompt message, and the carrying out of a contract prompt message is described for prompting first user to fulfil It is voluntary corresponding to contractual relation.
In another embodiment of the application, the transmitting element 802 sends carrying out of a contract to first user and carried Show information, including:
When it is determined that first user not yet fulfils voluntary corresponding to the contractual relation, sent to first user Carrying out of a contract prompt message.
In another embodiment of the application, the receiving unit 801, the number of honouring an agreement that first user sends is received According to, in the data of honouring an agreement comprising the contractual relation, fulfil behavioral data voluntary corresponding to the contractual relation and institute State the generation time of behavioral data;
The transmitting element 802, the data of honouring an agreement are sent to the second user.
In another embodiment of the application, the receiving unit 801, the assessment number that the second user is sent is received It is used to characterizing second user data of honouring an agreement according to according to, assessment data to enter the contractual capacity of first user Row assess, it is described assessment data in comprising whether honour an agreement on time, the one or more in degree of honouring an agreement.
In another embodiment of the application, the processing unit 803, according to the assessment data, to described first The credit data of user is handled.
In another embodiment of the application, the processing unit 803 is used described first according to the assessment data The credit data at family is handled, including:
According to the assessment data, the credit value of adjustment first user.
In another embodiment of the application, the processing unit 803 is used described first according to the assessment data The credit data at family is handled, including:
According to the credit label assessed data and historical evaluation data, determine first user, the credit Label is used for the confidence level for characterizing user;
The mapping relations established between the credit label and user's mark of first user.
In another embodiment of the application, the receiving unit 801 receives the assessment number that the second user is sent According to, including:
At the end of the satisfied term of the contractual relation, sent to the second user and assess prompt message, the assessment Prompt message is used to prompt the second user to assess the contractual capacity of first user.
In another embodiment of the application, the data processing equipment also includes:Memory cell 804, wherein:
The transmitting element 802, the assessment data are sent to first user;
The receiving unit 801, receives the objection data that first user sends, and the objection data are used to characterize institute State objection of first user to the assessment data;
The memory cell 804, store the contractual relation, the objection data and the mapping assessed between data Relation.
In another embodiment of the application, the processing unit 803, according to the mapping relations, to described first The credit of user is handled.
In another embodiment of the application, the processing unit 803, sign what is included in request according to the contract The disclosure authority for result of honouring an agreement, the contractual relation and the assessment data are issued by the social platform of setting, so that Other users corresponding with the disclosure authority access the assessment data by the social platform.
In another embodiment of the application, specified pass is pre-established between the second user and first user System, the specified relationship include the one or more in kinship, friends, classmate's relation.
It should be noted that data processing equipment described in the embodiment of the present application can be realized by software mode, also may be used To be realized by hardware mode, it is not specifically limited here.The data processing equipment provides contract and signs platform, in the contract Sign on platform, receive the contract that the first user sends and sign request, the contract signs the use for including second user in request Family identifies and contract data, and the contract data are used to characterize first user to second user promise in setting time Interior fulfiled obligation;The contract is signed into request and is sent to second user corresponding to user's mark of the second user; The confirmation that the second user returns is received, and according to the confirmation, establishes first user and described second Contractual relation between user.In such manner, it is possible to between user and user carrying out of a contract carry out effective monitoring, and then will to The credit evaluation at family extends to C2C (Customer-to-Customer) mode by B2C modes, improves credit evaluation mechanism, has Data are assessed in effect ground by obtaining caused by the various contractual relations between different user, than more fully entering to the credit of user Row estimation, effectively improves the accuracy assessed user credit, and then the risk of internet financial business is effectively controlled System.
Based on same inventive concept, Fig. 9 is a kind of structural representation for data processing equipment that the embodiment of the present application provides Figure.The data processing equipment includes:Processing unit 901 and transmitting element 902, wherein:
Processing unit 901, contract event is determined, and based on contract event generation contract data, the contract data For characterizing the first user the obligation fulfiled in setting time is promised to undertake to second user;
Transmitting element 902, the contract of the mark and the contract data that carry the second user is signed into request and sent To server, the server is signed request to the contract and handle.
In another embodiment of the application, the data processing equipment also includes:Selecting unit 903, wherein:
The selecting unit 903, before contract data are generated, specified relationship is pre-established from first user Select one of user to identify in user's identification sets of second user, and corresponding to the user mark of selection second is used Family is defined as by about just, and the specified relationship includes the one or more in kinship, friends, classmate's relation.
In another embodiment of the application, the processing unit 901, it is determined that establishing contract with the second user After relation, the setting time included in request is signed according to the contract, is fulfiled voluntary corresponding to the contractual relation;
The transmitting element 902, the generation time of fulfil obligations caused behavioral data, the behavioral data will be carried And it is sent to the server in the data of honouring an agreement of the contractual relation.
It should be noted that data processing equipment described in the embodiment of the present application can be realized by software mode, also may be used To be realized by hardware mode, it is not specifically limited here.
Based on same inventive concept, Figure 10 is a kind of structural representation for data processing equipment that the embodiment of the present application provides Figure.The data processing equipment includes:Receiving unit 1001 and transmitting element 1002, wherein:
Receiving unit 1001, the contract that the reception server is sent sign request, and the contract, which is signed, includes first in request The user's mark and contract data of user, the contract data are being set for characterizing first user to second user promise The obligation fulfiled in time;
Transmitting element 1002, however, it is determined that receive the contract and sign request, then send confirmation to the server, make The server is according to the confirmation, the contractual relation established between first user and the second user.
In another embodiment of the application, the data processing equipment also includes:Processing unit 1003, wherein:
The receiving unit 1001, the data of honouring an agreement that the server is sent are received, are included in the data of honouring an agreement described Contractual relation, the generation time for fulfiling behavioral data voluntary corresponding to the contractual relation and the behavioral data;
The processing unit 1003, according to the data of honouring an agreement, the contractual capacity of first user is assessed, and Generation assess data, it is described assessment data in comprising whether honour an agreement on time, the one or more in degree of honouring an agreement;
The transmitting element 1002, the assessment data are sent to the server.
It should be noted that data processing equipment described in the embodiment of the present application can be realized by software mode, also may be used To be realized by hardware mode, it is not specifically limited here.
Figure 11 is a kind of structural representation for data processing equipment based on block chain that the embodiment of the present application provides.It is described Data processing equipment includes:Determining unit 1101, acquiring unit 1102 and processing unit 1103, wherein:
Determining unit 1101, determine the contractual relation established between the first user and second user;
Acquiring unit 1102, based on the contractual relation, the user behavior data associated with the contractual relation is obtained, And determine the data access authority of the user behavior data;
Processing unit 1103, according to the preset relation between data access authority and processing strategy, determine user's row For the processing strategy of data, the processing rule to match with the data access authority is included during the processing is tactful;And utilize The processing strategy is handled the user behavior data.
In another embodiment of the application, the acquiring unit 1102 determines that the data of the user behavior data are visited Authority is asked, including:
Based on the mapping included in the contractual relation between data source and the data access authority of user behavior data Relation, it is determined that the data source of the user behavior data got;
Based on the data source, the data access authority of the user behavior data, the data access authority are determined Comprising by contract conclusion both sides access, user's access by establishing specified relationship with contract conclusion both sides, unrestricted access One kind, the specified relationship include the one or more in kinship, friends, classmate's relation.
In another embodiment of the application, the acquiring unit 1102 obtains the use associated with the contractual relation Family behavioral data, including:
The data of being honoured an agreement caused by during the contractual relation is fulfiled that first user sends are received, it is described to honour an agreement In data comprising the contractual relation, fulfil behavioral data voluntary corresponding to the contractual relation and the behavioral data Generation time.
In another embodiment of the application, the data processing equipment also includes:Transmitting element 1104, wherein:
The transmitting element 1104, the data of honouring an agreement are sent to the second user.
In another embodiment of the application, the acquiring unit 1102 determines that the data of the user behavior data are visited Authority is asked, including:
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by first user Contract is concluded both sides and accessed, then it is determined that the data access authority of the data of honouring an agreement is to conclude both sides by contract to access.
In another embodiment of the application, the acquiring unit 1102 determines that the data of the user behavior data are visited Authority is asked, including:
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by first user With contract conclude both sides establish specified relationship user access, then it is determined that the data access authority of the data of honouring an agreement be by with Contract concludes user's access that both sides establish specified relationship.
In another embodiment of the application, the acquiring unit 1102 obtains the use associated with the contractual relation Family behavioral data, including:
The assessment data assessed the contractual capacity of first user that the second user is sent are received, it is described Assess data in comprising whether honour an agreement on time, the one or more in degree of honouring an agreement.
In another embodiment of the application, the acquiring unit 1102 determines that the data of the user behavior data are visited Authority is asked, including:
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by the second user Contract is concluded both sides and accessed, then the data access authority for determining the assessment data is to conclude both sides by contract to access.
In another embodiment of the application, the acquiring unit 1102 determines that the data of the user behavior data are visited Authority is asked, including:
If served as reasons in the contractual relation comprising access rights corresponding to user behavior data caused by the second user With contract conclude both sides establish specified relationship user access, then determine it is described assessment data data access authority be by with Contract concludes user's access that both sides establish specified relationship.
In another embodiment of the application, the processing unit 1103 is using the processing strategy to user's row Handled for data, including:
The processing to match rule is accessed with concluding both sides by contract according to being included in the processing strategy, is defined as institute State the first public and private key pair of the first user and second user distribution;
Place is encrypted to the data of honouring an agreement/assessment data using the private key of the first public and private key centering Reason;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
In another embodiment of the application, the data processing equipment also includes:Receiving unit 1105, wherein:
The receiving unit 1105, receive the assessment data access request that first user sends, the assessment data User's mark comprising the second user and the contractual relation in access request;
The assessment data after encryption are sent to first user, make first user public using described first The assessment data after the encryption that receives are decrypted the public key of private key centering, obtain the assessment data.
In another embodiment of the application, the processing unit 1103 is using the processing strategy to user's row Handled for data, including:
According to being included in the processing strategy phase is accessed with the user by establishing specified relationship with contract conclusion both sides The processing rule matched somebody with somebody, determines the second public and private key pair, and second public and private key is to being allocated to the user of first user The user of mark and the second user identifies owning user group's, also comprising the use with first user in the customer group The user at least one user that family identifies and the user of second user mark establishes specified relationship identifies;
Place is encrypted to the data of honouring an agreement/assessment data using the private key of the second public and private key centering Reason;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
In another embodiment of the application, the determining unit 1101 determines to build between the first user and second user Vertical contractual relation, including:
The contract for receiving the first user transmission signs request, and the contract is signed the user comprising second user in request and marked Know and contract data, the contract data are used to characterize first user to second user promise institute in setting time The obligation fulfiled;
The contract is signed into request and is sent to second user corresponding to user's mark of the second user;
Receive the confirmation that the second user returns, and according to the confirmation, establish first user with Contractual relation between the second user.
In another embodiment of the application, the data processing equipment also includes:Memory cell 1106, wherein:
The memory cell 1106, the contractual relation is stored into block chain.
In another embodiment of the application, the processing unit 1103 is according to the assessment data, to described first The credit data of user is handled;
Credit data after processing is encrypted the private key for being utilized as the public and private key centering of the first user configuration;
The credit data that encryption obtains is stored into block chain.
In another embodiment of the application, the processing unit 1103 is according to the assessment data, to described first The credit data of user is handled, including:
According to the assessment data, the credit value of adjustment first user.
In another embodiment of the application, the processing unit 1103 is according to the assessment data, to described first The credit data of user is handled, including:
According to the credit label assessed data and historical evaluation data, determine first user, the credit Label is used for the confidence level for characterizing user;
The mapping relations established between user's mark of first user and the credit label.
In another embodiment of the application, the assessment data are sent to described first by the transmitting element 1104 User;
The objection data that first user sends are received, the objection data are used to characterize first user to described Assess the objection of data;
Store the contractual relation, the objection data and the mapping relations assessed between data.
In another embodiment of the application, specified pass is pre-established between the second user and first user System, the specified relationship include the one or more in kinship, friends, classmate's relation.
It should be noted that the data processing equipment that the embodiment of the present application provides can be realized by software mode, also may be used To be realized by hardware mode, it is not specifically limited here.The data processing equipment signs the contract of platform foundation by contract About relation, for the caused associated user behavior data during carrying out of a contract, using block chain technology, based on user Data access authority corresponding to behavioral data is different, and using different processing modes, the data storage after being handled with guarantee is in area In block chain node, data are effectively ensured and have been not tampered with so that the credit number of the user subsequently obtained according to these data assessments According to accuracy improve, and then realize and the risk of internet financial business control effectively.
Based on same inventive concept, Figure 12 is a kind of structural representation for data handling system that the embodiment of the present application provides Figure.
Client 1201, the client of second user 1202, the contract of the first user is included in the data handling system Platform 1203, monitor supervision platform 1204, social platform 1205 and block chain network 1206 are signed, wherein:
The client 1201 of first user and the client 1202 of second user, both sides are signed as contract, pass through contract Sign platform 1203 and establish contractual relation;
Monitor supervision platform 1204, the contractual capacity of the first user is monitored, and obtains second user to the first user's The assessment data of contractual capacity;
Social platform 1205, obtained from block chain network 1206 and assess data and data of honouring an agreement, and according to the first user The disclosure authority arranged between second user, issued in information promulgating platform corresponding to authority is disclosed and assess data and honour an agreement Data.
Block chain network 1206, caused various user behavior datas in the contractual relation fulfillment processes are stored in, stored Mode may refer in embodiment illustrated in fig. 7 described mode, no longer repeat one by one here.
In the 1990s, the improvement for a technology can clearly distinguish be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And as the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow is programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, PLD (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, its logic function is determined by user to device programming.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, without asking chip maker to design and make Special IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " patrols Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but have many kinds, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed are most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also should This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, Can is readily available the hardware circuit for realizing the logical method flow.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing Device and storage can by the computer of the computer readable program code (such as software or firmware) of (micro-) computing device Read medium, gate, switch, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and embedded microcontroller, the example of controller include but is not limited to following microcontroller Device:ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320, are deposited Memory controller is also implemented as a part for the control logic of memory.It is also known in the art that except with Pure computer readable program code mode realized beyond controller, completely can be by the way that method and step is carried out into programming in logic to make Controller is obtained in the form of gate, switch, application specific integrated circuit, programmable logic controller (PLC) and embedded microcontroller etc. to come in fact Existing identical function.Therefore this controller is considered a kind of hardware component, and various for realizing to including in it The device of function can also be considered as the structure in hardware component.Or even, can be by for realizing that the device of various functions regards For that not only can be the software module of implementation method but also can be the structure in hardware component.
System, device, module or the unit that above-described embodiment illustrates, it can specifically be realized by computer chip or entity, Or realized by the product with certain function.One kind typically realizes that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet PC, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units during description apparatus above with function to describe respectively.Certainly, this is being implemented The function of each unit can be realized in same or multiple softwares and/or hardware during application.
It should be understood by those skilled in the art that, embodiments of the invention can be provided as method, system or computer program Product.Therefore, the present invention can use the reality in terms of complete hardware embodiment, complete software embodiment or combination software and hardware Apply the form of example.Moreover, the present invention can use the computer for wherein including computer usable program code in one or more The computer program production that usable storage medium is implemented on (including but is not limited to magnetic disk storage, CD-ROM, optical memory etc.) The form of product.
The present invention is the flow with reference to method according to embodiments of the present invention, equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that can be by every first-class in computer program instructions implementation process figure and/or block diagram Journey and/or the flow in square frame and flow chart and/or block diagram and/or the combination of square frame.These computer programs can be provided The processors of all-purpose computer, special-purpose computer, Embedded Processor or other programmable data processing devices is instructed to produce A raw machine so that produced by the instruction of computer or the computing device of other programmable data processing devices for real The device for the function of being specified in present one flow of flow chart or one square frame of multiple flows and/or block diagram or multiple square frames.
These computer program instructions, which may be alternatively stored in, can guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works so that the instruction being stored in the computer-readable memory, which produces, to be included referring to Make the manufacture of device, the command device realize in one flow of flow chart or multiple flows and/or one square frame of block diagram or The function of being specified in multiple square frames.
These computer program instructions can be also loaded into computer or other programmable data processing devices so that counted Series of operation steps is performed on calculation machine or other programmable devices to produce computer implemented processing, so as in computer or The instruction performed on other programmable devices is provided for realizing in one flow of flow chart or multiple flows and/or block diagram one The step of function of being specified in individual square frame or multiple square frames.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and internal memory.
Internal memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only storage (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moved State random access memory (DRAM), other kinds of random access memory (RAM), read-only storage (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc read-only storage (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic cassette tape, the storage of tape magnetic rigid disk or other magnetic storage apparatus Or any other non-transmission medium, the information that can be accessed by a computing device available for storage.Define, calculate according to herein Machine computer-readable recording medium does not include temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It should also be noted that, term " comprising ", "comprising" or its any other variant are intended to nonexcludability Comprising so that process, method, commodity or equipment including a series of elements not only include those key elements, but also wrapping Include the other element being not expressly set out, or also include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the key element limited by sentence "including a ...", it is not excluded that wanted including described Other identical element also be present in the process of element, method, commodity or equipment.
The application can be described in the general context of computer executable instructions, such as program Module.Usually, program module includes performing particular task or realizes routine, program, object, the group of particular abstract data type Part, data structure etc..The application can also be put into practice in a distributed computing environment, in these DCEs, by Task is performed and connected remote processing devices by communication network.In a distributed computing environment, program module can be with In the local and remote computer-readable storage medium including storage device.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for system For applying example, because it is substantially similar to embodiment of the method, so description is fairly simple, related part is referring to embodiment of the method Part explanation.
Embodiments herein is the foregoing is only, is not limited to the application.For those skilled in the art For, the application can have various modifications and variations.All any modifications made within spirit herein and principle, it is equal Replace, improve etc., it should be included within the scope of claims hereof.

Claims (39)

1. a kind of data processing method based on block chain, including:
Block chain node determines the contractual relation established between the first user and second user;
Based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and determine user's row For the data access authority of data;
According to data access authority and the preset relation between strategy is handled, determines the processing strategy of the user behavior data, The processing rule to match with the data access authority is included in the processing strategy;
The user behavior data is handled using the processing strategy.
2. data processing method according to claim 1, determining the data access authority of the user behavior data, wrap Include:
Based on including mapping relations between data source and the data access authority of user behavior data in the contractual relation, It is determined that the data source of the user behavior data got;
Based on the data source, the data access authority of the user behavior data is determined, the data access authority includes Both sides' access is concluded by contract, accessed by the user that specified relationship is established with contract conclusion both sides, one kind in unrestricted access, The specified relationship includes the one or more in kinship, friends, classmate's relation.
3. data processing method according to claim 1 or 2, obtain the user behavior number associated with the contractual relation According to, including:
Receive the data of being honoured an agreement caused by during the contractual relation is fulfiled that first user sends, the data of honouring an agreement In comprising the contractual relation, fulfil the generation of behavioral data voluntary corresponding to the contractual relation and the behavioral data Time.
4. data processing method according to claim 3, methods described also include:
The data of honouring an agreement are sent to the second user.
5. data processing method according to claim 3, determining the data access authority of the user behavior data, wrap Include:
If comprising access rights corresponding to user behavior data caused by first user for by contract in the contractual relation Conclude both sides to access, then it is determined that the data access authority of the data of honouring an agreement is to conclude both sides by contract to access.
6. data processing method according to claim 3, determining the data access authority of the user behavior data, wrap Include:
If in the contractual relation comprising access rights corresponding to user behavior data caused by first user be by with contract About conclude both sides establish specified relationship user access, then it is determined that the data access authority of the data of honouring an agreement be by with contract Conclude user's access that both sides establish specified relationship.
7. according to the data processing method described in claim 1 or 2 or 4, the user row associated with the contractual relation is obtained For data, including:
Receive the assessment data assessed the contractual capacity of first user that the second user is sent, the assessment In data comprising whether honour an agreement on time, the one or more in degree of honouring an agreement.
8. data processing method according to claim 7, determining the data access authority of the user behavior data, wrap Include:
If comprising access rights corresponding to user behavior data caused by the second user for by contract in the contractual relation Conclude both sides to access, then the data access authority for determining the assessment data is to conclude both sides by contract to access.
9. data processing method according to claim 7, determining the data access authority of the user behavior data, wrap Include:
If in the contractual relation comprising access rights corresponding to user behavior data caused by the second user be by with contract About conclude both sides establish specified relationship user access, then determine it is described assessment data data access authority be by with contract Conclude user's access that both sides establish specified relationship.
10. the data processing method according to claim 5 or 8, using the processing strategy to the user behavior data Handled, including:
According to being included in the processing strategy and conclude both sides by contract and access the processing to match rule, it is defined as described the One user and the first public and private key pair of second user distribution;
The data of honouring an agreement/assessment data are encrypted using the private key of the first public and private key centering;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
11. data processing method according to claim 10, methods described also include:
The assessment data access request that first user sends is received, described second is included in the assessment data access request User's mark of user and the contractual relation;
The assessment data after encryption are sent to first user, make first user public and private close using described first The assessment data after the encryption that receives are decrypted the public key of key centering, obtain the assessment data.
12. the data processing method according to claim 6 or 9, using the processing strategy to the user behavior data Handled, including:
Access what is matched with the user by establishing specified relationship with contract conclusion both sides according to being included in the processing strategy Processing rule, determines the second public and private key pair, and second public and private key identifies to the user for being allocated to first user Owning user group is identified with the user of the second user, also includes in the customer group and is marked with the user of first user Know the user's mark at least one user that specified relationship is established with the user of second user mark;
The data of honouring an agreement/assessment data are encrypted using the private key of the second public and private key centering;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
13. data processing method according to claim 1, the contract for determining to establish between the first user and second user is closed System, including:
The contract for receiving the first user transmission signs request, the contract sign in request user's mark comprising second user and Contract data, the contract data are fulfiled for characterizing first user to second user promise in setting time Obligation;
The contract is signed into request and is sent to second user corresponding to user's mark of the second user;
Receive the confirmation that the second user returns, and according to the confirmation, establish first user with it is described Contractual relation between second user.
14. data processing method according to claim 13, methods described also include:
The contractual relation is stored into block chain.
15. data processing method according to claim 7, methods described also include:
According to the assessment data, the credit data of first user is handled;
Credit data after processing is encrypted the private key for being utilized as the public and private key centering of the first user configuration;
The credit data that encryption obtains is stored into block chain.
16. data processing method according to claim 15, according to the assessment data, to the credit of first user Data are handled, including:
According to the assessment data, the credit value of adjustment first user.
17. data processing method according to claim 15, according to the assessment data, to the credit of first user Data are handled, including:
According to the credit label assessed data and historical evaluation data, determine first user, the credit label For characterizing the confidence level of user;
The mapping relations established between user's mark of first user and the credit label.
18. data processing method according to claim 7, methods described also include:
The assessment data are sent to first user;
The objection data that first user sends are received, the objection data are used to characterize first user to the assessment The objection of data;
Store the contractual relation, the objection data and the mapping relations assessed between data.
19. data processing method according to claim 1, pre-established between the second user and first user Specified relationship, the specified relationship include the one or more in kinship, friends, classmate's relation.
20. a kind of data processing equipment based on block chain, including:
Determining unit, determine the contractual relation established between the first user and second user;
Acquiring unit, based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and determine institute State the data access authority of user behavior data;
Processing unit, according to the preset relation between data access authority and processing strategy, determine the user behavior data Processing strategy, the processing rule to match with the data access authority is included during the processing is tactful;And utilize the processing Strategy is handled the user behavior data.
21. data processing equipment according to claim 20, the acquiring unit determines the number of the user behavior data According to access rights, including:
Based on including mapping relations between data source and the data access authority of user behavior data in the contractual relation, It is determined that the data source of the user behavior data got;
Based on the data source, the data access authority of the user behavior data is determined, the data access authority includes Both sides' access is concluded by contract, accessed by the user that specified relationship is established with contract conclusion both sides, one kind in unrestricted access, The specified relationship includes the one or more in kinship, friends, classmate's relation.
22. the data processing equipment according to claim 20 or 21, the acquiring unit obtains and the contractual relation phase The user behavior data of association, including:
Receive the data of being honoured an agreement caused by during the contractual relation is fulfiled that first user sends, the data of honouring an agreement In comprising the contractual relation, fulfil the generation of behavioral data voluntary corresponding to the contractual relation and the behavioral data Time.
23. data processing equipment according to claim 22, the data processing equipment also includes:Transmitting element, wherein:
The transmitting element, the data of honouring an agreement are sent to the second user.
24. data processing equipment according to claim 22, the acquiring unit determines the number of the user behavior data According to access rights, including:
If comprising access rights corresponding to user behavior data caused by first user for by contract in the contractual relation Conclude both sides to access, then it is determined that the data access authority of the data of honouring an agreement is to conclude both sides by contract to access.
25. data processing equipment according to claim 22, the acquiring unit determines the number of the user behavior data According to access rights, including:
If in the contractual relation comprising access rights corresponding to user behavior data caused by first user be by with contract About conclude both sides establish specified relationship user access, then it is determined that the data access authority of the data of honouring an agreement be by with contract Conclude user's access that both sides establish specified relationship.
26. according to the data processing equipment described in claim 20 or 21 or 23, the acquiring unit obtains closes with the contract The associated user behavior data of system, including:
Receive the assessment data assessed the contractual capacity of first user that the second user is sent, the assessment In data comprising whether honour an agreement on time, the one or more in degree of honouring an agreement.
27. data processing equipment according to claim 26, the acquiring unit determines the number of the user behavior data According to access rights, including:
If comprising access rights corresponding to user behavior data caused by the second user for by contract in the contractual relation Conclude both sides to access, then the data access authority for determining the assessment data is to conclude both sides by contract to access.
28. data processing equipment according to claim 26, the acquiring unit determines the number of the user behavior data According to access rights, including:
If in the contractual relation comprising access rights corresponding to user behavior data caused by the second user be by with contract About conclude both sides establish specified relationship user access, then determine it is described assessment data data access authority be by with contract Conclude user's access that both sides establish specified relationship.
29. the data processing equipment according to claim 24 or 27, the processing unit is using the processing strategy to institute User behavior data is stated to be handled, including:
According to being included in the processing strategy and conclude both sides by contract and access the processing to match rule, it is defined as described the One user and the first public and private key pair of second user distribution;
The data of honouring an agreement/assessment data are encrypted using the private key of the first public and private key centering;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
30. data processing equipment according to claim 29, the data processing equipment also includes:Receiving unit, wherein:
The receiving unit, receive the assessment data access request that first user sends, the assessment data access request In comprising the second user user mark and the contractual relation;
The assessment data after encryption are sent to first user, make first user public and private close using described first The assessment data after the encryption that receives are decrypted the public key of key centering, obtain the assessment data.
31. the data processing equipment according to claim 25 or 28, the processing unit is using the processing strategy to institute User behavior data is stated to be handled, including:
Access what is matched with the user by establishing specified relationship with contract conclusion both sides according to being included in the processing strategy Processing rule, determines the second public and private key pair, and second public and private key identifies to the user for being allocated to first user Owning user group is identified with the user of the second user, also includes in the customer group and is marked with the user of first user Know the user's mark at least one user that specified relationship is established with the user of second user mark;
The data of honouring an agreement/assessment data are encrypted using the private key of the second public and private key centering;
Data of being honoured an agreement described in obtaining/assessment data storage will be encrypted into block chain.
32. data processing equipment according to claim 20, the determining unit determine the first user and second user it Between the contractual relation established, including:
The contract for receiving the first user transmission signs request, the contract sign in request user's mark comprising second user and Contract data, the contract data are fulfiled for characterizing first user to second user promise in setting time Obligation;
The contract is signed into request and is sent to second user corresponding to user's mark of the second user;
Receive the confirmation that the second user returns, and according to the confirmation, establish first user with it is described Contractual relation between second user.
33. data processing equipment according to claim 32, the data processing equipment also includes:Memory cell, wherein:
The memory cell, the contractual relation is stored into block chain.
34. data processing equipment according to claim 26, the processing unit is according to the assessment data, to described The credit data of one user is handled;
Credit data after processing is encrypted the private key for being utilized as the public and private key centering of the first user configuration;
The credit data that encryption obtains is stored into block chain.
35. data processing equipment according to claim 34, the processing unit is according to the assessment data, to described The credit data of one user is handled, including:
According to the assessment data, the credit value of adjustment first user.
36. data processing equipment according to claim 34, the processing unit is according to the assessment data, to described The credit data of one user is handled, including:
According to the credit label assessed data and historical evaluation data, determine first user, the credit label For characterizing the confidence level of user;
The mapping relations established between user's mark of first user and the credit label.
37. data processing equipment according to claim 26, the transmitting element, the assessment data are sent to described First user;
The objection data that first user sends are received, the objection data are used to characterize first user to the assessment The objection of data;
Store the contractual relation, the objection data and the mapping relations assessed between data.
38. data processing equipment according to claim 20, built in advance between the second user and first user Vertical specified relationship, the specified relationship include the one or more in kinship, friends, classmate's relation.
39. a kind of data processing equipment based on block chain, including:Memory and at least one processor, wherein:The storage Device has program stored therein, and is configured to by least one computing device following steps:
Determine the contractual relation established between the first user and second user;
Based on the contractual relation, the user behavior data associated with the contractual relation is obtained, and determine user's row For the data access authority of data;
According to data access authority and the preset relation between strategy is handled, determines the processing strategy of the user behavior data, The processing rule to match with the data access authority is included in the processing strategy;And using the processing strategy to described User behavior data is handled.
CN201710407238.XA 2017-06-02 2017-06-02 Data processing method and device based on block chain Active CN107451485B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710407238.XA CN107451485B (en) 2017-06-02 2017-06-02 Data processing method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710407238.XA CN107451485B (en) 2017-06-02 2017-06-02 Data processing method and device based on block chain

Publications (2)

Publication Number Publication Date
CN107451485A true CN107451485A (en) 2017-12-08
CN107451485B CN107451485B (en) 2020-03-13

Family

ID=60486966

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710407238.XA Active CN107451485B (en) 2017-06-02 2017-06-02 Data processing method and device based on block chain

Country Status (1)

Country Link
CN (1) CN107451485B (en)

Cited By (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109002729A (en) * 2018-07-09 2018-12-14 福建省农村信用社联合社 A kind of customer privacy data managing method based on financial block chain
CN109034766A (en) * 2018-06-22 2018-12-18 杭州复杂美科技有限公司 Loaning bill method and system, equipment and storage medium
CN109064291A (en) * 2018-08-08 2018-12-21 平安科技(深圳)有限公司 House lease method, system, computer equipment and storage medium
CN109064031A (en) * 2018-08-03 2018-12-21 四川民工加网络科技有限公司 Project stakeholder's credit assessment method, block chain and storage medium based on block chain
CN109102176A (en) * 2018-07-25 2018-12-28 珠海宏桥高科技有限公司 A kind of trade finance appraisal procedure and device based on block chain
CN109118038A (en) * 2018-06-27 2019-01-01 北京未来通证科技有限公司 The risk rating method and device of block chain project
CN109214883A (en) * 2018-07-27 2019-01-15 阿里巴巴集团控股有限公司 Service lease method, apparatus, system and electronic equipment based on block chain
CN109325370A (en) * 2018-08-09 2019-02-12 上海常仁信息科技有限公司 A kind of block chain access robot node device
CN110084572A (en) * 2019-05-09 2019-08-02 北京智签科技有限公司 A kind of electronic contract based on block chain is honoured an agreement processing method automatically
CN110111078A (en) * 2019-05-08 2019-08-09 北京智签科技有限公司 Electronic contract based on block chain is honoured an agreement management method and system manually
CN110175178A (en) * 2018-11-01 2019-08-27 华为终端有限公司 A kind of method of data processing, node device and system
CN110334160A (en) * 2019-06-11 2019-10-15 阿里巴巴集团控股有限公司 Relationship binding method, device and equipment based on block chain
CN110570320A (en) * 2019-09-11 2019-12-13 泰康保险集团股份有限公司 block chain-based risk guarantee contract establishing method and device
CN110598386A (en) * 2019-09-27 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and storage medium
CN110717676A (en) * 2019-10-10 2020-01-21 广西电网有限责任公司 Method and system for managing and controlling performance risk
CN111178710A (en) * 2019-12-18 2020-05-19 北京航天智造科技发展有限公司 Block chain-based performance capability authentication system and method
TWI694350B (en) * 2018-05-11 2020-05-21 香港商阿里巴巴集團服務有限公司 Information supervision method and device based on blockchain
WO2020098084A1 (en) * 2018-11-13 2020-05-22 平安科技(深圳)有限公司 Processing method and apparatus for loan service, and computer device
CN111669268A (en) * 2020-06-03 2020-09-15 北京八分量信息科技有限公司 Block chain-based electronic data processing method and device and related products
US10909252B2 (en) 2019-06-11 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based relationship binding method, apparatus, and device
CN113472543A (en) * 2021-07-20 2021-10-01 支付宝(杭州)信息技术有限公司 Employment data processing method and device based on block chain, electronic equipment and medium
CN115907971A (en) * 2023-01-30 2023-04-04 江苏安则达信用信息服务有限公司 Data processing method and device suitable for personal credit evaluation system

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN106682520A (en) * 2016-11-17 2017-05-17 精硕科技(北京)股份有限公司 Data exchange method and system
US20170155515A1 (en) * 2015-11-26 2017-06-01 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170155515A1 (en) * 2015-11-26 2017-06-01 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN106503994A (en) * 2016-11-02 2017-03-15 西安电子科技大学 Block chain private data access control method based on encryption attribute
CN106682520A (en) * 2016-11-17 2017-05-17 精硕科技(北京)股份有限公司 Data exchange method and system

Cited By (26)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
TWI694350B (en) * 2018-05-11 2020-05-21 香港商阿里巴巴集團服務有限公司 Information supervision method and device based on blockchain
CN109034766A (en) * 2018-06-22 2018-12-18 杭州复杂美科技有限公司 Loaning bill method and system, equipment and storage medium
CN109118038A (en) * 2018-06-27 2019-01-01 北京未来通证科技有限公司 The risk rating method and device of block chain project
CN109002729B (en) * 2018-07-09 2021-11-23 福建省农村信用社联合社 Client privacy data management method based on financial block chain
CN109002729A (en) * 2018-07-09 2018-12-14 福建省农村信用社联合社 A kind of customer privacy data managing method based on financial block chain
CN109102176A (en) * 2018-07-25 2018-12-28 珠海宏桥高科技有限公司 A kind of trade finance appraisal procedure and device based on block chain
CN109214883A (en) * 2018-07-27 2019-01-15 阿里巴巴集团控股有限公司 Service lease method, apparatus, system and electronic equipment based on block chain
CN109064031A (en) * 2018-08-03 2018-12-21 四川民工加网络科技有限公司 Project stakeholder's credit assessment method, block chain and storage medium based on block chain
CN109064291B (en) * 2018-08-08 2023-05-30 平安科技(深圳)有限公司 House property leasing method, system, computer equipment and storage medium
CN109064291A (en) * 2018-08-08 2018-12-21 平安科技(深圳)有限公司 House lease method, system, computer equipment and storage medium
CN109325370A (en) * 2018-08-09 2019-02-12 上海常仁信息科技有限公司 A kind of block chain access robot node device
CN110175178A (en) * 2018-11-01 2019-08-27 华为终端有限公司 A kind of method of data processing, node device and system
CN110175178B (en) * 2018-11-01 2022-06-07 花瓣云科技有限公司 Data processing method, node equipment and system
WO2020098084A1 (en) * 2018-11-13 2020-05-22 平安科技(深圳)有限公司 Processing method and apparatus for loan service, and computer device
CN110111078A (en) * 2019-05-08 2019-08-09 北京智签科技有限公司 Electronic contract based on block chain is honoured an agreement management method and system manually
CN110084572A (en) * 2019-05-09 2019-08-02 北京智签科技有限公司 A kind of electronic contract based on block chain is honoured an agreement processing method automatically
CN110334160A (en) * 2019-06-11 2019-10-15 阿里巴巴集团控股有限公司 Relationship binding method, device and equipment based on block chain
US10909252B2 (en) 2019-06-11 2021-02-02 Advanced New Technologies Co., Ltd. Blockchain-based relationship binding method, apparatus, and device
CN110570320A (en) * 2019-09-11 2019-12-13 泰康保险集团股份有限公司 block chain-based risk guarantee contract establishing method and device
CN110598386B (en) * 2019-09-27 2023-05-30 腾讯科技(深圳)有限公司 Block chain-based data processing method, device, equipment and storage medium
CN110598386A (en) * 2019-09-27 2019-12-20 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain and storage medium
CN110717676A (en) * 2019-10-10 2020-01-21 广西电网有限责任公司 Method and system for managing and controlling performance risk
CN111178710A (en) * 2019-12-18 2020-05-19 北京航天智造科技发展有限公司 Block chain-based performance capability authentication system and method
CN111669268A (en) * 2020-06-03 2020-09-15 北京八分量信息科技有限公司 Block chain-based electronic data processing method and device and related products
CN113472543A (en) * 2021-07-20 2021-10-01 支付宝(杭州)信息技术有限公司 Employment data processing method and device based on block chain, electronic equipment and medium
CN115907971A (en) * 2023-01-30 2023-04-04 江苏安则达信用信息服务有限公司 Data processing method and device suitable for personal credit evaluation system

Also Published As

Publication number Publication date
CN107451485B (en) 2020-03-13

Similar Documents

Publication Publication Date Title
CN107451485A (en) A kind of data processing method and equipment based on block chain
US11803660B2 (en) Secure permissioning of access to user accounts, including secure distribution of aggregated user account data
US11544808B2 (en) Digital negotiation platform
Guerar et al. A fraud-resilient blockchain-based solution for invoice financing
Habib et al. Towards a trust management system for cloud computing marketplaces: using CAIQ as a trust information source
US20170270527A1 (en) Assessing trust to facilitate blockchain transactions
US20230019639A1 (en) Systems and methods for blockchain-based payment transactions, alerts, and dispute settlement, using a blockchain interface server
CN112465627B (en) Financial loan auditing method and system based on block chain and machine learning
CN107451712A (en) A kind of data processing method and equipment
JP6632717B2 (en) Financial transaction management system, financial transaction management method and server
US20210185091A1 (en) Advanced Security System for Implementation in an Internet of Things (IOT) Blockchain Network
US11616816B2 (en) Distributed ledger based document image extracting and processing within an enterprise system
US11212241B1 (en) Simulation-based virtual advisor
US11715104B2 (en) Systems and methods for executing real-time electronic transactions using API calls
WO2022016280A1 (en) Digital ledger based health data sharing and management
US20210201423A1 (en) System and method for monitoring insurance claims and detecting fraud and communication thereof
US20230418918A1 (en) User information gathering and distribution system
Singh et al. Cloud-based patient health information exchange system using blockchain technology
WO2023038947A1 (en) Method for evaluation and payout of parametric risk-coverage for hard-to-insure risks using distributed ledger and associated system
EP4244801A1 (en) Data communications protocol platform
US11995723B1 (en) Systems and methods for administrating a certificate of deposit
US20230274272A1 (en) Systems and methods for executing real-time reconciliation and notification of electronic transactions
US20230013949A1 (en) Interactive user interface systems and methods for analyzing transaction attributes and dispute information using blockchain
CA3179224A1 (en) Bias detection and reduction in a machine-learning techniques
US20210056518A1 (en) Authentication credential system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1247361

Country of ref document: HK

TA01 Transfer of patent application right

Effective date of registration: 20191209

Address after: P.O. Box 31119, grand exhibition hall, hibiscus street, 802 West Bay Road, Grand Cayman, ky1-1205, Cayman Islands

Applicant after: Innovative advanced technology Co., Ltd

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Co., Ltd.

TA01 Transfer of patent application right
GR01 Patent grant