CN107896157A - Blacklist data exchange method and application server - Google Patents

Blacklist data exchange method and application server Download PDF

Info

Publication number
CN107896157A
CN107896157A CN201710773975.1A CN201710773975A CN107896157A CN 107896157 A CN107896157 A CN 107896157A CN 201710773975 A CN201710773975 A CN 201710773975A CN 107896157 A CN107896157 A CN 107896157A
Authority
CN
China
Prior art keywords
data
blacklist
blacklist data
request
partial node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710773975.1A
Other languages
Chinese (zh)
Other versions
CN107896157B (en
Inventor
郭鹏程
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Financial Technology Co Ltd Shanghai
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Financial Technology Co Ltd Shanghai filed Critical OneConnect Financial Technology Co Ltd Shanghai
Priority to CN201710773975.1A priority Critical patent/CN107896157B/en
Publication of CN107896157A publication Critical patent/CN107896157A/en
Priority to PCT/CN2018/101265 priority patent/WO2019042176A1/en
Application granted granted Critical
Publication of CN107896157B publication Critical patent/CN107896157B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/50Network service management, e.g. ensuring proper service fulfilment according to agreements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a kind of blacklist data exchange method, and applied to application server, the application server is host node, enters row data communication with multiple partial nodes, this method includes:The blacklist data monitored between the partial node exchanges request and response;It is that each partial node distributes corresponding responsibility according to monitoring result;The partial node that notice is not involved in this exchange is used as supervision side, and the give-and-take conditions for exchanging both sides are verified;The one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.The present invention also provides a kind of application server and computer-readable recording medium.Blacklist data exchange method, application server and computer-readable recording medium provided by the invention can carry out blacklist data exchange and its management using the intelligent contract technology based on block chain.

Description

Blacklist data exchange method and application server
Technical field
The present invention relates to technical field of data processing, more particularly to a kind of blacklist data exchange method and application service Device.
Background technology
The blacklist of industry is exchanged and shared at present, and mainly data storage center unit utilizes various method for running, is attracted External agency uploads blacklist data to central element, is then shared with other external agencies by central element.External agency The purposes for uploading data is not controlled, the advantage rule reason central element operation definition that sharing data is brought, which seems, not enough may be used Lean on, therefore the wish of external agency's upload exchange data is very weak, data silo is difficult to break.In addition, central element receive it is outer Portion mechanism uploads data, and its quality is uneven, and central element is difficult to give normal constraint, the cost for causing data post to handle Very high, the cost for externally sharing recycling is very big.
The content of the invention
In view of this, the present invention proposes a kind of blacklist data exchange method and application server, with solve how specification The problem of exchange and management of blacklist data.
First, to achieve the above object, the present invention proposes a kind of blacklist data exchange method, applied to application service Device, the application server are host node, enter row data communication with multiple partial nodes, the method comprising the steps of:
The blacklist data monitored between the partial node exchanges request and response;
It is that each partial node distributes corresponding responsibility according to monitoring result;
The partial node that notice is not involved in this exchange is used as supervision side, and the give-and-take conditions for exchanging both sides are verified;And
The one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Alternatively, this method also includes step before being monitored:
The blacklist data uploaded to partial node is verified in advance;
Verification classification processing is carried out to the partial node according to pre- check results.
Alternatively, the pre- checking procedure is that host node verifies whether the blacklist data conforms to according to preset rules Ask, the preset rules include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data.
Alternatively, the verification classification processing is the partial node according to corresponding to the standard degree of the blacklist data is Switch-level corresponding to setting, corresponding transaction coin is then authorized and distributed to the partial node.
Alternatively, the verification classification processing also includes:
Set when the standard degree of the blacklist data is higher, the partial node is exchanged to more with less transaction coin Data;
It is the transaction coin that the partial node distributes respective amount according to the data volume of the blacklist data and preset ratio.
Alternatively, described the step of distributing corresponding responsibility according to monitoring result for each partial node, specifically includes:
The partial node for sending blacklist data exchange request is configured to request of data side, will have agreed to the blacklist data The partial node for exchanging request is configured to data providing, will not send blacklist data and exchange in request and response or the response Feedback result be to disagree the blacklist data and exchange the partial node of request or choose wherein one or more to be configured to Supervision side.
Alternatively, the give-and-take conditions include whether the blacklist data that data providing provides meets the preset rules And whether request of data side there are enough transaction coin, reach give-and-take conditions when exchanging both sides, i.e. data providing provides black When list data meets the preset rules and request of data side has enough transaction coin corresponding with the blacklist data, table Show that verification passes through.
Alternatively, it is described notice by give-and-take conditions verify partial node it is one-to-one progress data exchange the step of specifically wrap Include:
Request of data side's need are calculated according to the data volume of the switch-level of the request of data side and blacklist data The transaction coin to be paid;
After the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to The request of data side.
In addition, to achieve the above object, the present invention also provides a kind of application server, including memory, processor and deposits The blacklist data exchange system that can be run on the memory and on the processor is stored up, the blacklist data exchanges The step of blacklist data exchange method described above is realized when system is by the computing device.
Further, to achieve the above object, the present invention also provides a kind of computer-readable recording medium, the computer Readable storage medium storing program for executing is stored with blacklist data exchange system, and the blacklist data exchange system can be by least one processor Perform, so that the step of at least one computing device blacklist data exchange method described above.
Compared to prior art, blacklist data exchange method, application server and computer proposed by the invention can Storage medium, host node that can be using a central element as block chain are read, other cooperative institutions utilize base as partial node Blacklist data exchange and its management are carried out in the intelligent contract technology of block chain.Pass through the blacklist data uploaded to partial node Carry out pre- verification and make verification classification processing, the partial node for being not involved in this exchange is used as supervision side, the exchange bar to exchanging both sides Part is verified, so as to ensure to exchange the true conjunction rule of data.Because exchange process is Clear & Transparent, blacklist data is shared favorably Carry out in the business of every mechanism, give up the misgivings that cooperative institution uploads data.Central element can be the quality for exchanging data Escort, establish the data ecosphere.
Brief description of the drawings
Fig. 1 is each optional application environment schematic diagram of embodiment one of the present invention;
Fig. 2 is the schematic diagram of one optional hardware structure of application server in Fig. 1;
Fig. 3 is the program module schematic diagram of blacklist data exchange system first embodiment of the present invention;
Fig. 4 is the program module schematic diagram of blacklist data exchange system second embodiment of the present invention;
Fig. 5 is the schematic flow sheet of blacklist data exchange method first embodiment of the present invention;
Fig. 6 is the schematic flow sheet of blacklist data exchange method second embodiment of the present invention.
Reference:
Terminal device 1
Application server 2
Block chain network 3
Memory 11
Processor 12
Network interface 13
Blacklist data exchange system 200
Monitoring modular 201
Distribute module 202
Notification module 203
Pre- correction verification module 204
Diversity module 205
The realization, functional characteristics and advantage of the object of the invention will be described further referring to the drawings in conjunction with the embodiments.
Embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, it is right below in conjunction with drawings and Examples The present invention is further elaborated.It should be appreciated that specific embodiment described herein is only to explain the present invention, not For limiting the present invention.Based on the embodiment in the present invention, those of ordinary skill in the art are not before creative work is made The every other embodiment obtained is put, belongs to the scope of protection of the invention.
It should be noted that the description for being related to " first ", " second " etc. in the present invention is only used for describing purpose, and can not It is interpreted as indicating or implies its relative importance or imply the quantity of the technical characteristic indicated by indicating.Thus, define " the One ", at least one this feature can be expressed or be implicitly included to the feature of " second ".In addition, the skill between each embodiment Art scheme can be combined with each other, but must can be implemented as basis with those of ordinary skill in the art, when technical scheme With reference to occurring conflicting or will be understood that the combination of this technical scheme is not present when can not realize, also not in application claims Protection domain within.
As shown in fig.1, it is each optional application environment schematic diagram of embodiment one of the present invention.
In the present embodiment, present invention can apply to include but not limited to, terminal device 1, application server 2, network In 3 application environment.The application server 2, block chain network 3 and multiple terminal devices 1 collectively form a block chain Network system, to carry out the exchange of blacklist data and management.
Wherein, application server 2 is a kind of can to carry out numerical computations automatically according to the instruction for being previously set or storing And/or the equipment of information processing, for blacklist data centrally stored and that management is to be exchanged, as described block chain network system The host node of system.The application server 2 can be computer, can also be single network server, multiple webservers The server group of the composition either cloud being made up of a large amount of main frames or the webserver based on cloud computing.
Block chain network 3 is used to carry out data transmission and interact in the block chain network system.The application service Device 2 enters row data communication by the block chain network 3 and multiple terminal devices 1, and the network can be intranet (Intranet), internet (Internet), global system for mobile communications (Global System of Mobile Communication, GSM), WCDMA (Wideband Code Division Multiple Access, WCDMA), the wirelessly or non-wirelessly network such as 4G networks, 5G networks, bluetooth (Bluetooth), Wi-Fi.
Terminal device 1 is used for the exchange for carrying out the blacklist data between each other, is the block chain network system Partial node.The terminal device 1 can be mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (individual Personal digital assistant), PAD (tablet personal computer), PMP (portable media player), guider, car-mounted device etc. it is removable Dynamic equipment, and the fixed terminal of such as digital TV, desktop computer, notebook, server etc..
As shown in fig.2, it is the schematic diagram of 2 one optional hardware structure of application server in Fig. 1.In the present embodiment, institute Stating application server 2 may include, but be not limited only to, and connection memory 11, processor 12, net can be in communication with each other by system bus Network interface 13.It is pointed out that Fig. 2 illustrate only the application server 2 with component 11-13, it should be understood that simultaneously All components shown realistic are not applied, the more or less component of the implementation that can be substituted.
Wherein, the memory 11 comprises at least a type of readable storage medium storing program for executing, and the readable storage medium storing program for executing includes Flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memories etc.), random access storage device (RAM), it is static with Machine access memory (SRAM), read-only storage (ROM), Electrically Erasable Read Only Memory (EEPROM), it is programmable only Read memory (PROM), magnetic storage, disk, CD etc..In certain embodiments, the memory 11 can be described answers With the hard disk or internal memory of the internal storage unit of server 2, such as the application server 2.In further embodiments, it is described to deposit Reservoir 11 can also be that the plug-in type being equipped with the External memory equipment of the application server 2, such as the application server 2 is hard Disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, the memory 11 can also both include the internal storage unit of the application server 2 or wrap Include its External memory equipment.In the present embodiment, the memory 11 is generally used for the behaviour that storage is installed on the application server 2 Make system and types of applications software, such as program code of blacklist data exchange system 200 etc..In addition, the memory 11 It can be also used for temporarily storing the Various types of data that has exported or will export.
The processor 12 can be in certain embodiments central processing unit (Central Processing Unit, CPU), controller, microcontroller, microprocessor or other data processing chips.The processor 12 is generally used for should described in control With the overall operation of server 2, such as perform the control related with the terminal device 1 progress data interaction or communication and place Reason etc..In the present embodiment, the processor 12 is used to run the program code stored in the memory 11 or processing data, Such as run described blacklist data exchange system 200 etc..
The network interface 13 may include radio network interface or wired network interface, and the network interface 13 is generally used for Communication connection is established between the application server 2 and other electronic equipments.In the present embodiment, the network interface 13 is mainly used In the application server 2 is connected with one or more terminal devices 1 by the block chain network 3, answered described Data transmission channel and communication connection are established between server 2 and one or more of terminal devices 1.
So far, oneself is through describing the application environment of each embodiment of the present invention and the hardware configuration and work(of relevant device in detail Energy.Below, above-mentioned application environment and relevant device will be based on, proposes each embodiment of the present invention.
First, the present invention proposes a kind of blacklist data exchange system 200.
As shown in fig.3, it is the Program modual graph of the first embodiment of blacklist data exchange system 200 of the present invention.
In the present embodiment, described blacklist data exchange system 200 includes a series of be stored on memory 11 Computer program instructions, when the computer program instructions are performed by processor 12, it is possible to achieve various embodiments of the present invention it is black List data swap operation.In the block chain for carrying out blacklist data exchange, using a central element as host node, other Cooperative institution is as partial node.The application server 2 is a center list in the block chain of progress blacklist data exchange Position, i.e. host node.The multiple terminal device 1 is carries out other cooperative institutions in the block chain of blacklist data exchange, i.e., Partial node.Using the intelligent contract technology based on block chain, between the individual nodes according to described in the exchange regulation progress of agreement The exchange and management of blacklist data, ensure that whole data exchange process justice is transparent, cooperative institution obtains the process rule of data Model is reasonable.
In certain embodiments, the specific operation realized based on the computer program instructions each several part, blacklist number One or more modules can be divided into according to exchange system 200.For example, in figure 3, the blacklist data exchange system 200 can be divided into monitoring modular 201, distribute module 202, notification module 203.Wherein:
The monitoring modular 201, request and response are exchanged for monitoring the blacklist data between the partial node.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other partial nodes Send blacklist data and exchange request.The request include the mark of this request, the information for the blacklist data asked, Identity of demand partial node etc..The partial node that the blacklist data exchanges request is received, according to self-demand and residue Transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data and asks Make response.The response includes the identifying of this response, the information of corresponding blacklist data, the body of demand partial node Part mark, the identity of response partial node, to feedback result of this request etc..It is described black that the feedback result includes agreement List data, which exchanges request and disagrees the blacklist data, exchanges request.The feedback result is to disagree the blacklist Data exchange request does not send the partial node of the response and is not involved in this data exchange.The monitoring modular 201 can supervise The request and response surveyed between each partial node.The partial node for receiving blacklist data exchange request automated tos respond to, and attempts sum Start data exchange according to provider, and disclosed to other partial nodes and broadcast this switch-activity.
The distribute module 202, for being that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by distribute module 202, will be same The partial node that the blacklist data of anticipating exchanges request is configured to data providing, will not send blacklist data exchange request and Response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to supervise Side.
The notification module 203, for notifying the partial node for being not involved in this exchange to be used as supervision side, to exchanging both sides' Give-and-take conditions are verified.
Specifically, before the exchange of the blacklist data is carried out, each partial node can (application takes to host node Business device 2) blacklist data is uploaded, while host node is a number of coin (bit coin) of merchandising of each partial node distribution of meeting, is used Swapped in subsequently.The supervision side can obtain the blacklist data of data providing offer (i.e. from the host node Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing Blacklist data whether meet whether preset rules and request of data side have enough transaction coin.In the present embodiment, it is described Preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data etc..Separately Outside, according to the data volume of the blacklist data and preset ratio (ratio between data volume and transaction coin quantity), data please The side of asking needs to pay the transaction coin of respective numbers.Reach give-and-take conditions, i.e., the black name that data providing provides when exchanging both sides When forms data meets the preset rules and request of data side there are enough transaction coin corresponding with the blacklist data, represent Verification passes through, and this exchange can just continue.
The notification module 203 is additionally operable to the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the notification module 203 notifies request of data side Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.Notification module 203 is needed according to institute The data volume of the switch-level and blacklist data of stating request of data side calculates the transaction coin that the request of data side needs to pay, After the request of data side is paid successfully, the blacklist data replication synchronization that the data providing is uploaded is to the number According to requesting party.
As shown in fig.4, it is the Program modual graph of the second embodiment of blacklist data exchange system 200 of the present invention.This reality Apply in example, described blacklist data exchange system 200 refers to including a series of computer program being stored on memory 11 Order, when the computer program instructions are performed by processor 12, it is possible to achieve the blacklist data of various embodiments of the present invention exchanges Operation.In the block chain for carrying out blacklist data exchange, using a central element as host node, other cooperative institution's conducts Partial node.The application server 2 is a central element in the block chain of progress blacklist data exchange, i.e. host node. The multiple terminal device 1 is other cooperative institutions in the block chain of progress blacklist data exchange, i.e. partial node.
In the present embodiment, described blacklist data exchange system 200 is except including the monitoring in first embodiment Outside module 201, distribute module 202, notification module 203, in addition to pre- correction verification module 204 and diversity module 205.
The pre- correction verification module 204 is used to verify the blacklist data that partial node uploads in advance.
Specifically, when a partial node uploads blacklist data to host node (application server 2), with the master Node is verified in advance.The pre- checking procedure is that pre- correction verification module 204 verifies that the blacklist data is according to preset rules It is no to meet the requirements.In the present embodiment, the preset rules can include:Data format is correct, can not write privacy of user, no Can there are repetition, missing, false data etc..
The diversity module 205 is used to carry out verification classification processing to the partial node according to pre- check results.
Specifically, diversity module 205 is carried out at verification classification according to the result to the blacklist data to it Reason, the switch-level mainly according to corresponding to the standard degree of the blacklist data for the corresponding partial node setting, then Corresponding transaction coin is authorized and distributed to the partial node.Such as when the standard degree of the blacklist data is higher, institute State partial node subsequently can exchange to more data with less transaction coin.After the blacklist data is verified, institute Blacklist data exchange can be carried out by stating partial node described in host node mandate, and according to the data volume of the blacklist data and pre- If ratio is the transaction coin that the partial node distributes respective amount.
In addition, the present invention also proposes a kind of blacklist data exchange method.
As shown in fig.5, it is the schematic flow sheet of blacklist data exchange method first embodiment of the present invention.It is black in progress In the block chain that list data exchanges, using a central element as host node, other cooperative institutions are as partial node.It is described to answer It is a central element in the block chain for carry out blacklist data exchange, i.e. host node with server 2.The multiple terminal is set Standby 1 is other cooperative institutions in the block chain of progress blacklist data exchange, i.e. partial node.Utilize the intelligence based on block chain Contract technology, the exchange and management of the blacklist data are carried out according to the exchange regulation of agreement between the individual nodes, is ensured Whole data exchange process justice is transparent, and the process specification that cooperative institution obtains data is reasonable.
In the present embodiment, can be changed according to different demands, the execution sequence of the step in flow chart shown in Fig. 5 Become, some steps can be omitted.This method comprises the following steps:
Step S600, the blacklist data monitored between the partial node exchange request and response.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other partial nodes Send blacklist data and exchange request.The request include the mark of this request, the information for the blacklist data asked, Identity of demand partial node etc..The partial node that the blacklist data exchanges request is received, according to self-demand and residue Transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data and asks Make response.The response includes the identifying of this response, the information of corresponding blacklist data, the body of demand partial node Part mark, the identity of response partial node, to feedback result of this request etc..It is described black that the feedback result includes agreement List data, which exchanges request and disagrees the blacklist data, exchanges request.The feedback result is to disagree the blacklist Data exchange request does not send the partial node of the response and is not involved in this data exchange.The application as host node takes Business device 2 can monitor the request and response between each partial node.Receive blacklist data and exchange the partial node of request from the sound of something astir Should, attempt and data providing starts data exchange, and disclosed to other partial nodes and broadcast this switch-activity.
Step S602, it is that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by the application server 2, The partial node that will have agreed to the blacklist data exchange request is configured to data providing, and will not send blacklist data exchange please Summation response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to Supervision side.
Step S604, the partial node that notice is not involved in this exchange are used as supervision side, the give-and-take conditions for exchanging both sides are entered Row verification.
Specifically, before the exchange of the blacklist data is carried out, each partial node can (application takes to host node Business device 2) blacklist data is uploaded, while host node is a number of coin (bit coin) of merchandising of each partial node distribution of meeting, is used Swapped in subsequently.The supervision side can obtain the blacklist data of data providing offer (i.e. from the host node Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing Blacklist data whether meet whether preset rules and request of data side have enough transaction coin.In the present embodiment, it is described Preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has repetition, missing, false data etc..Separately Outside, according to the data volume of the blacklist data and preset ratio (ratio between data volume and transaction coin quantity), data please The side of asking needs to pay the transaction coin of respective numbers.Reach give-and-take conditions, i.e., the black name that data providing provides when exchanging both sides When forms data meets the preset rules and request of data side there are enough transaction coin corresponding with the blacklist data, represent Verification passes through, and this exchange can just continue.
Step S606, the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the application server 2 notifies request of data side Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.The application server 2 needs root The friendship paid is needed according to the switch-level of the request of data side and the data volume calculating request of data side of blacklist data Easy coin, after the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to The request of data side.
After the transaction coin is finished, partial node can obtain transaction coin again by uploading new blacklist data.
As shown in fig. 6, it is the schematic flow sheet of the second embodiment of blacklist data exchange method of the present invention.The present embodiment In, the step S704-S710 of the blacklist data exchange method and the step S600-S606 of first embodiment are similar, area It is not that this method also includes step S700-S702.
This method comprises the following steps:
Step S700, the blacklist data uploaded to partial node are verified in advance.
Specifically, when a partial node uploads blacklist data to host node (application server 2), with the master Node is verified in advance.The pre- checking procedure is that host node verifies whether the blacklist data conforms to according to preset rules Ask.In the present embodiment, the preset rules can include:Data format is correct, can not write privacy of user, it is impossible to has weight Multiple, missing, false data etc..
Step S702, verification classification processing is carried out to the partial node according to pre- check results.
Specifically, the host node carries out verification classification processing to it according to the result to the blacklist data, The switch-level mainly according to corresponding to the standard degree of the blacklist data for the corresponding partial node setting, then to institute State partial node and authorized and distributed corresponding transaction coin.Such as when the standard degree of the blacklist data is higher, described point Node subsequently can exchange to more data with less transaction coin.After the blacklist data is verified, the master Partial node described in node mandate can carry out blacklist data exchange, and the data volume according to the blacklist data and default ratio Example distributes the transaction coin of respective amount for the partial node.
Step S704, the blacklist data monitored between the partial node exchange request and response.
Specifically, each there is the partial node of data exchange demand by the block chain network 3 successively to other points Node sends blacklist data and exchanges request.The request includes the mark of this request, the blacklist data asked The identity etc. of information, demand partial node.Receive the partial node that the blacklist data exchanges request, according to self-demand and Residue transaction coin quantity judges whether to agree to that carrying out this blacklist data exchanges, and then exchanges for the blacklist data Response is made in request.The response includes the identifying of this response, the information of corresponding blacklist data, demand partial node Identity, response partial node identity, to feedback result of this request etc..The feedback result includes agreeing to institute Blacklist data is stated to exchange request and disagree the blacklist data exchange request.The feedback result is described black to disagree List data exchange asks or not sent the partial node of the response to be not involved in this data exchange.Answered as described in host node The request and response between each partial node can be monitored with server 2.Receive blacklist data and exchange the partial node of request certainly Dynamic response, is attempted and data providing starts data exchange, and is disclosed to other partial nodes and broadcasted this switch-activity.
Step S706, it is that each partial node distributes corresponding responsibility according to monitoring result.
For example, the partial node for sending blacklist data exchange request is configured to request of data side by the application server 2, The partial node that will have agreed to the blacklist data exchange request is configured to data providing, and will not send blacklist data exchange please Summation response disagrees the blacklist data and exchanges the partial node (or choosing wherein one or more) of request and is configured to Supervision side.
Step S708, the partial node that notice is not involved in this exchange are used as supervision side, the give-and-take conditions for exchanging both sides are entered Row verification.
Specifically, the supervision side can obtain the blacklist data of data providing offer (i.e. from the host node Data providing is uploaded to the blacklist data of host node), and verified.The give-and-take conditions provide including data providing Blacklist data whether meet whether the preset rules and request of data side have enough transaction coin.Reached when exchanging both sides To give-and-take conditions, i.e., data providing provides blacklist data meets the preset rules and request of data side have with it is described black Corresponding to list data during enough transaction coin, represent that verification passes through, this exchange can just continue.
Step S710, the one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
Specifically, after the give-and-take conditions for exchanging both sides, which verify, to be passed through, the application server 2 notifies request of data side Data exchange is proceeded by with the partial node of data providing.Data providing to request of data side share its prestore it is black List data (by related data replication synchronization to request of data side), request of data root is according to switch-level corresponding to the partial node The transaction coin of respective numbers is paid to data providing with the data volume of the blacklist data.The application server 2 needs root The friendship paid is needed according to the switch-level of the request of data side and the data volume calculating request of data side of blacklist data Easy coin, after the request of data side is paid successfully, by the blacklist data replication synchronization that the data providing uploads to The request of data side.
After the transaction coin is finished, partial node can obtain transaction coin again by uploading new blacklist data.
In addition, the table in the pre- verification situation and data exchange process of the blacklist data subsequently uploaded according to partial node It is existing, switch-level corresponding to the partial node can be adjusted.
The embodiments of the present invention are for illustration only, do not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on such understanding, technical scheme is substantially done to prior art in other words Going out the part of contribution can be embodied in the form of software product, and the computer software product is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions to cause a station terminal equipment (can be mobile phone, computer, clothes Be engaged in device, air conditioner, or network equipment etc.) perform method described in each embodiment of the present invention.
The preferred embodiments of the present invention are these are only, are not intended to limit the scope of the invention, it is every to utilize this hair The equivalent structure or equivalent flow conversion that bright specification and accompanying drawing content are made, or directly or indirectly it is used in other related skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of blacklist data exchange method, applied to application server, the application server is host node, with multiple points Node enters row data communication, and methods described includes step:
The blacklist data monitored between the partial node exchanges request and response;
It is that each partial node distributes corresponding responsibility according to monitoring result;
The partial node that notice is not involved in this exchange is used as supervision side, and the give-and-take conditions for exchanging both sides are verified;And
The one-to-one carry out data exchange of partial node that notice is verified by give-and-take conditions.
2. blacklist data exchange method as claimed in claim 1, it is characterised in that this method is also wrapped before being monitored Include step:
The blacklist data uploaded to partial node is verified in advance;
Verification classification processing is carried out to the partial node according to pre- check results.
3. blacklist data exchange method as claimed in claim 2, it is characterised in that the pre- checking procedure is host node root Verify whether the blacklist data meets the requirements according to preset rules, the preset rules include:Data format is correct, can not write Access customer privacy, it is impossible to have repetition, missing, false data.
4. blacklist data exchange method as claimed in claim 2, it is characterised in that the verification classification processing is according to institute The standard degree for stating blacklist data is switch-level corresponding to the corresponding partial node setting, is then carried out to the partial node Authorize and distribute corresponding transaction coin.
5. blacklist data exchange method as claimed in claim 4, it is characterised in that the verification classification processing also includes:
Set when the standard degree of the blacklist data is higher, the partial node exchanges to more number with less transaction coin According to;
It is the transaction coin that the partial node distributes respective amount according to the data volume of the blacklist data and preset ratio.
6. blacklist data exchange method as claimed in claim 2, it is characterised in that it is described according to monitoring result be each point The step of node distribution corresponding responsibility, specifically includes:
The partial node for sending blacklist data exchange request is configured to request of data side, the blacklist data is will have agreed to and exchanges The partial node of request is configured to data providing, will not send blacklist data exchange it is anti-in request and response or the response Feedback result is to disagree the partial node of the blacklist data exchange request or choose wherein one or more to be configured to supervise Side.
7. blacklist data exchange method as claimed in claim 3, it is characterised in that the give-and-take conditions provide including data Whether the blacklist data just provided meets whether the preset rules and request of data side have enough transaction coin, double when exchanging Fang Jun reaches give-and-take conditions, i.e., the blacklist data that data providing provides meets the preset rules and request of data Fang Youyu Corresponding to the blacklist data during enough transaction coin, represent that verification passes through.
8. blacklist data exchange method as claimed in claim 2, it is characterised in that the notice is verified by give-and-take conditions Partial node it is one-to-one carry out data exchange the step of specifically include:
Calculating the request of data side according to the data volume of the switch-level of the request of data side and blacklist data needs to prop up The transaction coin paid;
After the request of data side is paid successfully, the blacklist data replication synchronization that the data providing is uploaded is to described Request of data side.
9. a kind of application server, it is characterised in that the application server includes memory, processor and is stored in described deposit On reservoir and the blacklist data exchange system that can run on the processor, the blacklist data exchange system are described The step of blacklist data exchange method as any one of claim 1-8 is realized during computing device
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has blacklist data exchange system, Enterprise's recommended program can be by least one computing device, so that at least one computing device such as claim 1- The step of blacklist data exchange method any one of 8.
CN201710773975.1A 2017-08-31 2017-08-31 Blacklist data exchange method and application server Active CN107896157B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710773975.1A CN107896157B (en) 2017-08-31 2017-08-31 Blacklist data exchange method and application server
PCT/CN2018/101265 WO2019042176A1 (en) 2017-08-31 2018-08-20 Blacklist data exchange method and application server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710773975.1A CN107896157B (en) 2017-08-31 2017-08-31 Blacklist data exchange method and application server

Publications (2)

Publication Number Publication Date
CN107896157A true CN107896157A (en) 2018-04-10
CN107896157B CN107896157B (en) 2020-11-03

Family

ID=61803438

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710773975.1A Active CN107896157B (en) 2017-08-31 2017-08-31 Blacklist data exchange method and application server

Country Status (2)

Country Link
CN (1) CN107896157B (en)
WO (1) WO2019042176A1 (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019042176A1 (en) * 2017-08-31 2019-03-07 深圳壹账通智能科技有限公司 Blacklist data exchange method and application server
CN109496407A (en) * 2018-07-27 2019-03-19 袁振南 Method for message transmission, device and storage medium in block catenary system
CN109496406A (en) * 2018-07-27 2019-03-19 袁振南 Node administration method, device and storage medium based on block catenary system
CN109803023A (en) * 2019-01-31 2019-05-24 北京融链科技有限公司 Data processing method and system
CN109858272A (en) * 2018-05-23 2019-06-07 深圳崀途科技有限公司 Blacklist data processing system based on block chain
CN110032573A (en) * 2019-03-26 2019-07-19 中山大学 A kind of blacklist sharing method, referee method and device based on block chain
CN110413853A (en) * 2019-07-22 2019-11-05 中国气象局气象探测中心 A kind of blacklist generation method, device, equipment and medium based on observation data
CN110532786A (en) * 2018-05-23 2019-12-03 深圳崀途科技有限公司 Using the block chain blacklist sharing method of Hash desensitization process
CN111385322A (en) * 2018-12-28 2020-07-07 中国移动通信集团山西有限公司 Blacklist number sharing system, method, device, equipment and storage medium
CN111768294A (en) * 2020-06-29 2020-10-13 中国银行股份有限公司 Charging list processing method, device and system
CN114328413A (en) * 2021-12-30 2022-04-12 中国民航信息网络股份有限公司 Data processing method and device, storage medium and electronic equipment

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110533286B (en) * 2019-07-23 2023-04-18 平安科技(深圳)有限公司 Block chain-based coalition member management method and device and computer equipment
CN111221903B (en) * 2019-12-18 2023-11-28 中思博安科技(北京)有限公司 Data responsibility-following method, system and computer storage medium
CN111694899A (en) * 2020-06-12 2020-09-22 中国银行股份有限公司 Blacklist sharing method and system based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252506A (en) * 2007-12-29 2008-08-27 中国建设银行股份有限公司 Data transmission system
US20160191540A1 (en) * 2014-12-30 2016-06-30 International Business Machines Corporation Authentication based on proximate devices
CN106097006A (en) * 2016-06-09 2016-11-09 杭州复杂美科技有限公司 Block chain charge mode
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106651346A (en) * 2016-11-28 2017-05-10 上海凯岸信息科技有限公司 Block chain-based credit investigation data sharing and trading system
CN107896157B (en) * 2017-08-31 2020-11-03 深圳壹账通智能科技有限公司 Blacklist data exchange method and application server

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101252506A (en) * 2007-12-29 2008-08-27 中国建设银行股份有限公司 Data transmission system
US20160191540A1 (en) * 2014-12-30 2016-06-30 International Business Machines Corporation Authentication based on proximate devices
CN106097006A (en) * 2016-06-09 2016-11-09 杭州复杂美科技有限公司 Block chain charge mode
CN106897902A (en) * 2017-02-21 2017-06-27 中链科技有限公司 Service transacting method, system and trading server based on block chain technology

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019042176A1 (en) * 2017-08-31 2019-03-07 深圳壹账通智能科技有限公司 Blacklist data exchange method and application server
CN109858272A (en) * 2018-05-23 2019-06-07 深圳崀途科技有限公司 Blacklist data processing system based on block chain
CN110532786A (en) * 2018-05-23 2019-12-03 深圳崀途科技有限公司 Using the block chain blacklist sharing method of Hash desensitization process
CN109496407A (en) * 2018-07-27 2019-03-19 袁振南 Method for message transmission, device and storage medium in block catenary system
CN109496406A (en) * 2018-07-27 2019-03-19 袁振南 Node administration method, device and storage medium based on block catenary system
CN109496407B (en) * 2018-07-27 2020-07-24 袁振南 Message transmission method, device and storage medium in block chain system
WO2020019343A1 (en) * 2018-07-27 2020-01-30 袁振南 Message transmission method and apparatus in blockchain system, and storage medium
CN111385322A (en) * 2018-12-28 2020-07-07 中国移动通信集团山西有限公司 Blacklist number sharing system, method, device, equipment and storage medium
CN111385322B (en) * 2018-12-28 2023-11-21 中国移动通信集团山西有限公司 System, method, device, equipment and storage medium for sharing blacklist number
CN109803023A (en) * 2019-01-31 2019-05-24 北京融链科技有限公司 Data processing method and system
CN110032573A (en) * 2019-03-26 2019-07-19 中山大学 A kind of blacklist sharing method, referee method and device based on block chain
CN110413853A (en) * 2019-07-22 2019-11-05 中国气象局气象探测中心 A kind of blacklist generation method, device, equipment and medium based on observation data
CN111768294A (en) * 2020-06-29 2020-10-13 中国银行股份有限公司 Charging list processing method, device and system
CN111768294B (en) * 2020-06-29 2023-08-29 中国银行股份有限公司 Charging list processing method, device and system
CN114328413A (en) * 2021-12-30 2022-04-12 中国民航信息网络股份有限公司 Data processing method and device, storage medium and electronic equipment

Also Published As

Publication number Publication date
CN107896157B (en) 2020-11-03
WO2019042176A1 (en) 2019-03-07

Similar Documents

Publication Publication Date Title
CN107896157A (en) Blacklist data exchange method and application server
CN107464117A (en) Data managing method and block catenary system based on block chain
CN105101163B (en) The method and apparatus of air card-writing
CN107885656A (en) Product algorithm automated testing method and application server
CN108777625A (en) Verification method, device and system, storage medium, the electronic device of signature
CN113535343A (en) Computing power sharing method based on network scheduling and related product
CN108734028A (en) Data managing method, block chain node based on block chain and storage medium
CN106530083A (en) Multi-chain management method and system based on block chain
CN111507717B (en) Data processing method, device, block node and computer readable storage medium
CN109788450B (en) traffic sharing method, system and terminal of Internet of things card
CN108156232A (en) Data sharing method and device
CN109462508A (en) Node deployment method, device and storage medium
CN107948970A (en) System of real name method of network entry, system and the mobile terminal of subordinate terminal
CN109615329A (en) Processing method, device and computer equipment on the line of conductive suggestion
CN110910143A (en) Identity identification generation method, device, related node and medium
CN107909239A (en) Requirement analysis method, application server and the computer-readable recording medium of amount of money budget
CN107909420A (en) Lend-lease administration method and application server
CN113141404B (en) Intelligent gateway and data sharing system
CN110289971A (en) Shared service management method and system
CN108064059A (en) A kind of method of resource allocation, medium and equipment
CN107509097A (en) Video sharing method, apparatus and sharing service device
CN106454787A (en) Flow sharing method and device
CN106162515A (en) A kind of methods, devices and systems of machine type communication secure communication
CN111260468B (en) Block chain-based data operation method, related equipment and storage medium
CN113242457B (en) Resource distribution method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
TA01 Transfer of patent application right

Effective date of registration: 20180530

Address after: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant after: Shenzhen one ledger Intelligent Technology Co., Ltd.

Address before: 200030 Xuhui District, Shanghai Kai Bin Road 166, 9, 10 level.

Applicant before: Shanghai Financial Technologies Ltd

TA01 Transfer of patent application right
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1250094

Country of ref document: HK

GR01 Patent grant
GR01 Patent grant