CN109669986A - Blacklist sharing method, device, equipment and storage medium based on block chain - Google Patents

Blacklist sharing method, device, equipment and storage medium based on block chain Download PDF

Info

Publication number
CN109669986A
CN109669986A CN201811517777.XA CN201811517777A CN109669986A CN 109669986 A CN109669986 A CN 109669986A CN 201811517777 A CN201811517777 A CN 201811517777A CN 109669986 A CN109669986 A CN 109669986A
Authority
CN
China
Prior art keywords
blacklist
block chain
blacklist data
node
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811517777.XA
Other languages
Chinese (zh)
Inventor
王晓明
颜亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lexin Software Technology Co Ltd
Original Assignee
Shenzhen Lexin Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lexin Software Technology Co Ltd filed Critical Shenzhen Lexin Software Technology Co Ltd
Priority to CN201811517777.XA priority Critical patent/CN109669986A/en
Publication of CN109669986A publication Critical patent/CN109669986A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of blacklist sharing method, device, equipment and storage mediums based on block chain.Wherein, this method comprises: receiving the cochain transactions requests including blacklist data, the cochain transactions requests are that client node is generated according to blacklist data to be stored;The cochain transactions requests are handled, and using the blacklist data as in Transaction Information write-in block chain.It can effectively avoid blacklist data while realizing that blacklist is shared and be tampered and reveal, improve the safety of data.

Description

Blacklist sharing method, device, equipment and storage medium based on block chain
Technical field
The present embodiments relate to computer data memory technology more particularly to a kind of blacklist based on block chain are total Enjoy method, apparatus, equipment and storage medium.
Background technique
In consumer finance field, each financing corporation is substantially all the black list database of oneself, but each financing corporation Blacklist visitor database be all it is independent, unshared, to causing same blacklist client occur in different financing corporation's debts Not also the case where.
Such case occurs in order to prevent, by sending respective black name to central store end between some financing corporations Forms data has reached the shared of the blacklist data of each financing corporation, as described in Figure 1, the cooperation being made of several financing corporations Mechanism 1 arrives cooperative institution N, and each cooperative institution passes through the upload interface of blacklist shared platform, by the local blacklist number of oneself Be uploaded to blacklist shared platform according to the blacklist data in library, and can by the query interface of blacklist shared platform, All blacklist datas in shared blacklist shared platform.But blacklist shared platform is black there may be distorting or abusing The possibility of list data, and then lead to the leakage of financing corporation's blacklist data, economic loss is brought to each financing corporation.
Summary of the invention
The embodiment of the present invention provides a kind of blacklist sharing method, device, equipment and storage medium based on block chain, While realizing that blacklist is shared, Information Security ensure that.
In a first aspect, the embodiment of the invention provides a kind of blacklist sharing methods based on block chain, by block chain link Point executes, this method comprises:
Receive include blacklist data cochain transactions requests, the cochain transactions requests be client node according to What the blacklist data of storage generated;
The cochain transactions requests are handled, and block chain is written using the blacklist data as Transaction Information In.
Second aspect, the embodiment of the invention also provides a kind of blacklist sharing means based on block chain, are configured at area In block chain node, which includes:
Cochain request receiving module, for receiving the cochain transactions requests including blacklist data, the cochain affairs are asked Seeking Truth client node is generated according to blacklist data to be stored;
Cochain request processing module for handling the cochain transactions requests, and the blacklist data is made It is written in block chain for Transaction Information.
The third aspect, the embodiment of the invention also provides a kind of equipment, which includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of places It manages device and realizes the blacklist sharing method based on block chain described in first aspect.
Fourth aspect, the embodiment of the invention also provides a kind of storage mediums, are stored thereon with computer program, the journey The blacklist sharing method based on block chain described in first aspect is realized when sequence is executed by processor.
The technical solution of the embodiment of the present invention, by receiving client node according to blacklist data life to be stored At cochain transactions requests, after handling the cochain transactions requests, using blacklist data as Transaction Information be written block In chain.It can effectively avoid blacklist data while realizing that blacklist is shared and be tampered and reveal, improve number According to safety.
Detailed description of the invention
Fig. 1 is the structural framing schematic diagram of shared blacklist in the prior art;
Fig. 2 is a kind of flow chart for blacklist sharing method based on block chain that the embodiment of the present invention one provides;
Fig. 3 is a kind of flow chart of blacklist sharing method based on block chain provided by Embodiment 2 of the present invention;
Fig. 4 is that blacklist provided by Embodiment 2 of the present invention shares block chain network configuration diagram;
Fig. 5 is a kind of flow chart for blacklist sharing method based on block chain that the embodiment of the present invention three provides;
Fig. 6 is a kind of structural schematic diagram for blacklist sharing means based on block chain that the embodiment of the present invention four provides;
A kind of structural schematic diagram of the equipment provided in Fig. 7 embodiment of the present invention five.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to Convenient for describing, only the parts related to the present invention are shown rather than entire infrastructure in attached drawing.
Embodiment one
Fig. 2 is a kind of flow chart for blacklist sharing method based on block chain that the embodiment of the present invention one provides, this reality It applies example to be applicable to carry out blacklist data shared situation based on block chain technology, for example, multiple and different financing corporations Shared situation is carried out based on blacklist client list of the block chain technology to each company.This method can be implemented by the present invention Configuration being executed based on the blacklist sharing means of block chain on block chain node that example provides, for example, this method can be with The blacklist sharing means based on block chain on node are generated in the block of block chain by configuration provided in an embodiment of the present invention To execute.Hardware can be used in the device and/or the mode of software is realized.As shown in Fig. 2, specifically comprising the following steps:
S201, receive include blacklist data cochain transactions requests, cochain transactions requests be client node according to What the blacklist data of storage generated.
Wherein, client node can be the node in block chain, be also possible to through webpage, platform or application program Etc. the node that may participate in block chain.The shared company or enterprise side portion of blacklist data can be carried out at each Affix one's name to a client node.The blacklist data of oneself can be uploaded to area by the client node by each company or enterprise Block chain carries out the shared of blacklist data.Optionally, may participate in the shared company of blacklist data or enterprise has very much, example Such as, bank, financing corporation, communication operator, internet Shopping Company etc..The following embodiment of the present invention is with multiple finance It is introduced for the client node of companies deployment.Blacklist data can be each company or enterprise and send out during operation The lower client list data of existing prestige.
Specifically, when the financing corporation A for being added to block chain network wants the blacklist data of its company being uploaded to block When chain, the blacklist data that can be will upload is uploaded to the client node of financing corporation A, and client node can root The cochain transactions requests comprising blacklist data are generated according to the blacklist data that financing corporation A is uploaded, to request in block chain Each node the blacklist data is added in the block chain of each node.Optionally, client node is according to be stored black It may include blacklist data to be stored, the corresponding client's end segment of financing corporation A that list data, which generates in cochain transactions requests, Mark, request time and the access authority of the data to be stored etc. of point.
It illustratively, can after client node sends the cochain transactions requests comprising blacklist data to block chain network To be to generate node by the current block of block chain network to receive cochain request, and handle cochain request, most The process of blacklist data write-in block chain that will include in cochain transactions requests is completed eventually.
S202 handles cochain transactions requests, and using blacklist data as in Transaction Information write-in block chain.
Optionally, the current block of block chain network generate process that node handles cochain transactions requests can be with It is to be executed according to the intelligent contract of block chain.Wherein, the treatment process arranged in intelligent contract can there are many kinds of, to this The embodiment of the present invention is without limiting.It (such as can be with for example, it may be carrying out authentication to the senders of cochain transactions requests It is that authentication is carried out to sender using public key, Hash Encryption Algorithm etc.), it is obtained from cochain transactions requests after being proved to be successful Blacklist data to be stored is taken, as in Transaction Information write-in block chain;It is also possible to the cochain affairs that will be received It requests other nodes being sent in block chain network to carry out endorsement operation, the endorsement result of other each nodes is verified, After being proved to be successful, blacklist data to be stored is obtained from cochain transactions requests, and block chain is written as Transaction Information In.
Optionally, during block chain being written in the blacklist data in cochain transactions requests, it can be and first check Whether the blacklist client list in the blacklist data in chain transactions requests is that stored blacklist client is clear in block chain It is single, if so, being written in block chain again after removing stored blacklist client list in the blacklist data, and will When block chain is written in blacklist data, the client node mark for uploading the blacklist data can also be written together, in order to It is used when subsequent tracking blacklist data provider.
It should be noted that after the current block generation node of block chain network handles cochain transactions requests, it can To be other nodes that processing result is sent to block chain network, so that other nodes of block chain network are right according to oneself The processing result of cochain transactions requests is compared with the processing result that current block generates node, if than more consistent, it will Blacklist data in cochain transactions requests is written in respective block chain network as Transaction Information;It is also possible to work as proparea Block generate node cochain transactions requests are handled, and using blacklist data as Transaction Information be written block chain in after, Its Correlation block that blacklist data is written is sent to other nodes of block chain network, so that other each nodes will receive Block be linked in the block chain of itself.Optionally, can be when each node write-in blacklist data in block chain network by Blacklist data is stored with the chain structure of block chain, and each node can pass through application programming interface (Application Programming Interface, API) accesses block chain, carries out the write-in and reading of blacklist data Deng.
Blacklist sharing method provided in this embodiment based on block chain, by receive client node according to The cochain transactions requests that the blacklist data of storage generates make blacklist data after handling the cochain transactions requests It is written in block chain for Transaction Information.It can effectively avoid blacklist data while realizing that blacklist is shared and be usurped Change and reveal, improves the safety of data.
Embodiment two
Fig. 3 is a kind of flow chart of the blacklist sharing method based on block chain provided by Embodiment 2 of the present invention;Fig. 4 Block chain network configuration diagram is shared for blacklist provided by Embodiment 2 of the present invention.The present embodiment is in above-described embodiment On the basis of, carry out further optimization.It shows in particular and the cochain transactions requests is handled, and by the black name Forms data is as the situation introduction in Transaction Information write-in block chain.
As shown in figure 4, the block chain network of the embodiment of the present invention is by A financing corporation 40, B financing corporation 41 and C finance 42 tripartite of company cooperates the block chain network constituted.For each financing corporation, all include corporate business system, Fabric_API interface and client node.Each financing corporation can be based on Fabric_API by corporate business system Interface enters the client node of block chain, and then completes the read-write operation of blacklist data in block chain.Optionally, this hair The block chain network of bright embodiment can be the various logic issued transaction (packet based on Fabric realization, in block chain network Include the cochain issued transaction of blacklist data, blacklist data query processing and logical to the excitation of each client node on chain Update processing of card etc.) it can all be realized by running the code of Fabric.
Referring to Fig. 3, this method is specifically included:
S301, receive include blacklist data cochain transactions requests, cochain transactions requests be client node according to What the blacklist data of storage generated.
Illustratively, if all think will be black in respective company's black list database for A financing corporation 40 and B financing corporation 41 List client list data are uploaded to block chain, then A financing corporation 40 is based on by A financing corporation operation system 401 Fabric_API interface 402 enters company A client node 403, which generates comprising to be stored First cochain transactions requests of blacklist data are sent to block chain network.B financing corporation 41 passes through B corporate business system 411 Enter B corporate client end node 413 based on Fabric_API interface 412, which generates comprising wait deposit Second cochain transactions requests of the blacklist data of storage are sent to block chain network.Block chain network is based in Fabric at this time Order service request to be ranked up to receiving in the first cochain transactions requests and the second affairs, such as can be according to The initiation time of cochain request is ranked up, and is also possible to be ranked up according to the priority of node, to this without limit It is fixed.Company A client node 403, B corporate client end node 413 and 423 base of C corporate client end node in block chain network In common recognition mechanism, determine that current block generates node, it is suitable come the sequence serviced according to order to generate node by current block Sequence successively receives and processes each cochain transactions requests.
Cochain transactions requests are sent to other sections of block chain network according to the endorsement strategy in intelligent contract by S302 Point, so that other nodes feed back endorsement result after carrying out endorsement operation to the blacklist data in cochain transactions requests;Endorsement behaviour The process of work is that other nodes verify blacklist data, on the blacklist in data add check results and itself Node identification, and the process that the blacklist data for being added to check results and node identification is encrypted.
Wherein, the intelligent contract of block chain can be a set of promise defined in digital form, which contains block The rights and duties that the corresponding financing corporation side of each node of chain arranges jointly generate node by the block in block chain to execute. It may include endorsement strategy in intelligent contract in the present embodiment, endorsement strategy, which can be used to refer to lead, executes endorsement operation Node, how decision transaction whether correct condition, for example, when execute endorsement operation node receive cochain transactions requests Blacklist data when, task relevant to verifying system (chaincode) of blacklist data can be called as blacklist A part of data check process determines the validity of the blacklist data.
Illustratively, current block generates node in the cochain thing comprising blacklist data for receiving client upload After business request, the cochain transactions requests comprising blacklist data are sent to area first according to the endorsement strategy in intelligent contract Other nodes on block chain can carry out the endorsement node of endorsement operation, wherein can be by block chain network in block chain In all clients node all as endorsement node, be also possible to using the portions of client end node in block chain network as Endorsement node, in this regard, the embodiment of the present invention is without limiting.Other nodes on block chain are receiving current block generation After the cochain transactions requests comprising blacklist data that node is sent, according to the endorsement plan in the intelligent contract of respective block chain Slightly, endorsement operation is carried out to the blacklist data in cochain transactions requests.
Optionally, specifically endorsement operating process may include: to be called and verified with blacklist data based on endorsement strategy The relevant task program code of system carries out validity check to the blacklist data in cochain transactions requests, if verifying successfully, Then addition verifies the node identification of success message and the node itself in the blacklist data, and will attach and verify successfully The blacklist data of message and own node mark is encrypted, and endorsement result is obtained;If authentication failed, endorsement behaviour is executed The node of work can be the node identification of addition verification failed message and the node itself in blacklist data, and will add Verification failed message and the blacklist data of own node mark are encrypted, and endorsement result is obtained.Optionally, of the invention In embodiment, can be private key using the node to attached the blacklist datas of check results and own node mark into Row encryption, using encrypted data as endorsement result;It is also possible to using (such as Hash encryption calculation of preset Encryption Algorithm Method) blacklist data for having attached check results and own node mark is encrypted, using encrypted data as endorsement As a result;The blacklist data for having attached check results and own node mark can also be encrypted using other modes, it is right This present embodiment is without limiting.
It, will after blacklist data of each node of execution endorsement operation on to chain in request of data carries out endorsement operation Its endorsement result for endorsing operation feeds back to current block and generates node.Optionally, if it is also endorsement that current block, which generates node, Node, then current block, which generates node, has endorsement function cochain transactions requests are sent to other of block chain network Node carry out endorsement operation while, the current block generate node also to the blacklist data in the cochain transactions requests into Row endorsement operation regard the endorsement result that the endorsement result of itself and other nodes return as final endorsement result together.
Illustratively, as shown in figure 4, to handle the first cochain thing that company A client node 403 is sent to block chain For business request, if it is B corporate client end node 413 that current block, which generates node, and endorsement can be executed in block chain network The node of operation includes: company A client node 403, B corporate client end node 413 and C corporate client end node 423, then B Corporate client's end node 413 is sent to company A client according to the endorsement strategy in intelligent contract, by cochain transactions requests Node 403 and C corporate client end node 423;Company A client node 403, B corporate client end node 413 and C corporate client For end node 423 respectively according to the endorsement strategy in intelligent contract, it is accurate to carry out to the blacklist data in cochain transactions requests Property verification, check results and itself node identification are added in blacklist data, and check results and node will be added to The blacklist data of mark is used as endorsement result to feed back to B corporate client end node 413 after being encrypted.
S303 receives the endorsement of other node feeding backs as a result, verifying to endorsement result.
Illustratively, block generates node after receiving the endorsement result of other node feeding backs, carries out to endorsement result When verifying, it can be in verifying endorsement result, each node for executing endorsement operation is added to the check results in blacklist data It whether is to verify success message, and whether the node identification that verifying is added in blacklist data is correct.Optionally, due to Execute endorsement operation node be multiple nodes, then can be when meet in multiple nodes preset ratio (such as 2/3rds with On) node addition check results all be verification success message, and its addition node identification it is all correct, then explanation to back The success of book result verification, that is, illustrate that the blacklist data in cochain transactions requests is effective, can be written into block chain.
Illustratively, as shown in figure 4, B corporate client end node 413 according to the company A client node 403 received, C corporate client end node 423 and the endorsement itself determined are as a result, verify all endorsement results, if three endorsements As a result all proved after the endorsement result verification for having 2/3rds in the blacklist in cochain transactions requests effectively (have three/ Check results are all verification success message to two endorsement result after decryption, and the node identification added is all correct), it is determined that This endorsement result verification is correct, then illustrates that the blacklist data of A financing corporation storage to be uploaded is effective, i.e., to endorsement result It is proved to be successful.
Optionally, what the process verified to endorsement result used when can be and generating according to each node and endorse result Verification operation is decrypted to each endorsement result in Encryption Algorithm, for example, if endorsement is the result is that use the private key of other each nodes What encryption generated, then verifying is decrypted to each endorsement result using the public key of other each nodes;If reaching the back of preset ratio The success of book result decryption verification, then the endorsement result verification success.Specifically, if endorsement is the result is that execute endorsement operation After node is added to the node identification of itself in blacklist data, encryption generation is carried out using the private key of the node, then at this time Endorsement result is decrypted using the public key of the corresponding node of endorsement result, in the blacklist data after checking decryption Whether verification success message is had, and whether the node identification of addition is correct, if so, illustrate endorsement result verification success, Illustrate that the endorsement result verification fails if.Above-mentioned verification operation is carried out to each endorsement result, is finally checked all In result of endorsing, always the endorse ratio of result of the endorsement result Zhan being proved to be successful if reaching preset ratio illustrates that endorsement is tied Fruit is proved to be successful.It should be noted that if endorsement is the result is that other each nodes are using preset Encryption Algorithm, (such as Hash is encrypted Algorithm) generate, then it can be using preset Encryption Algorithm (such as Hash Encryption Algorithm), endorsement result be decrypted and is tested Card, specific verification process is consistent with being verified public key and carrying out the secret process of verifying to endorsement result, to this without going to live in the household of one's in-laws on getting married It states.
S304, if be proved to be successful, using blacklist data as in Transaction Information write-in block chain.
Illustratively, if current block generates node to endorsement result verification success, illustrate in cochain transactions requests Blacklist data it is effective, therefore, can will the blacklist data for including in cochain transactions requests be written block chain in.It is optional , in order to guarantee the validity of blacklist data, can be while block chain is written in blacklist data, it will be black to this Successfully also block is written with the blacklist data in the node identification of each node and verification success message together for list data endorsement In.
Optionally, current block generate node using blacklist data as Transaction Information write-in block chain after, can be to Other nodes transmission in block chain network is proved to be successful message, so that other nodes are by the blacklist in cochain transactions requests Data are written in the block chain of own node.Optionally, in order to guarantee the validity of blacklist data, current block generates section Point is also possible to be written into the block hair of blacklist data and the corresponding node identification of blacklist data and verification success message Each node into block chain network is sent, so that the block received is linked in the block chain of itself by each node.
Optionally, if authentication failed, illustrate that the blacklist data to be uploaded for including in cochain transactions requests is inaccurate Really, i.e., the blacklist data that client node uploads is actually white list data, is client node other public affairs in order to prevent The data taking charge of extension white list client and maliciously uploading.Therefore, in order to guarantee the standard of the blacklist data stored in block chain True property, does not execute the operation for the blacklist data write-in block chain network to be uploaded that will include in cochain transactions requests, and wants To initiate the cochain transactions requests client node punished accordingly, such as can be deduction initiation the cochain affairs ask The client node account asked motivates logical card accordingly;It is also possible to cancel the client node and is sent in block chain network The permission etc. of blacklist data inquiry request in cochain transactions requests and chain.To this embodiment of the present invention without limiting.
S305 updates the logical card of current excitations of client node account according to the incentives strategy in intelligent contract.
Wherein, not only include endorsement strategy in the intelligent contract of block chain, further include incentives strategy.Incentives strategy can be with It is the rule being arranged to motivate each financing corporation for being added to block chain network to store accurate blacklist data into block chain Then, for example, may include: that each financing corporation uploads a blacklist client, how many logical cards of excitation are rewarded;Each finance is public It takes charge of the blacklist client uploaded and is obtained primary, the logical card of how many excitations of reward by other companies;Each financing corporation uses primary The blacklist client that other financing corporations upload deducts logical card of how many excitations etc..It optionally, can for different rewards and punishments scenes Think that certain proportionate relationship is arranged in reward or the number of the logical card of the excitation of deduction, which can be according to the actual situation It is adjusted under the supervision and approval of each financing corporation.The logical card of excitation can be effective for motivating each financing corporation to upload Blacklist data and integral, the bonus etc. being arranged.
Illustratively, since the client node that the embodiment of the present invention is financing corporation uploads storage to block chain network The process of blacklist data, it is possible to which each company according to specified in incentives strategy uploads a blacklist client, reward The logical card of excitation number, to the logical card of excitation for the financing corporation's reward corresponding number for uploading the blacklist data, i.e., at this In the client account of financing corporation, on the basis of original excitation logical card, it is corresponding sharp to increase this upload blacklist data Encourage logical card number.For example, if providing in incentives strategy, company one blacklist client of every upload increases by 0.1 integral, if A is public Integral of 403 account of client node of department before uploading this blacklist data is 10 integrals, this blacklist number uploaded There are 10 blacklist clients in, then can be 1 integral of increase, i.e., the integral of 403 account of company A client node is at this time 11 integrals.
Blacklist sharing method provided in this embodiment based on block chain, current block generate node and are receiving client After cochain transactions requests of the end node according to the blacklist data generation wait store, cochain transactions requests are sent to other sections Point carries out endorsement operation, and endorsement operating result is fed back to current block generation node and verified by other nodes, if currently Block generates node verification success, then is written blacklist data as Transaction Information in block chain, and given based on incentives strategy It gives and uploads the client node account of the blacklist data and motivate logical demonstrate,prove accordingly.Can while realizing that blacklist is shared, Guarantee the validity for the blacklist data being stored in block chain, and client node can be excited to area by incentives strategy Block chain network uploads the enthusiasm of blacklist data, preferably realizes the shared of blacklist data.
Embodiment three
Fig. 5 is a kind of flow chart for blacklist sharing method based on block chain that the embodiment of the present invention three provides.This reality Example is applied on the basis of the various embodiments described above, has carried out further optimization, shows in particular each client in block chain network Node to block chain upload storage blacklist data, and inquiry blacklist data process, that is, realize each client node it Between blacklist data shared procedure.Referring to Fig. 5, this method is specifically included:
S501, receive include blacklist data cochain transactions requests, cochain transactions requests be client node according to What the blacklist data of storage generated.
S502 handles cochain transactions requests, and using blacklist data as in Transaction Information write-in block chain.
S503 updates the logical card of current excitations of client node account according to the incentives strategy in intelligent contract.
S504, blacklist data inquiry request in reception chain, blacklist data inquiry request is client node root on chain It is generated according to query demand.
Illustratively, client node generates blacklist number on this chain according to its query demand for corresponding to financing corporation According to inquiry request, it is sent to block chain network.For example, if the query demand of A financing corporation 40 is 2018 the 3rd in block chain The blacklist data in season, then the client node 403 of company A can be according to the query demand, generate in inquiry block chain Blacklist data inquiry request on the chain of the blacklist data in the third quarter in 2018 is sent to block chain network.Block link network Current block in network generates node and receives blacklist data inquiry request on the chain.
It should be noted that the client node and S501 for generating blacklist data inquiry request on chain in this step The middle client node for generating cochain transactions requests can be the same node, be also possible to different nodes, to this present invention Embodiment is without limiting.
S505, according to the query demand on chain in blacklist data inquiry request, lookup and query demand from block chain Matched blacklist data feeds back to client node as query result.
Illustratively, current block generation node can be according to the query demand on chain in blacklist inquiry request, in area Lookup and the matched blacklist data of the inquiry request in all blacklist datas of block chain storage, and the black name that will be inquired Forms data feeds back to the client node of blacklist data inquiry request in send chain as query result.Optionally, it is holding On the row chain before blacklist data inquiry request, it can be first to the client for sending blacklist data inquiry request on the chain End node carries out authentication, verifies whether it is the node in block network with search access right, if so, inquiring for it Meet the blacklist data of query demand, otherwise, stops this data query operation, feedback query failed message.
Optionally, when to share the client node that includes in block chain network more for blacklist, and some client nodes Between due to not reaching common agreement, so the blacklist data between them cannot be shared, need using isolation strategy Carry out isolation processing.At this point it is possible to be the isolation that client node device in block chain network is carried out in the form of channel, It can be and N in block chain network (N is greater than 1 positive integer) a client node is arranged in a channel, realize N number of Being isolated between client node and remaining client node.For example, as shown in figure 4, the blacklist of the embodiment of the present invention is shared Block chain network may further include D financing corporation, but due to financial D company without and A, B, C financing corporation reach share it is black The common protocol of list data, therefore during block chain network of the building based on Fabric, it is public that A finance can be preset Department 40, B financing corporation 41 and C financing corporation 42 are the same channel, and the shared of blacklist data can be carried out between them. D financing corporation not in same channel is isolated.Optionally, for the blacklist data in same channel, in order to guarantee The safety of the channel data, can blacklist data to same channel according to the preset rivest, shamir, adelman in the channel After (SHA256 algorithm) signs to the blacklist data in the channel, signature is stored in the block head of block, is passed through It signs in block head to carry out inquiring and authenticating to the blacklist data stored in the block, not due to rivest, shamir, adelman Invertibity reduces leakage of data possibility.
Optionally, in the case where carrying out channel separation, according to the inquiry on the chain in blacklist data inquiry request Demand searches with the matched blacklist data of the query demand as query result from block chain, and feeds back to the visitor Family end node, comprising:
A, according to the gap marker on the query strategy and chain of intelligent contract in blacklist data inquiry request, tool is determined There is the node identification collection of gap marker.
It wherein, further include query strategy in the intelligent contract of block chain, query strategy can be to define how to carry out Blacklist data is inquired and pre-set rule in block chain, may include the mark of each client node in block chain network Know, the gap marker in channel where client node.Optionally, node identification and gap marker can be for uniquely indicating The identification information of node and channel, can be the forms such as letter, number or Chinese character indicates.Illustratively, for such as Fig. 4 In block chain network, include: the node identification A and company A client's end segment of company A client node 403 in query strategy The gap marker 1 in 403 place channels of point;The node identification B and B corporate client end node 413 of B corporate client end node 413 The gap marker 1 in place channel;Where the node identification C and C corporate client end node 423 of C corporate client end node 423 The gap marker 1 in channel.Gap marker on chain in blacklist data inquiry request, which can refer to, sends blacklist number on the chain According to the gap marker in channel where the client node of inquiry request, it can be on chain and include in blacklist data inquiry request The gap marker is also possible to determine the client according to the client node for sending blacklist data inquiry request on the chain The mark in channel where node is as the gap marker on chain in blacklist data inquiry request.
Illustratively, current block generates node and is inquired according to blacklist data on the query strategy and chain of intelligent contract Gap marker in request is searched the client node with the gap marker from query strategy, and is obtained with the channel The node identification of the client node of mark obtains the node identification collection with gap marker.As shown in figure 4, if company A Blacklist data inquiry request on the chain that client node 403 is sent, then according to black on the query strategy and chain in intelligent contract The gap marker 1 in the 403 place channel of client node of the company A in list data inquiry request can determine logical with this The node identification collection of road mark includes: the section of node identification A, B corporate client end node 413 of company A client node 403 The node identification C of point identification B and C corporate client end node 423.
B, it according to the query demand on node identification collection and chain in blacklist data inquiry request, is searched from block chain Client node is fed back to as query result with the matched blacklist data of inquiry request.
Illustratively, according to the query demand on node identification collection and chain in blacklist data inquiry request, in block chain First determine the blacklist data that the corresponding client node of node identification collection uploads in storing data, i.e., with it is black in send chain The client node of list data inquiry request belongs to the blacklist data in same channel;Then belonging to same channel again It further searches for feeding back to client's end segment as inquiry request with the matched blacklist data of inquiry request in blacklist data Point.For example, as shown in figure 4, can be according to the query demand on node identification collection and chain in blacklist data inquiry request, The black name uploaded from the client node 403, the client node 413 of B company and the client node 423 of C company of company A The blacklist data that the third quarter in 2018 is searched in forms data feeds back to the client node 403 of company A.
Optionally, in embodiments of the present invention, it when searching blacklist data matched with query demand, can be area Matched in block chain with query demand, and non-inquiry request initiate client node upload blacklist data as finally Query result feeds back to client node.
S506 updates the client node account and upload for initiating inquiry request according to the incentives strategy in intelligent contract The logical card of the current excitations of the client node account of query result.
Optionally, the incentives strategy in intelligent contract may include: that each company uploads a blacklist client, reward X The logical card of excitation;The blacklist client that each company uploads is obtained primary, the logical card of reward Y excitation by other companies;Each company makes The blacklist client uploaded with other primary companies deducts the logical card of Z excitation, effective in order to encourage each client node to upload Blacklist data can preset the proportionate relationship between X, Y, Z, and X:Y:Z=0:1:10 such as can be set, in this way can be with It avoids each client node from uploading white list to earn the case where taking excitation logical card, is encouraging to upload blacklist client node more While data, the validity of the blacklist data of upload ensure that.
Illustratively, according to the incentives strategy in intelligent contract, update the client node account for initiating inquiry request and Upload the client node account of query result the logical card of current excitations may include: according to the incentives strategy in intelligent contract, The current excitations that the client node account of query result will be uploaded, which lead to demonstrate,prove, increases the logical card value of the first excitation, and will be described in initiation The logical card of the current excitations of the client node account of inquiry request reduces second and motivates logical card value;Wherein, first logical card value is motivated Motivating logical card value with second is arranged according to preset ratio.
For example, 10 blacklist clients are B if this is into the query result of the feedback of company A client node 403 What corporate client's end node 413 uploaded, 5 blacklist clients are that C corporate client end node 423 uploads.It then can foundation Incentives strategy in intelligent contract, the logical card of current excitations that will upload 413 account of B corporate client end node of query result increase 10Y is added to motivate logical card value;The logical card of the current excitations for 423 account of C corporate client end node for uploading query result is increased 5Y to swash Logical card value is encouraged, and the logical card of the current excitations that will initiate 403 account of company A client node of inquiry request deducts 15Z excitation and leads to Card value, wherein Y:Z=1:10.
Optionally, the excitation for initiating the client node account of inquiry request in order to prevent leads to card value and is not enough to deduct this Card value is led in excitation needed for secondary blacklist data inquiry, can be in the client node feedback query to initiation inquiry request As a result it before, first determines whether the remaining sum for the client node account for initiating inquiry request is enough to deduct this blacklist data and looks into Card value is led in excitation needed for asking, if can be with, to initiating the client node feedback query of inquiry request as a result, otherwise feeding back The reason of inquiring failed message, may include inquiry failure in the inquiry failed message.
The blacklist sharing method based on block chain of the embodiment of the present invention ensure that each client's end segment in block network Reciprocity mutual trust between point, the multi-party black name but data shared and used.For each client node, upload has Effect list can be used more, and then ensure that the shared side of the blacklist provided in an embodiment of the present invention based on block chain The stability and permanence of case.
It should be noted that the present embodiment S501-S503, sends client node upper comprising blacklist data The process that chain transactions requests are handled, with S504-S506, at the blacklist data inquiry request sent to client The process of reason is two independent processes, without point of sequencing, can be and executes sequence described in the present embodiment, can also To be to first carry out S504-S506, then execute S501-S503.Specific execution sequence depends on current block and generates node reception To the time of cochain transactions requests and blacklist data inquiry request, handled according to the received successive time.
Blacklist sharing method provided in this embodiment based on block chain is receiving client node according to wait store Blacklist data generate cochain transactions requests, after handling the cochain transactions requests, using blacklist data as thing In data of being engaged in write-in block chain, and the client account for rewarding upload blacklist data motivates logical card accordingly.Receiving visitor After the blacklist data inquiry request that family end node is sent, searched and the matched blacklist data of query demand in block chain The client node account for feeding back to user, and rewarding upload query result motivates logical card accordingly, deducts and initiates inquiry request Client node account motivate logical card accordingly.It can be realized blacklist data and carry out data between each client node It is shared, effectively avoid blacklist data from being tampered and reveal, while by setting incentives strategy, each finance can be motivated public Department uploads effective blacklist data by client node, promotes the Jia Ge Ku of blacklist data.
Example IV
Fig. 6 is a kind of structural block diagram for blacklist sharing means based on block chain that the embodiment of the present invention four provides, should The blacklist sharing method provided by any embodiment of the invention based on block chain can be performed in device, has execution method phase The functional module and beneficial effect answered.The device can with in block chain node, for example, can configure current with block chain Block generates in node.As shown in fig. 6, the apparatus may include:
Cochain request receiving module 601, for receiving the cochain transactions requests including blacklist data, the cochain thing Business request is that client node is generated according to blacklist data to be stored;
Cochain request processing module 602, for handling the cochain transactions requests, and by the blacklist number According to as in Transaction Information write-in block chain.
Blacklist sharing means provided in this embodiment based on block chain, by receive client node according to The cochain transactions requests that the blacklist data of storage generates make blacklist data after handling the cochain transactions requests It is written in block chain for Transaction Information.It can effectively avoid blacklist data while realizing that blacklist is shared and be usurped Change and reveal, improves the safety of data.
Further, above-mentioned cochain request processing module 402 includes:
Transmission unit, for according to the endorsement strategy in intelligent contract, the cochain transactions requests to be sent to block chain Other nodes of network, so that other described nodes carry out endorsement operation to the blacklist data in the cochain transactions requests Feedback endorsement result afterwards;The process of the endorsement operation is after other nodes are proved to be successful the blacklist data, described The node identification of itself, and the process that the blacklist data for adding node identification is encrypted are added on blacklist in data;
Authentication unit is received, for receiving the endorsement of other node feeding backs as a result, testing the endorsement result Card;
Writing unit, if block chain is written using the blacklist data as Transaction Information for being proved to be successful In.
Further, above-mentioned reception authentication unit is specifically used for:
If the endorsement is the result is that use the private key encryption of other each nodes to generate, using the public affairs of other each nodes Verifying is decrypted to each endorsement result in key;
If reaching the endorsement result decryption verification success of preset ratio, the endorsement result verification success.
Further, above-mentioned apparatus further include:
Update module is motivated, for updating working as the client node account according to the incentives strategy in intelligent contract The preceding logical card of excitation.
Further, above-mentioned apparatus further include:
Inquiry request receiving module, for blacklist data inquiry request in reception chain, blacklist data is looked on the chain Asking request is what client node was generated according to query demand;
Data query feedback module, for according to the query demand on the chain in blacklist data inquiry request, from area It searches with the matched blacklist data of the query demand in block chain as query result, and feeds back to the client node;
Above-mentioned excitation update module is also used to: according to the incentives strategy in intelligent contract, being updated and is initiated the inquiry request Client node account and upload the query result client node account the logical card of current excitations.
Further, above-mentioned excitation update module is specifically used for:
According to the incentives strategy in intelligent contract, the current of the client node account of the query result will be uploaded and swashed The logical card of current excitations encouraged logical card and increase the logical card value of the first excitation, and the client node account of the inquiry request will be initiated It reduces second and motivates logical card value;Wherein, the logical card value of first excitation and the logical card value of the second excitation are according to preset ratio It is arranged.
Further, above-mentioned data query feedback module is specifically used for:
According to the gap marker on the query strategy of intelligent contract and the chain in blacklist data inquiry request, determine Node identification collection with the gap marker;
According to the query demand on the node identification collection and the chain in blacklist data inquiry request, from block chain Middle lookup feeds back to client node as query result with the matched blacklist data of the inquiry request.
Embodiment five
Fig. 7 is a kind of structural schematic diagram for equipment that the embodiment of the present invention five provides.Fig. 7, which is shown, to be suitable for being used to realizing The block diagram of the example devices 70 of embodiment of the present invention.The equipment 70 that Fig. 7 is shown is only an example, should not be to this hair The function and use scope of bright embodiment bring any restrictions.As shown in fig. 7, the equipment 70 is in the form of universal computing device Performance.The component of the equipment 70 can include but is not limited to: one or more processor or processing unit 701, system is deposited Reservoir 702 connects the bus 703 of different system components (including system storage 702 and processing unit 701).
Bus 703 indicates one of a few class bus structures or a variety of, including memory bus or memory control Device, peripheral bus, graphics acceleration port, processor or total using the local of any bus structures in a variety of bus structures Line.For example, these architectures include but is not limited to industry standard architecture (ISA) bus, microchannel architecture (MAC) bus, enhanced isa bus, Video Electronics Standards Association (VESA) local bus and peripheral component interconnection (PCI) Bus.
Equipment 70 typically comprises a variety of computer system readable media.These media can be it is any can be by equipment The usable medium of 70 access, including volatile and non-volatile media, moveable and immovable medium.
System storage 702 may include the computer system readable media of form of volatile memory, such as deposit at random Access to memory (RAM) 704 and/or cache memory 705.Equipment 70 may further include other removable/not removable Dynamic, volatile/non-volatile computer system storage medium.Only as an example, storage system 706 can be used for reading and writing not Movably, non-volatile magnetic media (Fig. 7 do not show, commonly referred to as " hard disk drive ").It, can be with although being not shown in Fig. 7 The disc driver for reading and writing to removable non-volatile magnetic disk (such as " floppy disk ") is provided, and non-volatile to moving Property CD (such as CD-ROM, DVD-ROM or other optical mediums) read and write CD drive.In these cases, each drive Dynamic device can be connected by one or more data media interfaces with bus 703.System storage 702 may include at least One program product, the program product have one group of (for example, at least one) program module, these program modules are configured to hold The function of row various embodiments of the present invention.
Program/utility 708 with one group of (at least one) program module 707, can store and deposit in such as system In reservoir 702, such program module 707 includes but is not limited to operating system, one or more application program, Qi Tacheng It may include the realization of network environment in sequence module and program data, each of these examples or certain combination.Program Module 707 usually executes function and/or method in embodiment described in the invention.
Equipment 70 can also be logical with one or more external equipments 709 (such as keyboard, sensing equipment, display 710 etc.) Letter can also enable a user to equipment interact with the equipment with one or more and communicate, and/or with enable the equipment 70 Any equipment (such as network interface card, modem etc.) communicated with one or more of the other calculating equipment communicates.It is this Communication can be carried out by input/output (I/O) interface 711.Also, equipment 70 can also pass through network adapter 712 and one A or multiple networks (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.Such as figure Shown in 7, network adapter 712 is communicated by bus 703 with other modules of equipment 70.It should be understood that although not showing in figure Out, other hardware and/or software module can be used with bonding apparatus 70, including but not limited to: microcode, device driver, superfluous Remaining processing unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
The program that processing unit 701 is stored in system storage 702 by operation, thereby executing various function application And data processing, such as realize the blacklist sharing method based on block chain provided by the embodiment of the present invention.
Embodiment six
The embodiment of the present invention six additionally provides a kind of computer readable storage medium, is stored thereon with computer program, should Program can realize the blacklist sharing method described in above-described embodiment based on block chain when being executed by processor.
The computer storage medium of the embodiment of the present invention, can appointing using one or more computer-readable media Meaning combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.Computer can Reading storage medium can for example be but not limited to: electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor system, device or device, Or any above combination.The more specific example (non exhaustive list) of computer readable storage medium includes: with one The electrical connection of a or multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable to deposit Storage media can be any tangible medium for including or store program, which can be commanded execution system, device or device Part use or in connection.
Computer-readable signal media may include in a base band or the data as the propagation of carrier wave a part are believed Number, wherein carrying computer-readable program code.The data-signal of this propagation can take various forms, including but It is not limited to electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be calculating Any computer-readable medium other than machine readable storage medium storing program for executing, the computer-readable medium can send, propagate or transmit For by the use of instruction execution system, device or device or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including but not limited to: Wirelessly, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
The computer for executing operation of the present invention can be write with one or more programming languages or combinations thereof Program code, described program design language include object oriented program language, such as Java, Smalltalk, C++, It further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with Fully execute, partly execute on the user computer on the user computer, being executed as an independent software package, Part executes on the remote computer or executes on a remote computer or server completely on the user computer for part. In situations involving remote computers, remote computer can by the network of any kind, including local area network (LAN) or Wide area network (WAN), is connected to subscriber computer, or, it may be connected to outer computer (such as mentioned using Internet service It is connected for quotient by internet).
Above-described embodiment serial number is for illustration only, does not represent the advantages or disadvantages of the embodiments.
Will be appreciated by those skilled in the art that each module of the above-mentioned embodiment of the present invention or each operation can be used General computing device realizes that they can be concentrated on single computing device, or be distributed in multiple computing device institutes group At network on, optionally, they can be realized with the program code that computer installation can be performed, so as to by they Storage is performed by computing device in the storage device, and perhaps they are fabricated to each integrated circuit modules or generals Multiple modules or operation in them are fabricated to single integrated circuit module to realize.In this way, the present invention is not limited to any spies The combination of fixed hardware and software.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are With the difference of other embodiments, the same or similar part between each embodiment be may refer to each other.
The above description is only a preferred embodiment of the present invention, is not intended to restrict the invention, for those skilled in the art For, the invention can have various changes and changes.All any modifications made within the spirit and principles of the present invention, etc. With replacement, improvement etc., should all be included in the protection scope of the present invention.

Claims (10)

1. a kind of blacklist sharing method based on block chain, which is characterized in that executed by block chain node, comprising:
The cochain transactions requests including blacklist data are received, the cochain transactions requests are client nodes according to wait store What blacklist data generated;
The cochain transactions requests are handled, and using the blacklist data as in Transaction Information write-in block chain.
2. the method according to claim 1, wherein handling the cochain transactions requests, and will be described Blacklist data is as in Transaction Information write-in block chain, comprising:
According to the endorsement strategy in intelligent contract, the cochain transactions requests are sent to other nodes of block chain network, with Endorsement result is fed back after so that other described nodes is carried out endorsement operation to the blacklist data in the cochain transactions requests;It is described The process of endorsement operation is that other nodes verify the blacklist data, adds verification in data on the blacklist As a result with the node identification of itself, and the process that the blacklist data for being added to check results and node identification is encrypted;
The endorsement of other node feeding backs is received as a result, verifying to the endorsement result;
If be proved to be successful, using the blacklist data as in Transaction Information write-in block chain.
3. according to the method described in claim 2, it is characterized in that, being verified to the endorsement result, comprising:
If the endorsement is the result is that use the private key encryption of other each nodes to generate, using the public key of other each nodes to each Verifying is decrypted in endorsement result;
If reaching the endorsement result decryption verification success of preset ratio, the endorsement result verification success.
4. the method according to claim 1, wherein block is written using the blacklist data as Transaction Information After in chain, further includes:
According to the incentives strategy in intelligent contract, the logical card of current excitations of the client node account is updated.
5. the method according to claim 1, wherein block is written using the blacklist data as Transaction Information After in chain, further includes:
Blacklist data inquiry request in reception chain, blacklist data inquiry request is client node according to inquiry on the chain What demand generated;
According to the query demand on the chain in blacklist data inquiry request, searched and the query demand from block chain The blacklist data matched feeds back to the client node as query result;
According to the incentives strategy in intelligent contract, updates and looked into described in the client node account for initiating the inquiry request and upload Ask the logical card of current excitations of the client node account of result.
6. according to the method described in claim 5, it is characterized in that, updating according to the incentives strategy in intelligent contract and initiating institute It states the client node account of inquiry request and uploads the logical card of current excitations of the client node account of the query result, packet It includes:
According to the incentives strategy in intelligent contract, the logical card of current excitations of the client node account of the query result will be uploaded Increase by first and motivate logical card value, and the logical card of the current excitations that will initiate the client node account of the inquiry request reduces second Motivate logical card value;Wherein, the logical card value of first excitation and the logical card value of the second excitation are arranged according to preset ratio.
7. according to the method described in claim 5, it is characterized in that, according to looking into blacklist data inquiry request on the chain Inquiry demand is searched with the matched blacklist data of the query demand from block chain as query result, and is fed back to described Client node, comprising:
According to the gap marker on the query strategy of intelligent contract and the chain in blacklist data inquiry request, determining has institute State the node identification collection of gap marker;
According to the query demand on the node identification collection and the chain in blacklist data inquiry request, searched from block chain Client node is fed back to as query result with the matched blacklist data of the inquiry request.
8. a kind of blacklist sharing means based on block chain, which is characterized in that be configured in block chain node, comprising:
Cochain request receiving module, for receiving the cochain transactions requests including blacklist data, the cochain transactions requests are Client node is generated according to blacklist data to be stored;
Cochain request processing module, for handling the cochain transactions requests, and using the blacklist data as thing In data of being engaged in write-in block chain.
9. a kind of equipment characterized by comprising
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real The now blacklist sharing method based on block chain as described in any in claim 1-7.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The blacklist sharing method based on block chain as described in any in claim 1-7 is realized when execution.
CN201811517777.XA 2018-12-12 2018-12-12 Blacklist sharing method, device, equipment and storage medium based on block chain Pending CN109669986A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811517777.XA CN109669986A (en) 2018-12-12 2018-12-12 Blacklist sharing method, device, equipment and storage medium based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811517777.XA CN109669986A (en) 2018-12-12 2018-12-12 Blacklist sharing method, device, equipment and storage medium based on block chain

Publications (1)

Publication Number Publication Date
CN109669986A true CN109669986A (en) 2019-04-23

Family

ID=66143871

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811517777.XA Pending CN109669986A (en) 2018-12-12 2018-12-12 Blacklist sharing method, device, equipment and storage medium based on block chain

Country Status (1)

Country Link
CN (1) CN109669986A (en)

Cited By (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232283A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
CN110489393A (en) * 2019-07-08 2019-11-22 深圳壹账通智能科技有限公司 Promise breaking information query method, device, computer equipment and storage medium
CN110516173A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of illegal website recognition methods, device, equipment and medium
CN110533286A (en) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 Allied member's management method, device and computer equipment based on block chain
CN110879826A (en) * 2019-10-12 2020-03-13 深圳壹账通智能科技有限公司 Credit blacklist sharing method and device based on block chain
CN111078745A (en) * 2019-12-20 2020-04-28 京东数字科技控股有限公司 Data uplink method and device based on block chain technology
CN111259448A (en) * 2020-01-17 2020-06-09 中国建设银行股份有限公司 Data sharing method and device
CN111294205A (en) * 2020-02-24 2020-06-16 联想(北京)有限公司 Key management method and device, computer system and readable storage medium
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
CN111694899A (en) * 2020-06-12 2020-09-22 中国银行股份有限公司 Blacklist sharing method and system based on block chain
CN112035886A (en) * 2020-08-31 2020-12-04 深圳前海微众银行股份有限公司 Block chain consensus method, device, consensus node, system and storage medium
CN112182107A (en) * 2020-09-29 2021-01-05 中国平安财产保险股份有限公司 Method and device for acquiring list data, computer equipment and storage medium
CN112446702A (en) * 2020-11-17 2021-03-05 深圳市元征科技股份有限公司 Data verification method and device and node equipment
CN112883115A (en) * 2021-02-24 2021-06-01 中国工商银行股份有限公司 Information processing method and device based on block chain
CN113694539A (en) * 2021-09-22 2021-11-26 网易(杭州)网络有限公司 Resource management method and device, storage medium and electronic equipment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243215A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for external secure access to process data network
CN107273455A (en) * 2017-05-31 2017-10-20 深圳前海微众银行股份有限公司 Block chain data access method and device
CN107392813A (en) * 2017-09-12 2017-11-24 杭州趣链科技有限公司 A kind of student status information sharing system based on block chain
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
CN108122159A (en) * 2017-12-22 2018-06-05 中链科技有限公司 A kind of factoring information processing method and system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170243215A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for external secure access to process data network
CN107273455A (en) * 2017-05-31 2017-10-20 深圳前海微众银行股份有限公司 Block chain data access method and device
CN107392813A (en) * 2017-09-12 2017-11-24 杭州趣链科技有限公司 A kind of student status information sharing system based on block chain
CN107862215A (en) * 2017-09-29 2018-03-30 阿里巴巴集团控股有限公司 A kind of date storage method, data query method and device
CN108122159A (en) * 2017-12-22 2018-06-05 中链科技有限公司 A kind of factoring information processing method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
姚前,陈华: "《数字货币经济分析》", 31 October 2018 *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110232283A (en) * 2019-05-21 2019-09-13 深圳壹账通智能科技有限公司 The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography
CN110365670A (en) * 2019-07-08 2019-10-22 深圳壹账通智能科技有限公司 Blacklist sharing method, device, computer equipment and storage medium
CN110489393A (en) * 2019-07-08 2019-11-22 深圳壹账通智能科技有限公司 Promise breaking information query method, device, computer equipment and storage medium
WO2021003977A1 (en) * 2019-07-08 2021-01-14 深圳壹账通智能科技有限公司 Default information query method and apparatus, and computer device and storage medium
CN110365670B (en) * 2019-07-08 2022-07-08 深圳壹账通智能科技有限公司 Blacklist sharing method and device, computer equipment and storage medium
WO2021003980A1 (en) * 2019-07-08 2021-01-14 深圳壹账通智能科技有限公司 Blacklist sharing method and apparatus, computer device and storage medium
CN110533286A (en) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 Allied member's management method, device and computer equipment based on block chain
WO2021012877A1 (en) * 2019-07-23 2021-01-28 平安科技(深圳)有限公司 Blockchain-based alliance member management method and apparatus, and computer device
CN110533286B (en) * 2019-07-23 2023-04-18 平安科技(深圳)有限公司 Block chain-based coalition member management method and device and computer equipment
CN110516173A (en) * 2019-08-28 2019-11-29 腾讯科技(深圳)有限公司 A kind of illegal website recognition methods, device, equipment and medium
CN110879826A (en) * 2019-10-12 2020-03-13 深圳壹账通智能科技有限公司 Credit blacklist sharing method and device based on block chain
CN111078745A (en) * 2019-12-20 2020-04-28 京东数字科技控股有限公司 Data uplink method and device based on block chain technology
CN111259448A (en) * 2020-01-17 2020-06-09 中国建设银行股份有限公司 Data sharing method and device
CN111294205A (en) * 2020-02-24 2020-06-16 联想(北京)有限公司 Key management method and device, computer system and readable storage medium
CN111339206A (en) * 2020-03-11 2020-06-26 中国建设银行股份有限公司 Data sharing method and device based on block chain
CN111339206B (en) * 2020-03-11 2023-07-18 建信金融科技有限责任公司 Block chain-based data sharing method and device
CN111694899A (en) * 2020-06-12 2020-09-22 中国银行股份有限公司 Blacklist sharing method and system based on block chain
CN112035886A (en) * 2020-08-31 2020-12-04 深圳前海微众银行股份有限公司 Block chain consensus method, device, consensus node, system and storage medium
CN112035886B (en) * 2020-08-31 2023-01-10 深圳前海微众银行股份有限公司 Block chain consensus method, device, consensus node, system and storage medium
CN112182107A (en) * 2020-09-29 2021-01-05 中国平安财产保险股份有限公司 Method and device for acquiring list data, computer equipment and storage medium
CN112182107B (en) * 2020-09-29 2023-11-03 中国平安财产保险股份有限公司 List data acquisition method, device, computer equipment and storage medium
CN112446702A (en) * 2020-11-17 2021-03-05 深圳市元征科技股份有限公司 Data verification method and device and node equipment
CN112883115A (en) * 2021-02-24 2021-06-01 中国工商银行股份有限公司 Information processing method and device based on block chain
CN113694539A (en) * 2021-09-22 2021-11-26 网易(杭州)网络有限公司 Resource management method and device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
CN109669986A (en) Blacklist sharing method, device, equipment and storage medium based on block chain
US10677607B2 (en) Blockchain-based crowdsourcing of map applications
CN110457942B (en) Signature verification method for uplink data block, service node and medium
CN110851496B (en) Method, apparatus, accounting node and medium for querying transaction information in blockchain network
US11669832B2 (en) Blockchain-implemented method and system for access control on remote internet-enabled resources
CN109034800A (en) A kind of privacy method of commerce, system and equipment
US20210304201A1 (en) Transaction verification method and apparatus, storage medium, and electronic device
CA3191453A1 (en) Transferring cryptocurrency from a remote limited access wallet
US20240289774A1 (en) Method for processing cargo allocation information, electronic device, and non-transitory computer-readable storage medium
AU2019380381A1 (en) Smart logistics management using blockchain
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
CN114567643B (en) Cross-blockchain data transfer method, device and related equipment
CN109447636A (en) A kind of assets transfer method and device
CN104301293A (en) Data processing method, device and system
CN110149379A (en) A kind of more former chain handling capacity extended methods based on layer logic
CN114066277B (en) Service decision method, decision platform, readable medium and electronic equipment
CN113328854B (en) Service processing method and system based on block chain
CN115705601A (en) Data processing method and device, computer equipment and storage medium
Liang et al. Decentralized crowdsourcing for human intelligence tasks with efficient on-chain cost
CN111915302B (en) Associated data processing method and device, electronic equipment and computer readable medium
CN114860402B (en) Scheduling strategy model training method, scheduling device, scheduling equipment and scheduling medium
CN115526629A (en) Receipt transaction method and device based on block chain network and identity authentication device
WO2021121030A1 (en) Resource transfer method, settlement terminal, and server node
CN116894727A (en) Data processing method and device based on block chain and related equipment
KR20220076486A (en) Call-back mechanisms for blockchain transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190423