CN110245185A - Data processing method, terminal device and computer storage medium based on alliance's chain - Google Patents
Data processing method, terminal device and computer storage medium based on alliance's chain Download PDFInfo
- Publication number
- CN110245185A CN110245185A CN201910423015.1A CN201910423015A CN110245185A CN 110245185 A CN110245185 A CN 110245185A CN 201910423015 A CN201910423015 A CN 201910423015A CN 110245185 A CN110245185 A CN 110245185A
- Authority
- CN
- China
- Prior art keywords
- data
- node
- chain
- mentioned
- alliance
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
Abstract
The embodiment of the present application discloses a kind of data processing method based on alliance's chain, terminal device and computer storage medium, it is related to block storage system and block data structures technology, wherein method includes: that first node obtains first information abstract, and first information abstract includes Data Identification and data origin information;The data source node that the corresponding target data of Data Identification is determined according to data origin information, the data source node into the main chain of alliance's chain send data acquisition request;Receive the target data from the data source node, the process instruction comprising target data is sent to the side chain node of alliance's chain, the process instruction is used to indicate the side chain node and handles the target data according to the data processing rule disposed on side chain to obtain processing result;The processing result from side chain node is received, alliance's chain main chain and side chain can be combined, increases data acquisition source, promotes the efficiency of data processing.
Description
Technical field
This application involves alliance's chain technical fields more particularly to a kind of data processing method based on alliance's chain, terminal to set
Standby and computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning
For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out
Activity, it provides the shared platform of credit information for specialized credit mechanism.
Current, credit investigation system centralization generally obtains reference report by people's row reference or main strategies mechanism,
Data source is more single, and procurement cost is high.The credit investigation system data sharing realized by block chain, exists with more and more
Node and operation flow be added, the increasingly huger problem of data volume, cause in block chain retrieve, know together processing efficiency drop
Low, system is too fat to move.
Summary of the invention
The embodiment of the present application provides a kind of data processing method based on alliance's chain, terminal device and computer storage and is situated between
Matter is related to block storage system and block data structures technology, alliance's chain main chain and side chain can be combined, and increases data and obtains
Source is fetched, the efficiency of whole system processing information is promoted.
In a first aspect, the embodiment of the present application provides a kind of data processing method based on alliance's chain, which comprises
First node obtains first information abstract, and the first information abstract includes Data Identification and data origin information;
The data source node of the corresponding target data of the Data Identification, Xiang Lian are determined according to the data origin information
The data source node in the main chain of alliance's chain sends data acquisition request, and the data acquisition request carries the data mark
Know;
The target data from the data source node is received, the side chain node of Xiang Suoshu alliance chain is sent comprising described
The process instruction of target data, the process instruction are used to indicate the side chain node and are advised according to the data processing disposed on side chain
Handle the target data then to obtain processing result;
Receive the processing result from the side chain node.
As a kind of possible embodiment, the first node, which obtains the first information and makes a summary, includes:
The first node obtains user's mark in response to the acquisition instruction comprising user identifier from local data base
Know corresponding first information abstract.
As a kind of possible embodiment, before the first node obtains first information abstract, the method is also wrapped
It includes:
The first node sends authorization requests to user terminal, and the authorization requests carry the Data Identification;
The first node obtains first information abstract
The first node receive from the user terminal when being instructed to the confirmations of the authorization requests, from institute
It states and obtains the first information abstract in the main chain of alliance's chain.
As a kind of possible embodiment, described send to the side chain node of alliance's chain includes the target data
Process instruction include:
Data analysis node into the side chain sends the data analysis request comprising the target data, the data
Analysis request is used to indicate the data analysis node and analyzes the target data;
The processing result of the reception from the side chain node include:
It receives from the data analysis node to the analysis result of the target data.
As a kind of possible embodiment, the reception divides the target data from the data analysis node
After analysing result, the method also includes:
The second informative abstract is generated according to the analysis result of the target data, second informative abstract includes described the
The Data Identification of the analysis result of one node address and the target data;
Second informative abstract is sent to the main chain node of alliance's chain.
As a kind of possible embodiment, the data source node into the main chain of alliance's chain sends data
Before acquisition request, the method also includes:
The node type for obtaining the data source node obtains the corresponding mesh of node type of the data source node
Mark data acquisition rule;
Rule is obtained according to the target data and generates Target Acquisition request, and the Target Acquisition request includes the target
Information to be verified as defined in data acquisition rule, the information to be verified is for the data source node to the first node
It is verified;
The data source node into the main chain of alliance's chain sends data acquisition request
The Target Acquisition request is sent to the data source node.
As a kind of possible embodiment, after the target data of the reception from the data source node, institute
State method further include:
The received target data and data with existing are integrated, target data modification information is generated, described
The target data modification information is broadcasted in alliance's chain, the target data modification information includes the first node address.
Second aspect, the embodiment of the present application provide a kind of terminal device, comprising: obtain module, determining module and transmission
Module, in which:
The acquisition module obtains first information abstract for first node, and the first information abstract includes data mark
Knowledge and data origin information;
The determining module, for determining the corresponding target data of the Data Identification according to the data origin information
Data source node;The transmission module sends data acquisition for the data source node into the main chain of alliance's chain
Request, the data acquisition request carry the Data Identification;
The transmission module is also used to, and receives the target data from the data source node, Xiang Suoshu alliance chain
Side chain node sends the process instruction comprising the target data, and the process instruction is used to indicate the side chain node according to side
The data processing rule disposed on chain handles the target data to obtain processing result;
The transmission module is also used to, and receives the processing result from the side chain node.
The third aspect, the embodiment of the present application also provides a kind of terminal device, including processor, input equipment, output are set
Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for depositing
Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction,
Execute the method as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage
There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor
The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application obtains first information abstract by first node, and wherein first information abstract includes Data Identification
And data origin information, the data source section of the corresponding target data of the Data Identification is determined further according to above-mentioned data origin information
Point, and then the data source node into the main chain of alliance's chain sends data acquisition request, wherein data acquisition request carries number
According to mark, the target data from the data source node can receive later, and can send out to the side chain node of alliance's chain
The process instruction comprising above-mentioned target data is sent, which is used to indicate the side chain node according to the data disposed on side chain
The above-mentioned target data of rule process is handled to obtain processing result, it can the processing result from above-mentioned side chain node is received,
Alliance's chain main chain and side chain can be combined, data acquisition source is increased by main chain, while realizing data sharing, by
It is arranged in reasonable side chain and carries out data processing, lightweight main chain improves the efficiency of data processing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data processing method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data processing method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of terminal device provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another terminal device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein
" embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments
In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor
With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand,
Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work
The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application
It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server
Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be
Desktop computer or mobile terminal, mobile terminal may include the various handheld devices with wireless communication function, wearable set
It is standby, calculate equipment or be connected to radio modem other processing equipments and various forms of user equipment (User
Equipment, UE), mobile station (Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data processing method based on alliance's chain provided by the embodiments of the present application
Figure, this method as shown in Figure 1 can include:
101, first node obtains first information abstract, and above-mentioned first information abstract includes that Data Identification and data source are believed
Breath.
Executing subject in the embodiment of the present application is first node, can be the node on the main chain in alliance's chain, referred to as
Main chain node, the main chain node on alliance's chain can carry out data sharing based on the intelligent contract on alliance's chain.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes
For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block
Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, for collage-credit data shared system,
Node type in alliance's chain may include enterprise's node, credit information service's node and government organs' node.The main chain of alliance's chain
On can also have main chain server, it is understood that be data sharing platform, auxiliary realize node data sharing.
It can be deployed with intelligent contract (Smart contract) on alliance's chain mentioned above, be that one kind is intended to informationization
The computer protocol of contract is propagated, verifies or executed to mode.Intelligent contract permission carries out credible in no third-party situation
Transaction, these transaction are traceable.Each main chain node in above-mentioned alliance's chain can have the database of oneself, data sharing chain link
Point and corresponding side chain node.
Above-mentioned data sharing chain node can be understood as above-mentioned privately owned chain node, the i.e. node in a data sharing chain
It can be used as one small cluster and carry out data sharing, increase independence and safety.
Specifically, can store multiple user basic informations in the local data base of the first node, including the user's
Station address, the station address then can be used for inquiring the corresponding Profile Summary of above-mentioned Data Identification, i.e., above-mentioned first letter
Breath abstract.Above-mentioned first node can obtain above-mentioned use in response to the acquisition instruction comprising user identifier from local data base
Family identifies corresponding first information abstract, wherein above-mentioned acquisition instruction can be triggered by user, it can also be automatic in predetermined time
It initiates.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data
The catalogue of acquisition modes.
Above-mentioned first information abstract may include the Data Identification and data origin information of target data to be obtained, above-mentioned
Data Identification can be data number or title, and for determining the target data, above-mentioned data origin information may include the target
The provider of data, that is, data source node is specifically as follows the data source node identification or data source of the target data
Node address.Wherein, above-mentioned data source node can be other nodes in addition to the first node in alliance's chain main chain.
In a kind of optional embodiment, above-mentioned first information abstract can be generated by above-mentioned data source node, and
And can be broadcasted in alliance's chain main chain, the main chain node in alliance's chain is available and stores the above-mentioned first information and plucks
It wants, i.e., first node is available makes a summary to the above-mentioned first information and store in the local database, also can specify that by above-mentioned
Informative abstract in first node (management node special as one) Lai Guanli alliance chain main chain.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination
The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting,
Until each recipient receives a copy.By way of broadcast, the main chain node in alliance's chain is enable to obtain
Obtain the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other authentications
Formula could obtain after being verified, to improve safety.
It is not data each time to be changed to direct broadcast encryption, but generate one and be similar in the embodiment of the present application
The encryption string of informative abstract is broadcasted, data can be made even be decrypted (this is also almost impossible certainly) will not reveal it is any
Private data.
After obtaining above-mentioned first information abstract, step 102 can be executed.
102, the data source node of the corresponding target data of above-mentioned Data Identification is determined according to above-mentioned data origin information,
Above-mentioned data source node into the main chain of alliance's chain sends data acquisition request, and above-mentioned data acquisition request carries above-mentioned number
According to mark.
Specifically, due to include in above-mentioned data origin information target data to be obtained data source node, i.e., the
One node can determine that the data source node is the provider of the corresponding target data of the Data Identification, the available data
Source Nodes address, and then send data acquisition request to the data source node and carry out data acquisition, wherein above-mentioned data obtain
Take request that can also carry above-mentioned Data Identification, above-mentioned Data Identification determines shared number of targets for the data source node
According to.
Above-mentioned data source node, can be according to above-mentioned number after the data acquisition request for receiving above-mentioned first node
Above-mentioned target data is determined according to mark, then sends above-mentioned target data to first node, can transmit compressed target data,
Above-mentioned target data can also be shared from other forms to first node, and then step 103 can be executed.
It optionally, can sentencing based on itself after above-mentioned data source node receives above-mentioned data acquisition request
Disconnected rule determines whether to provide target data.The judgment rule of above-mentioned data source node can be to be realized based on intelligent contract,
It is also possible to determine in data source node by user's operation manual end equipment.It is provided in the confirmation of data source node above-mentioned
After target data, above-mentioned target data can be sent to the first node.
Specifically, the node type of first node can be credit information service's node or enterprise's node, wherein enterprise's node
It can be the terminal device of securities broker company, payment platform, insurance company, business bank etc.;In the sign comprising above-mentioned first node
Believe in system data acquisition process, target data to be obtained can be collage-credit data, be specifically as follows personal essential information number
According to or transaction with credit data.
The reference report of credit investigation system can be made of three category informations at present, comprising:
(1) personal essential information, including name, type of credential and number, address, contact method, marital status, residence
Firmly information, occupational information etc.;
(2) transaction with credit information, including credit card information, credit information, other credit informations etc.;
(3) other information, such as personal common reserve fund, old-age pension information.
The shared of above-mentioned collage-credit data can be carried out between the main chain node of alliance's chain, which can permit adding for node
Enter and exit, wherein node type may include: that enterprise's node (protect by such as internet financing corporation, business bank, payment platform
Institute etc. is handed in dangerous company, securities broker company, room), credit information service's node (such as people's row reference, main strategies mechanism) and government organs save
Point etc..
103, the target data from above-mentioned data source node is received, the side chain node transmission of Xiang Shangshu alliance chain includes
The process instruction of above-mentioned target data, above-mentioned process instruction be used to indicate above-mentioned side chain node according to the data disposed on side chain at
The above-mentioned target data of rule process is managed to obtain processing result.
First node can be stored in the local data base of first node after receiving above-mentioned target data, can also be with
It is stored again after being integrated to target data, voluntarily can obtain and check later.The different nodes according to belonging to first node
Type, the data of database may include the different types of data such as registration information, transaction record, assets information.
In a kind of optional embodiment, first node can be carried out above-mentioned received target data and data with existing
Integration, generate target data modification information, and can in above-mentioned alliance's chain broadcast them target data modification information, it is above-mentioned
Target data modification information includes above-mentioned first node address.By above-mentioned target data modification information, main chain node can be obtained
The first node address, and to described in first node request integrate after target data.
Specifically, the data processing carried out to the target data of above-mentioned acquisition can be based on the side chain node of the first node
It realizes, side chain node can have preset data processing rule.First node can have oneself privately owned chain and the alliance
Side chain in chain, node in the side chain are the side chain node of the first node, first node and side with respect to the first node
The interaction of chain node can be realized independently, not disclose other main chain nodes.
First node can send the process instruction comprising above-mentioned target data with above-mentioned side chain node, and above-mentioned side chain node exists
When receiving the process instruction comprising above-mentioned target data, it can be disposed in response to above-mentioned process instruction according on above-mentioned side chain
Data processing rule handle above-mentioned target data, so that obtaining later can be to first to the processing result of the target data
Node sends the processing result, executes step 104.
Above-mentioned data processing may include the operations such as data cleansing, data desensitization process, data conversion, data analysis.
In a kind of optional embodiment, first node can be existing to above-mentioned received target data and first node
Historical data integrated, information update, the target data modification information can be generated, the broadcast them target in alliance's chain
Data modification information, above-mentioned target data modification information may include the first node address, it can increase the number of targets
According to source-information, other nodes can receive above-mentioned first node address and then to first node application obtain the number of targets
According to increasing data acquisition channel.
104, the above-mentioned processing result from above-mentioned side chain node is received.
First node can store it in local data base after receiving above-mentioned processing result, can will be whole
Above-mentioned target data and above-mentioned processing result after conjunction store together.
In a kind of optional embodiment, step 103 may include: that the data analysis node into above-mentioned side chain is sent
Data analysis request comprising above-mentioned target data, above-mentioned data analysis request are used to indicate above-mentioned data analysis node to above-mentioned
Target data is analyzed;Then step 104 may include: and receive to divide above-mentioned target data from above-mentioned data analysis node
Analyse result.
It, can to above-mentioned received target data and after above-mentioned steps 104 in a kind of optional embodiment
There are data to be integrated, generation target data modification information, the broadcast them target data modification information in above-mentioned alliance's chain, on
Stating target data modification information includes above-mentioned first node address.
In the embodiment of the present application, first information abstract can be obtained by first node, wherein first information abstract includes
Data Identification and data origin information determine the number of the corresponding target data of the Data Identification further according to above-mentioned data origin information
Data source node according to source Nodes, and then into the main chain of alliance's chain sends data acquisition request, and wherein data acquisition is asked
Seek carrying Data Identification;It can receive the target data from the data source node later, and can be to the side of alliance's chain
Chain node sends the process instruction comprising above-mentioned target data, which is used to indicate the side chain node according to side chain top
The data processing rule of administration handles above-mentioned target data to obtain processing result;The place from above-mentioned side chain node can be received
Reason increases data acquisition source as a result, alliance's chain main chain and side chain can be combined by way of main chain and informative abstract,
While convenient realization data sharing, data processing is carried out since reasonable side chain is arranged, improves the efficiency of data processing.
It referring to fig. 2, is the exemplary flow of another data processing method based on alliance's chain provided by the embodiments of the present application
Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap
It includes:
201, first node sends authorization requests to user terminal, and above-mentioned authorization requests carry above-mentioned Data Identification.
Node in alliance's chain can upload data and be shared, and obtain these shared datas.Obtaining shared number
It according to before, can first be authorized, the node after being authorized could obtain shared data.Specifically, above-mentioned first node
Authorization requests can be sent to user terminal, wherein above-mentioned user terminal refers to that user makes when needing to obtain target data
Terminal device can store multiple user basic informations in first node, wherein may include user identifier (such as user
Account), first node can send above-mentioned authorization requests to the terminal device for logging in above-mentioned user account, request user to this
Data acquisition is authorized.User can receive above-mentioned authorization requests by the terminal device at this time, judge whether to give this
The data acquisition permission of one node.
Optionally, first node can send above-mentioned authorization requests to user terminal, i.e., apply for that collage-credit data is looked into user
Authorization is ask, initiation can be operated by the staff of the first node, after user agrees to and authorizes, passes through user's end
End can send confirmation instruction to the first node.
Optionally, above-mentioned first node, can be according to default when reaching the first moment in preset authorization request time
The corresponding relationship of authorization requests time and authorized user's mark determine corresponding authorized user's mark of above-mentioned first moment, upwards
It states authorized user and identifies corresponding user terminal and send the above-mentioned authorization requests to target user.It can store in first node
As the user information of authorized party, it can realize that intelligent contract can specify that the section in alliance's chain by above-mentioned intelligent contract
Point trading rules, can be first to user's end in the case where needing first node to carry out data acquisition based on above-mentioned intelligent contract
End sends above-mentioned authorization requests, i.e., above-mentioned authorization requests can be understood as the regulation based on intelligent contract and be sent out on time by first node
It rises.
Wherein, above-mentioned authorization requests can carry above-mentioned Data Identification, and above-mentioned Data Identification is determined for be obtained
Target data, for example can be data number, data name etc., can also be the data date of formation, that is, indicate to need to obtain
Target data be the data generated within the data date of formation.
Part of nodes in the intelligent contract and alliance's chain of alliance's chain can be stored with Data Identification and target data
Corresponding relationship.Above-mentioned authorization requests are mainly used for user and know the data information that the node identities of request authorization and needs obtain
Deng the authorization requests can also carry the identity information of above-mentioned first node, first node identity be known convenient for authorized party, to sentence
It is disconnected whether to give first node authorization.
User terminal can be chosen whether authorization first node after receiving above-mentioned authorization requests by authorized party user
This data acquisition, however, it is determined that authorization, can to above-mentioned first node send confirmation instruction, then can execute step 102;If
It does not authorize, refusal instruction can be sent to above-mentioned first node, then first node not can be carried out data acquisition.
202, receive from above-mentioned user terminal when being instructed to the confirmations of above-mentioned authorization requests, from above-mentioned alliance's chain
Main chain in obtain above-mentioned first information abstract.
It can store above-mentioned first information abstract in alliance's chain main chain, specifically can store in main chain node or work
For in the main chain server of data sharing platform.Above-mentioned authorization is asked from above-mentioned user terminal if above-mentioned first node is received
The confirmation instruction asked, represents the data acquisition that the first node is agreed to as the user of authorized party, then first node can be with information
It is instructed in response to above-mentioned confirmation, the corresponding first information abstract of above-mentioned Data Identification, Zhi Houke is obtained in the main chain of alliance's chain
To execute step 203.
203, the data source node of the corresponding target data of above-mentioned Data Identification is determined according to above-mentioned data origin information,
Above-mentioned data source node into the main chain of alliance's chain sends data acquisition request, and above-mentioned data acquisition request carries above-mentioned number
According to mark.
Optionally, before above-mentioned steps 203, this method further include:
The node type for obtaining above-mentioned data source node obtains the corresponding mesh of node type of above-mentioned data source node
Mark data acquisition rule;
Rule is obtained according to above-mentioned target data and generates Target Acquisition request, and above-mentioned Target Acquisition request includes above-mentioned target
Information to be verified as defined in data acquisition rule, above-mentioned information to be verified is for above-mentioned data source node to above-mentioned first node
It is verified;
The above-mentioned above-mentioned data source node into the main chain of alliance's chain sends data acquisition request
Above-mentioned Target Acquisition request is sent to above-mentioned data source node.
It can store above-mentioned data acquisition rule and node type in above-mentioned first node and closed with the corresponding of rule is obtained
System, after the node type for getting above-mentioned data source node, can determine in the data acquisition rule of above-mentioned storage
And it obtains the corresponding target data of the node type and obtains rule.Such as the target data obtain rule specifically can specify that it is above-mentioned
The data acquisition of destination node needs which condition, mainly the first node identity of verifying initiation data acquisition request.
The requirement that above-mentioned first node can obtain rule according to above-mentioned target data, which generates above-mentioned Target Acquisition, requests, then
Above-mentioned target data acquisition request is sent to above-mentioned data source node, to provide the proof of identification needed, is come convenient for the data
Source node is judged, it is determined whether shared data, if the confirmation of above-mentioned data source node can after sharing above-mentioned target data
To send above-mentioned target data to first node, then execute step 204.
In a kind of optional embodiment, the target data that first node can obtain above-mentioned determination obtains testing in rule
Label is demonstrate,proved, obtains the corresponding target identity information of above-mentioned verifying label, it includes above-mentioned target that Xiang Shangshu data source node, which is sent,
The data acquisition request of identity information.
Specifically, above-mentioned target data, which obtains in rule, may include verifying label, i.e., these verifying labels can indicate
Some Verification Projects when the authentication of the data source node requirements, then first node can be true by above-mentioned verifying label
Fixed corresponding Verification Project obtains corresponding target identity information and (for example needs key, digital signature or credit grade up to upper
Limit), above-mentioned target identity information is provided when sending above-mentioned data acquisition request, is obtained convenient for the data source node according to data
It takes rule to be verified, improves the safety in data sharing.
Wherein, above-mentioned steps 202 and this step 203 can also be respectively with reference to the steps 101 and step in embodiment illustrated in fig. 1
Specific descriptions in rapid 102, details are not described herein again.
204, the target data from above-mentioned data source node is received, the data analysis node in Xiang Shangshu side chain is sent
Data analysis request comprising above-mentioned target data, above-mentioned data analysis request are used to indicate above-mentioned data analysis node to above-mentioned
Target data is analyzed.
Since alliance's chain can provide big data analysis interface, first node can also request to divide target data
Analysis.The side chain node for executing data analysis function, i.e., above-mentioned side chain can be set in side chain belonging to the first node
In data analysis node.First node can send the data comprising above-mentioned target data to above-mentioned data analysis node and analyze
Request, analyzes above-mentioned data analysis node to above-mentioned target data, above-mentioned data analysis node can be according to present count
According to parser carry out data analysis, obtain the analysis of target data as a result, and to first node send, step can be executed later
Rapid 205.
Wherein, Various types of data can be integrated into different types of reference report template by above-mentioned data analysis node, by
Enterprise's node independently selects.Collage-credit data analysis is done by side chain, can be generated and be different from making by oneself for traditional people's row reference report
Adopted reference report, selection are flexible.
It optionally, can be in the autonomous additions and deletions side chain node of first node.All kinds of mechanisms add side chain node and main chain node
Separation does not influence main chain business, i.e. Added Business scene only needs newly-increased side chain (node).
It is further alternative, if special joint can also be arranged in main chain not by the way of above-mentioned additions and deletions side chain.Because of connection
Alliance's chain network supports the characteristic of multichannel, independent channel is arranged, certain nodes having permission is made to carry out small-scale cluster,
He can not interact node herein.The special joint in main chain can be set by above-mentioned data analysis node, the node
Allow first node send target data come carry out data analysis and provide analysis as a result, the interaction between two nodes be secrecy,
Oneself transmission rule and/or encryption rule can be set in the transaction that can be understood as the cluster internal, and analysis result can not
It broadcasts again.Also security strategy can be set, by side chain processing result safe transmission to main chain.
205, it receives from above-mentioned data analysis node to the analysis result of above-mentioned target data.
First node can store in the local database after receiving the above-mentioned analysis result to target data, can
To be checked and be shared.
In a kind of optional embodiment, this method further include:
The second informative abstract is generated according to the analysis result of above-mentioned target data, above-mentioned second informative abstract includes above-mentioned number
According to the Data Identification of analysis node and the analysis result of above-mentioned target data;
Above-mentioned second informative abstract is sent to the main chain node of above-mentioned alliance's chain.
First node can also generate the second informative abstract, to share the analysis knot of target data to other main chain nodes
Fruit.Specifically, above-mentioned second informative abstract may include the analysis result of above-mentioned first node address and above-mentioned target data
Data Identification, by above-mentioned second informative abstract, other main chain nodes are available to arrive the first node address, to the first segment
The analysis result of the point request target data.
By hashed in all data transmission procedures, and while broadcasting, only transmits informative abstract, can't be by
Decrypt private data.Each node data is there is also in respective database, in entire alliance's chain network, the reference base of bottom
The phenomenon that plinth data are not in, will not be stolen.
Data processing method of the side chain based on above-mentioned alliance's chain in conjunction with main chain, and light weight more more efficient than simple main chain
Change.And opening and closing principle is followed, plug is strong, convenient for increasing or shutting down business newly, and is directed to collage-credit data, can be based on side
The customized reference report template of chain node, possesses publicity and privacy.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book.
Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame
The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member
Service.One Fabric network includes that companion's node (Peer nodes) executes chaincode contract, accesses account book data, back
The interface of book transaction and referred to as application program.Mandator node (Orderer nodes) is responsible for ensuring the consistency of this block chain
And convey the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority (Certificate
Authority) X.509 certificate is used to verify member identities and role for management.Based on super account book, may exist at least four classes
Special joint: endorsement node, confirmation node, ordering joint, certificate node.
In the embodiment of the present application, authorization requests are sent to user terminal by first node, on above-mentioned authorization requests carry
State Data Identification, first node is when receiving the confirmation to above-mentioned authorization requests from above-mentioned user terminal and instructing, from upper
It states and obtains above-mentioned first information abstract in the main chain of alliance's chain, determine that above-mentioned Data Identification is corresponding according to above-mentioned data origin information
Target data data source node, then above-mentioned data source node into the main chain of alliance's chain sends data acquisition and asks
It asks, above-mentioned data acquisition request carries above-mentioned Data Identification, receives the target data from above-mentioned data source node later, i.e.,
It is made a summary by above-mentioned target information, the node in alliance's chain can determine data source and then obtain target data, it can increase
Add data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance;It can also be into above-mentioned side chain
Data analysis node send include above-mentioned target data data analysis request, above-mentioned data analysis request is used to indicate above-mentioned
Data analysis node analyzes above-mentioned target data, is can receive later from above-mentioned data analysis node to above-mentioned target
The analysis of data is as a result, alliance's chain main chain and side chain can be combined, based on the real big data of data sharing platform creation
Analysis not only ensure that privacy, but also realize data sharing and analysis integration, and side chain is rationally arranged, can make main chain light weight
Change, promotes information processing efficiency.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that
, in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment
Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure
And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with
Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution
Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not
It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can
With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module
In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs
It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real
It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of terminal device provided by the embodiments of the present application, the terminal device
300 can be the terminal device of first node, including obtain module 310, determining module 320 and transmission module 330, in which:
The acquisition module 310 obtains first information abstract for first node, and the first information abstract includes data
Mark and data origin information;
The determining module 320, for determining the corresponding number of targets of the Data Identification according to the data origin information
According to data source node;The transmission module 330 sends number for the data source node into the main chain of alliance's chain
According to acquisition request, the data acquisition request carries the Data Identification;
The transmission module 330 is also used to, and receives the target data from the data source node, Xiang Suoshu alliance chain
Side chain node send include the target data process instruction, the process instruction be used to indicate the side chain node according to
The data processing rule disposed on side chain handles the target data to obtain processing result;
The transmission module 330 is also used to, and receives the processing result from the side chain node.
Optionally, the acquisition module 310 is specifically used for:
In response to the acquisition instruction comprising user identifier, the user identifier corresponding first is obtained from local data base
Informative abstract.
Optionally, the transmission module 330 is also used to, before the acquisition module 310 obtains first information abstract, Xiang Yong
Family terminal sends authorization requests, and the authorization requests carry the Data Identification;
The acquisition module 310 is specifically used for, the transmission module 330 receive from the user terminal to institute
When stating the confirmation instruction of authorization requests, the first information abstract is obtained from the main chain of alliance's chain.
Optionally, the transmission module 330 is specifically used for, and the data analysis node in Xiang Suoshu side chain is sent comprising described
The data analysis request of target data, the data analysis request are used to indicate the data analysis node to the target data
It is analyzed;
It receives from the data analysis node to the analysis result of the target data.
Optionally, the terminal device 300 further includes generation module 340, for the analysis knot according to the target data
Fruit generates the second informative abstract, and second informative abstract includes the analysis knot of the first node address and the target data
The Data Identification of fruit;
The transmission module 330 is also used to, and the main chain node of Xiang Suoshu alliance chain sends second informative abstract.
Optionally, above-mentioned acquisition module 310 is also used to, the number of the transmission module 330 into the main chain of alliance's chain
Before sending data acquisition request according to source Nodes, the node type of the data source node is obtained, obtains the data
The corresponding target data of the node type of source node obtains rule;
Above-mentioned generation module 340 is also used to, and is obtained rule according to the target data and is generated Target Acquisition request, the mesh
Marking acquisition request includes that the target data obtains information to be verified as defined in rule, and the information to be verified is used for the data
Source Nodes verify the first node;
The transmission module 330 is specifically used for, and Xiang Suoshu data source node sends the Target Acquisition request.It is optional
, above-mentioned terminal device 300 further includes integrating module 350, receives for the transmission module 330 and comes from the data source section
After the target data of point, the received target data and data with existing are integrated, generate target data modification information;
The transmission module 330 is also used to, and the target data modification information, the target data change are broadcasted in alliance's chain
Information includes the first node address.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data processing method shown in Fig. 2 based on alliance's chain
The step 101 being related to~104,201~205 modules that can be in terminal device 300 as shown in Figure 3 are performed.
By the terminal device 300 of the embodiment of the present application, terminal device 300 can obtain the first information by first node
Abstract, wherein first information abstract includes Data Identification and data origin information, and determining further according to above-mentioned data origin information should
The data source node of the corresponding target data of Data Identification, and then the data source node into the main chain of alliance's chain sends number
According to acquisition request, wherein data acquisition request carries Data Identification;It can receive the target from the data source node later
Data, and the process instruction comprising above-mentioned target data can be sent to the side chain node of alliance's chain, which is used for
Indicate that the side chain node handles above-mentioned target data according to the data processing rule disposed on side chain to obtain processing result;?
To receive the processing result from above-mentioned side chain node, alliance's chain main chain and side chain can be combined, pass through main chain and information
The form of abstract increases data acquisition source, while convenient realizations data sharing, due to reasonable side chain setting progress data
Processing, improves the efficiency of data processing.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind terminal device disclosed in the embodiment of the present application.Such as Fig. 4 institute
Show, which includes processor 401 and memory 402, wherein terminal device 400 can also include bus 403, place
Reason device 401 and memory 402 can be connected with each other by bus 403, and bus 403 can be Peripheral Component Interconnect standard
(Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended
Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus,
Control bus etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a seed type convenient for indicating
Bus.Wherein, terminal device 400 can also include input-output equipment 404, and input-output equipment 404 may include display
Screen, such as liquid crystal display.Memory 402 is used to store one or more programs comprising instruction;Processor 401 is for calling
Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of the instruction execution being stored in memory 402.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user
Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
By the terminal device 400 of the embodiment of the present application, terminal device 400 can obtain the first information by first node
Abstract, wherein first information abstract includes Data Identification and data origin information, and determining further according to above-mentioned data origin information should
The data source node of the corresponding target data of Data Identification, and then the data source node into the main chain of alliance's chain sends number
According to acquisition request, wherein data acquisition request carries Data Identification;It can receive the target from the data source node later
Data, and the process instruction comprising above-mentioned target data can be sent to the side chain node of alliance's chain, which is used for
Indicate that the side chain node handles above-mentioned target data according to the data processing rule disposed on side chain to obtain processing result;?
To receive the processing result from above-mentioned side chain node, alliance's chain main chain and side chain can be combined, pass through main chain and information
The form of abstract increases data acquisition source, while convenient realizations data sharing, due to reasonable side chain setting progress data
Processing, improves the efficiency of data processing.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer
A kind of some or all of the data processing method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module,
It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Claims (10)
1. a kind of data processing method based on alliance's chain, which is characterized in that the described method includes:
First node obtains first information abstract, and the first information abstract includes Data Identification and data origin information;
The data source node that the corresponding target data of the Data Identification is determined according to the data origin information, to alliance's chain
Main chain in the data source node send data acquisition request, the data acquisition request carries the Data Identification;
The target data from the data source node is received, it includes the target that the side chain node of Xiang Suoshu alliance chain, which is sent,
The process instruction of data, the process instruction be used to indicate the side chain node according to the data processing rule disposed on side chain at
The target data is managed to obtain processing result;
Receive the processing result from the side chain node.
2. the method according to claim 1, wherein first node acquisition first information abstract includes:
The first node obtains the user identifier pair in response to the acquisition instruction comprising user identifier from local data base
The first information abstract answered.
3. the method according to claim 1, wherein the first node obtain the first information abstract before, institute
State method further include:
The first node sends authorization requests to user terminal, and the authorization requests carry the Data Identification;
The first node obtains first information abstract
The first node receive from the user terminal when being instructed to the confirmations of the authorization requests, from described
The first information abstract is obtained in the main chain of alliance's chain.
4. according to the method in claim 2 or 3, which is characterized in that described send to the side chain node of alliance's chain is wrapped
Process instruction containing the target data includes:
Data analysis node into the side chain sends the data analysis request comprising the target data, the data analysis
Request is used to indicate the data analysis node and analyzes the target data;
The processing result of the reception from the side chain node include:
It receives from the data analysis node to the analysis result of the target data.
5. method according to claim 1-3, which is characterized in that described receive comes from the data analysis node
After the analysis result of the target data, the method also includes:
The second informative abstract is generated according to the analysis result of the target data, second informative abstract includes the first segment
The Data Identification of the analysis result of dot address and the target data;
Second informative abstract is sent to the main chain node of alliance's chain.
6. according to the method described in claim 5, it is characterized in that, the data source section into the main chain of alliance's chain
Before point sends data acquisition request, the method also includes:
The node type for obtaining the data source node obtains the corresponding number of targets of node type of the data source node
It is regular according to obtaining;
Rule is obtained according to the target data and generates Target Acquisition request, and the Target Acquisition request includes the target data
Information to be verified as defined in rule is obtained, the information to be verified carries out the first node for the data source node
Verifying;
The data source node into the main chain of alliance's chain sends data acquisition request
The Target Acquisition request is sent to the data source node.
7. method according to claim 5 or 6, which is characterized in that the mesh of the reception from the data source node
After marking data, the method also includes:
The received target data and data with existing are integrated, target data modification information is generated, in alliance's chain
The middle broadcast target data modification information, the target data modification information includes the first node address.
8. a kind of terminal device characterized by comprising obtain module, determining module and transmission module, in which:
The acquisition module obtains first information abstract for first node, first information abstract include Data Identification and
Data origin information;
The determining module, for determining the data of the corresponding target data of the Data Identification according to the data origin information
Source Nodes;The transmission module sends data acquisition request for the data source node into the main chain of alliance's chain,
The data acquisition request carries the Data Identification;
The transmission module is also used to, and receives the target data from the data source node, the side chain of Xiang Suoshu alliance chain
Node sends the process instruction comprising the target data, and the process instruction is used to indicate the side chain node according on side chain
The data processing rule of deployment handles the target data to obtain processing result;
The transmission module is also used to, and receives the processing result from the side chain node.
9. a kind of terminal device, which is characterized in that including processor, input equipment, output equipment and memory, the processing
Device, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the meter
Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes claim 1-7 such as and appoints
Method described in one.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described
Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor
The described in any item methods of 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910423015.1A CN110245185A (en) | 2019-05-21 | 2019-05-21 | Data processing method, terminal device and computer storage medium based on alliance's chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910423015.1A CN110245185A (en) | 2019-05-21 | 2019-05-21 | Data processing method, terminal device and computer storage medium based on alliance's chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110245185A true CN110245185A (en) | 2019-09-17 |
Family
ID=67884622
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910423015.1A Pending CN110245185A (en) | 2019-05-21 | 2019-05-21 | Data processing method, terminal device and computer storage medium based on alliance's chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110245185A (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN112235360A (en) * | 2020-09-26 | 2021-01-15 | 建信金融科技有限责任公司 | Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium |
CN112508571A (en) * | 2020-12-17 | 2021-03-16 | 平安国际智慧城市科技股份有限公司 | Data processing method and device based on block chain, computer equipment and storage medium |
CN112540957A (en) * | 2020-12-03 | 2021-03-23 | 齐鲁工业大学 | File secure storage and sharing system based on mixed block chain and implementation method |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107169865A (en) * | 2017-04-24 | 2017-09-15 | 北京果仁宝科技有限公司 | Asset data processing system based on block chain technology |
WO2018145554A1 (en) * | 2017-02-08 | 2018-08-16 | 腾讯科技(深圳)有限公司 | Data processing method, related device and system, and computer readable storage medium |
CN108647962A (en) * | 2018-04-27 | 2018-10-12 | 腾讯科技(深圳)有限公司 | Credit investigation system, the storage method of collage-credit data, device, equipment and medium |
CN109241087A (en) * | 2018-09-27 | 2019-01-18 | 福建福链科技有限公司 | A kind of data processing method and terminal of alliance's chain |
CN109377319A (en) * | 2018-10-30 | 2019-02-22 | 平安科技(深圳)有限公司 | Purchase vehicle information processing method, device, equipment and storage medium based on alliance's chain |
SG11201901760SA (en) * | 2017-08-01 | 2019-04-29 | Zhongan Information Technology Service Co Ltd | Method and system for accessing out-of-chain data based on consortium block chain |
-
2019
- 2019-05-21 CN CN201910423015.1A patent/CN110245185A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2018145554A1 (en) * | 2017-02-08 | 2018-08-16 | 腾讯科技(深圳)有限公司 | Data processing method, related device and system, and computer readable storage medium |
CN107169865A (en) * | 2017-04-24 | 2017-09-15 | 北京果仁宝科技有限公司 | Asset data processing system based on block chain technology |
SG11201901760SA (en) * | 2017-08-01 | 2019-04-29 | Zhongan Information Technology Service Co Ltd | Method and system for accessing out-of-chain data based on consortium block chain |
CN108647962A (en) * | 2018-04-27 | 2018-10-12 | 腾讯科技(深圳)有限公司 | Credit investigation system, the storage method of collage-credit data, device, equipment and medium |
CN109241087A (en) * | 2018-09-27 | 2019-01-18 | 福建福链科技有限公司 | A kind of data processing method and terminal of alliance's chain |
CN109377319A (en) * | 2018-10-30 | 2019-02-22 | 平安科技(深圳)有限公司 | Purchase vehicle information processing method, device, equipment and storage medium based on alliance's chain |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN111046078B (en) * | 2019-11-11 | 2023-09-05 | 京东科技信息技术有限公司 | Credit investigation method and device based on block chain and electronic equipment |
CN112235360A (en) * | 2020-09-26 | 2021-01-15 | 建信金融科技有限责任公司 | Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium |
CN112540957A (en) * | 2020-12-03 | 2021-03-23 | 齐鲁工业大学 | File secure storage and sharing system based on mixed block chain and implementation method |
CN112508571A (en) * | 2020-12-17 | 2021-03-16 | 平安国际智慧城市科技股份有限公司 | Data processing method and device based on block chain, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110210961A (en) | Data capture method, server and computer storage medium based on alliance's chain | |
CN110245185A (en) | Data processing method, terminal device and computer storage medium based on alliance's chain | |
CN110246017A (en) | Data capture method, terminal device and computer storage medium based on alliance's chain | |
CN110493007A (en) | A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain | |
CN110222529A (en) | Assets management method, electronic equipment and computer storage medium based on alliance's chain | |
CN109450910A (en) | Data sharing method, data sharing network and electronic equipment based on block chain | |
CN109525671A (en) | Date storage method, electronic equipment and storage medium based on block chain | |
CN110223157A (en) | Data capture method, electronic equipment and computer storage medium based on alliance's chain | |
CN110555029A (en) | ticket management method and device based on block chain and storage medium | |
CN105493146A (en) | Devices, frameworks and methodologies for enabling user-driven determination of body size and shape information and utilisation of such information across a networked environment | |
CN110263025A (en) | Data liquidation method, electronic equipment and computer storage medium based on alliance's chain | |
CN109155731A (en) | The management of password transaction | |
CN109753815A (en) | Data processing method, data processing network and electronic equipment based on block chain | |
CN109670974A (en) | A kind of risk monitoring and control method and device, electric terminal | |
CN110246040A (en) | Trade management method, electronic equipment and computer storage medium based on alliance's chain | |
CN203350880U (en) | POS safety certification device and system | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
CN103490893A (en) | Information leakage testing control method, device and system and information channel safety certification device | |
CN110493754A (en) | A kind of SIM card resource allocation methods, system, terminal device and storage medium | |
CN104951968A (en) | Lottery E-commerce automatic investment method and system | |
CN113609224A (en) | Crowdsourcing operation method and system for realizing privacy protection based on block chain | |
CN105913343A (en) | Mobile Internet service application-based service supervision system | |
CN109241762A (en) | Assets information acquisition methods, device and computer equipment based on block chain technology | |
CN105227592A (en) | A kind of Internet architecture and implementation method | |
EP3852332B1 (en) | Processing request for personal data with data owner's permission |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20190917 |
|
WD01 | Invention patent application deemed withdrawn after publication |