CN110245185A - Data processing method, terminal device and computer storage medium based on alliance's chain - Google Patents

Data processing method, terminal device and computer storage medium based on alliance's chain Download PDF

Info

Publication number
CN110245185A
CN110245185A CN201910423015.1A CN201910423015A CN110245185A CN 110245185 A CN110245185 A CN 110245185A CN 201910423015 A CN201910423015 A CN 201910423015A CN 110245185 A CN110245185 A CN 110245185A
Authority
CN
China
Prior art keywords
data
node
chain
mentioned
alliance
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910423015.1A
Other languages
Chinese (zh)
Inventor
陈子豪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201910423015.1A priority Critical patent/CN110245185A/en
Publication of CN110245185A publication Critical patent/CN110245185A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The embodiment of the present application discloses a kind of data processing method based on alliance's chain, terminal device and computer storage medium, it is related to block storage system and block data structures technology, wherein method includes: that first node obtains first information abstract, and first information abstract includes Data Identification and data origin information;The data source node that the corresponding target data of Data Identification is determined according to data origin information, the data source node into the main chain of alliance's chain send data acquisition request;Receive the target data from the data source node, the process instruction comprising target data is sent to the side chain node of alliance's chain, the process instruction is used to indicate the side chain node and handles the target data according to the data processing rule disposed on side chain to obtain processing result;The processing result from side chain node is received, alliance's chain main chain and side chain can be combined, increases data acquisition source, promotes the efficiency of data processing.

Description

Data processing method, terminal device and computer storage medium based on alliance's chain
Technical field
This application involves alliance's chain technical fields more particularly to a kind of data processing method based on alliance's chain, terminal to set Standby and computer storage medium.
Background technique
Reference is to acquire, arrange in accordance with the law, saving, processing the credit information of natural person, legal person and its hetero-organization, and externally mentioning For services such as credit report, credit evaluation, credit information consultings, client's judgement, control credit risk are helped, credit management is carried out Activity, it provides the shared platform of credit information for specialized credit mechanism.
Current, credit investigation system centralization generally obtains reference report by people's row reference or main strategies mechanism, Data source is more single, and procurement cost is high.The credit investigation system data sharing realized by block chain, exists with more and more Node and operation flow be added, the increasingly huger problem of data volume, cause in block chain retrieve, know together processing efficiency drop Low, system is too fat to move.
Summary of the invention
The embodiment of the present application provides a kind of data processing method based on alliance's chain, terminal device and computer storage and is situated between Matter is related to block storage system and block data structures technology, alliance's chain main chain and side chain can be combined, and increases data and obtains Source is fetched, the efficiency of whole system processing information is promoted.
In a first aspect, the embodiment of the present application provides a kind of data processing method based on alliance's chain, which comprises
First node obtains first information abstract, and the first information abstract includes Data Identification and data origin information;
The data source node of the corresponding target data of the Data Identification, Xiang Lian are determined according to the data origin information The data source node in the main chain of alliance's chain sends data acquisition request, and the data acquisition request carries the data mark Know;
The target data from the data source node is received, the side chain node of Xiang Suoshu alliance chain is sent comprising described The process instruction of target data, the process instruction are used to indicate the side chain node and are advised according to the data processing disposed on side chain Handle the target data then to obtain processing result;
Receive the processing result from the side chain node.
As a kind of possible embodiment, the first node, which obtains the first information and makes a summary, includes:
The first node obtains user's mark in response to the acquisition instruction comprising user identifier from local data base Know corresponding first information abstract.
As a kind of possible embodiment, before the first node obtains first information abstract, the method is also wrapped It includes:
The first node sends authorization requests to user terminal, and the authorization requests carry the Data Identification;
The first node obtains first information abstract
The first node receive from the user terminal when being instructed to the confirmations of the authorization requests, from institute It states and obtains the first information abstract in the main chain of alliance's chain.
As a kind of possible embodiment, described send to the side chain node of alliance's chain includes the target data Process instruction include:
Data analysis node into the side chain sends the data analysis request comprising the target data, the data Analysis request is used to indicate the data analysis node and analyzes the target data;
The processing result of the reception from the side chain node include:
It receives from the data analysis node to the analysis result of the target data.
As a kind of possible embodiment, the reception divides the target data from the data analysis node After analysing result, the method also includes:
The second informative abstract is generated according to the analysis result of the target data, second informative abstract includes described the The Data Identification of the analysis result of one node address and the target data;
Second informative abstract is sent to the main chain node of alliance's chain.
As a kind of possible embodiment, the data source node into the main chain of alliance's chain sends data Before acquisition request, the method also includes:
The node type for obtaining the data source node obtains the corresponding mesh of node type of the data source node Mark data acquisition rule;
Rule is obtained according to the target data and generates Target Acquisition request, and the Target Acquisition request includes the target Information to be verified as defined in data acquisition rule, the information to be verified is for the data source node to the first node It is verified;
The data source node into the main chain of alliance's chain sends data acquisition request
The Target Acquisition request is sent to the data source node.
As a kind of possible embodiment, after the target data of the reception from the data source node, institute State method further include:
The received target data and data with existing are integrated, target data modification information is generated, described The target data modification information is broadcasted in alliance's chain, the target data modification information includes the first node address.
Second aspect, the embodiment of the present application provide a kind of terminal device, comprising: obtain module, determining module and transmission Module, in which:
The acquisition module obtains first information abstract for first node, and the first information abstract includes data mark Knowledge and data origin information;
The determining module, for determining the corresponding target data of the Data Identification according to the data origin information Data source node;The transmission module sends data acquisition for the data source node into the main chain of alliance's chain Request, the data acquisition request carry the Data Identification;
The transmission module is also used to, and receives the target data from the data source node, Xiang Suoshu alliance chain Side chain node sends the process instruction comprising the target data, and the process instruction is used to indicate the side chain node according to side The data processing rule disposed on chain handles the target data to obtain processing result;
The transmission module is also used to, and receives the processing result from the side chain node.
The third aspect, the embodiment of the present application also provides a kind of terminal device, including processor, input equipment, output are set Standby and memory, the processor, input equipment, output equipment and memory are connected with each other, wherein the memory is for depositing Computer program is stored up, the computer program includes program instruction, and the processor is configured for calling described program instruction, Execute the method as described in first aspect and its any possible embodiment.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application obtains first information abstract by first node, and wherein first information abstract includes Data Identification And data origin information, the data source section of the corresponding target data of the Data Identification is determined further according to above-mentioned data origin information Point, and then the data source node into the main chain of alliance's chain sends data acquisition request, wherein data acquisition request carries number According to mark, the target data from the data source node can receive later, and can send out to the side chain node of alliance's chain The process instruction comprising above-mentioned target data is sent, which is used to indicate the side chain node according to the data disposed on side chain The above-mentioned target data of rule process is handled to obtain processing result, it can the processing result from above-mentioned side chain node is received, Alliance's chain main chain and side chain can be combined, data acquisition source is increased by main chain, while realizing data sharing, by It is arranged in reasonable side chain and carries out data processing, lightweight main chain improves the efficiency of data processing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of data processing method based on alliance's chain provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for data processing method based on alliance's chain that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of terminal device provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another terminal device provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein " embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand, Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application It continues.
The terminal device mentioned in the embodiment of the present application is the equipment that can be communicated with server, above-mentioned server Claim servomechanism, is to provide the equipment of the service of calculating, can permit multiple terminal devices and access.Above-mentioned terminal device can be Desktop computer or mobile terminal, mobile terminal may include the various handheld devices with wireless communication function, wearable set It is standby, calculate equipment or be connected to radio modem other processing equipments and various forms of user equipment (User Equipment, UE), mobile station (Mobile Station, MS) etc..
It referring to Figure 1, is a kind of exemplary flow of data processing method based on alliance's chain provided by the embodiments of the present application Figure, this method as shown in Figure 1 can include:
101, first node obtains first information abstract, and above-mentioned first information abstract includes that Data Identification and data source are believed Breath.
Executing subject in the embodiment of the present application is first node, can be the node on the main chain in alliance's chain, referred to as Main chain node, the main chain node on alliance's chain can carry out data sharing based on the intelligent contract on alliance's chain.
Alliance's chain, member and limited third party just for some special group, inside specify multiple preselected nodes For the people that keeps accounts, each piece of generation is codetermined by all preselected nodes.
Generally according to the difference of alliance's chain network centralization degree, alliance's chain under 3 kinds of different application scenes is differentiated:
(1) the whole network discloses, the block chain of no user licensing scheme, referred to as publicly-owned chain;
(2) network is added in the node for allowing to authorize, and information can be checked according to permission, is often used for inter-agency block Chain, referred to as alliance's chain or industry chain;
(3) node in all-network all rests in a mechanism hand, referred to as privately owned chain.
Alliance's chain and privately owned chain also referred to collectively as permit chain, publicly-owned chain to be known as unlicensed chain.
Alliance's chain in the embodiment of the present application can be understood as above-mentioned second situation, for collage-credit data shared system, Node type in alliance's chain may include enterprise's node, credit information service's node and government organs' node.The main chain of alliance's chain On can also have main chain server, it is understood that be data sharing platform, auxiliary realize node data sharing.
It can be deployed with intelligent contract (Smart contract) on alliance's chain mentioned above, be that one kind is intended to informationization The computer protocol of contract is propagated, verifies or executed to mode.Intelligent contract permission carries out credible in no third-party situation Transaction, these transaction are traceable.Each main chain node in above-mentioned alliance's chain can have the database of oneself, data sharing chain link Point and corresponding side chain node.
Above-mentioned data sharing chain node can be understood as above-mentioned privately owned chain node, the i.e. node in a data sharing chain It can be used as one small cluster and carry out data sharing, increase independence and safety.
Specifically, can store multiple user basic informations in the local data base of the first node, including the user's Station address, the station address then can be used for inquiring the corresponding Profile Summary of above-mentioned Data Identification, i.e., above-mentioned first letter Breath abstract.Above-mentioned first node can obtain above-mentioned use in response to the acquisition instruction comprising user identifier from local data base Family identifies corresponding first information abstract, wherein above-mentioned acquisition instruction can be triggered by user, it can also be automatic in predetermined time It initiates.
Informative abstract in the embodiment of the present application can be understood as the corresponding relationship of data and data source, i.e., a kind of data The catalogue of acquisition modes.
Above-mentioned first information abstract may include the Data Identification and data origin information of target data to be obtained, above-mentioned Data Identification can be data number or title, and for determining the target data, above-mentioned data origin information may include the target The provider of data, that is, data source node is specifically as follows the data source node identification or data source of the target data Node address.Wherein, above-mentioned data source node can be other nodes in addition to the first node in alliance's chain main chain.
In a kind of optional embodiment, above-mentioned first information abstract can be generated by above-mentioned data source node, and And can be broadcasted in alliance's chain main chain, the main chain node in alliance's chain is available and stores the above-mentioned first information and plucks It wants, i.e., first node is available makes a summary to the above-mentioned first information and store in the local database, also can specify that by above-mentioned Informative abstract in first node (management node special as one) Lai Guanli alliance chain main chain.
Broadcast (Broadcasting) is the most common form of multicast, it delivers one point to each point of destination The copy of group.It can be completed by the delivery that multiple singles are grouped, the copy that can also be grouped by individually connecting transmitting, Until each recipient receives a copy.By way of broadcast, the main chain node in alliance's chain is enable to obtain Obtain the mode of the target data, but it is different establish a capital to have permission obtain the target data, can also be according to other authentications Formula could obtain after being verified, to improve safety.
It is not data each time to be changed to direct broadcast encryption, but generate one and be similar in the embodiment of the present application The encryption string of informative abstract is broadcasted, data can be made even be decrypted (this is also almost impossible certainly) will not reveal it is any Private data.
After obtaining above-mentioned first information abstract, step 102 can be executed.
102, the data source node of the corresponding target data of above-mentioned Data Identification is determined according to above-mentioned data origin information, Above-mentioned data source node into the main chain of alliance's chain sends data acquisition request, and above-mentioned data acquisition request carries above-mentioned number According to mark.
Specifically, due to include in above-mentioned data origin information target data to be obtained data source node, i.e., the One node can determine that the data source node is the provider of the corresponding target data of the Data Identification, the available data Source Nodes address, and then send data acquisition request to the data source node and carry out data acquisition, wherein above-mentioned data obtain Take request that can also carry above-mentioned Data Identification, above-mentioned Data Identification determines shared number of targets for the data source node According to.
Above-mentioned data source node, can be according to above-mentioned number after the data acquisition request for receiving above-mentioned first node Above-mentioned target data is determined according to mark, then sends above-mentioned target data to first node, can transmit compressed target data, Above-mentioned target data can also be shared from other forms to first node, and then step 103 can be executed.
It optionally, can sentencing based on itself after above-mentioned data source node receives above-mentioned data acquisition request Disconnected rule determines whether to provide target data.The judgment rule of above-mentioned data source node can be to be realized based on intelligent contract, It is also possible to determine in data source node by user's operation manual end equipment.It is provided in the confirmation of data source node above-mentioned After target data, above-mentioned target data can be sent to the first node.
Specifically, the node type of first node can be credit information service's node or enterprise's node, wherein enterprise's node It can be the terminal device of securities broker company, payment platform, insurance company, business bank etc.;In the sign comprising above-mentioned first node Believe in system data acquisition process, target data to be obtained can be collage-credit data, be specifically as follows personal essential information number According to or transaction with credit data.
The reference report of credit investigation system can be made of three category informations at present, comprising:
(1) personal essential information, including name, type of credential and number, address, contact method, marital status, residence Firmly information, occupational information etc.;
(2) transaction with credit information, including credit card information, credit information, other credit informations etc.;
(3) other information, such as personal common reserve fund, old-age pension information.
The shared of above-mentioned collage-credit data can be carried out between the main chain node of alliance's chain, which can permit adding for node Enter and exit, wherein node type may include: that enterprise's node (protect by such as internet financing corporation, business bank, payment platform Institute etc. is handed in dangerous company, securities broker company, room), credit information service's node (such as people's row reference, main strategies mechanism) and government organs save Point etc..
103, the target data from above-mentioned data source node is received, the side chain node transmission of Xiang Shangshu alliance chain includes The process instruction of above-mentioned target data, above-mentioned process instruction be used to indicate above-mentioned side chain node according to the data disposed on side chain at The above-mentioned target data of rule process is managed to obtain processing result.
First node can be stored in the local data base of first node after receiving above-mentioned target data, can also be with It is stored again after being integrated to target data, voluntarily can obtain and check later.The different nodes according to belonging to first node Type, the data of database may include the different types of data such as registration information, transaction record, assets information.
In a kind of optional embodiment, first node can be carried out above-mentioned received target data and data with existing Integration, generate target data modification information, and can in above-mentioned alliance's chain broadcast them target data modification information, it is above-mentioned Target data modification information includes above-mentioned first node address.By above-mentioned target data modification information, main chain node can be obtained The first node address, and to described in first node request integrate after target data.
Specifically, the data processing carried out to the target data of above-mentioned acquisition can be based on the side chain node of the first node It realizes, side chain node can have preset data processing rule.First node can have oneself privately owned chain and the alliance Side chain in chain, node in the side chain are the side chain node of the first node, first node and side with respect to the first node The interaction of chain node can be realized independently, not disclose other main chain nodes.
First node can send the process instruction comprising above-mentioned target data with above-mentioned side chain node, and above-mentioned side chain node exists When receiving the process instruction comprising above-mentioned target data, it can be disposed in response to above-mentioned process instruction according on above-mentioned side chain Data processing rule handle above-mentioned target data, so that obtaining later can be to first to the processing result of the target data Node sends the processing result, executes step 104.
Above-mentioned data processing may include the operations such as data cleansing, data desensitization process, data conversion, data analysis.
In a kind of optional embodiment, first node can be existing to above-mentioned received target data and first node Historical data integrated, information update, the target data modification information can be generated, the broadcast them target in alliance's chain Data modification information, above-mentioned target data modification information may include the first node address, it can increase the number of targets According to source-information, other nodes can receive above-mentioned first node address and then to first node application obtain the number of targets According to increasing data acquisition channel.
104, the above-mentioned processing result from above-mentioned side chain node is received.
First node can store it in local data base after receiving above-mentioned processing result, can will be whole Above-mentioned target data and above-mentioned processing result after conjunction store together.
In a kind of optional embodiment, step 103 may include: that the data analysis node into above-mentioned side chain is sent Data analysis request comprising above-mentioned target data, above-mentioned data analysis request are used to indicate above-mentioned data analysis node to above-mentioned Target data is analyzed;Then step 104 may include: and receive to divide above-mentioned target data from above-mentioned data analysis node Analyse result.
It, can to above-mentioned received target data and after above-mentioned steps 104 in a kind of optional embodiment There are data to be integrated, generation target data modification information, the broadcast them target data modification information in above-mentioned alliance's chain, on Stating target data modification information includes above-mentioned first node address.
In the embodiment of the present application, first information abstract can be obtained by first node, wherein first information abstract includes Data Identification and data origin information determine the number of the corresponding target data of the Data Identification further according to above-mentioned data origin information Data source node according to source Nodes, and then into the main chain of alliance's chain sends data acquisition request, and wherein data acquisition is asked Seek carrying Data Identification;It can receive the target data from the data source node later, and can be to the side of alliance's chain Chain node sends the process instruction comprising above-mentioned target data, which is used to indicate the side chain node according to side chain top The data processing rule of administration handles above-mentioned target data to obtain processing result;The place from above-mentioned side chain node can be received Reason increases data acquisition source as a result, alliance's chain main chain and side chain can be combined by way of main chain and informative abstract, While convenient realization data sharing, data processing is carried out since reasonable side chain is arranged, improves the efficiency of data processing.
It referring to fig. 2, is the exemplary flow of another data processing method based on alliance's chain provided by the embodiments of the present application Figure, embodiment shown in Fig. 2, which can be, to be obtained on the basis of embodiment shown in Fig. 1, and this method as shown in Figure 2 can wrap It includes:
201, first node sends authorization requests to user terminal, and above-mentioned authorization requests carry above-mentioned Data Identification.
Node in alliance's chain can upload data and be shared, and obtain these shared datas.Obtaining shared number It according to before, can first be authorized, the node after being authorized could obtain shared data.Specifically, above-mentioned first node Authorization requests can be sent to user terminal, wherein above-mentioned user terminal refers to that user makes when needing to obtain target data Terminal device can store multiple user basic informations in first node, wherein may include user identifier (such as user Account), first node can send above-mentioned authorization requests to the terminal device for logging in above-mentioned user account, request user to this Data acquisition is authorized.User can receive above-mentioned authorization requests by the terminal device at this time, judge whether to give this The data acquisition permission of one node.
Optionally, first node can send above-mentioned authorization requests to user terminal, i.e., apply for that collage-credit data is looked into user Authorization is ask, initiation can be operated by the staff of the first node, after user agrees to and authorizes, passes through user's end End can send confirmation instruction to the first node.
Optionally, above-mentioned first node, can be according to default when reaching the first moment in preset authorization request time The corresponding relationship of authorization requests time and authorized user's mark determine corresponding authorized user's mark of above-mentioned first moment, upwards It states authorized user and identifies corresponding user terminal and send the above-mentioned authorization requests to target user.It can store in first node As the user information of authorized party, it can realize that intelligent contract can specify that the section in alliance's chain by above-mentioned intelligent contract Point trading rules, can be first to user's end in the case where needing first node to carry out data acquisition based on above-mentioned intelligent contract End sends above-mentioned authorization requests, i.e., above-mentioned authorization requests can be understood as the regulation based on intelligent contract and be sent out on time by first node It rises.
Wherein, above-mentioned authorization requests can carry above-mentioned Data Identification, and above-mentioned Data Identification is determined for be obtained Target data, for example can be data number, data name etc., can also be the data date of formation, that is, indicate to need to obtain Target data be the data generated within the data date of formation.
Part of nodes in the intelligent contract and alliance's chain of alliance's chain can be stored with Data Identification and target data Corresponding relationship.Above-mentioned authorization requests are mainly used for user and know the data information that the node identities of request authorization and needs obtain Deng the authorization requests can also carry the identity information of above-mentioned first node, first node identity be known convenient for authorized party, to sentence It is disconnected whether to give first node authorization.
User terminal can be chosen whether authorization first node after receiving above-mentioned authorization requests by authorized party user This data acquisition, however, it is determined that authorization, can to above-mentioned first node send confirmation instruction, then can execute step 102;If It does not authorize, refusal instruction can be sent to above-mentioned first node, then first node not can be carried out data acquisition.
202, receive from above-mentioned user terminal when being instructed to the confirmations of above-mentioned authorization requests, from above-mentioned alliance's chain Main chain in obtain above-mentioned first information abstract.
It can store above-mentioned first information abstract in alliance's chain main chain, specifically can store in main chain node or work For in the main chain server of data sharing platform.Above-mentioned authorization is asked from above-mentioned user terminal if above-mentioned first node is received The confirmation instruction asked, represents the data acquisition that the first node is agreed to as the user of authorized party, then first node can be with information It is instructed in response to above-mentioned confirmation, the corresponding first information abstract of above-mentioned Data Identification, Zhi Houke is obtained in the main chain of alliance's chain To execute step 203.
203, the data source node of the corresponding target data of above-mentioned Data Identification is determined according to above-mentioned data origin information, Above-mentioned data source node into the main chain of alliance's chain sends data acquisition request, and above-mentioned data acquisition request carries above-mentioned number According to mark.
Optionally, before above-mentioned steps 203, this method further include:
The node type for obtaining above-mentioned data source node obtains the corresponding mesh of node type of above-mentioned data source node Mark data acquisition rule;
Rule is obtained according to above-mentioned target data and generates Target Acquisition request, and above-mentioned Target Acquisition request includes above-mentioned target Information to be verified as defined in data acquisition rule, above-mentioned information to be verified is for above-mentioned data source node to above-mentioned first node It is verified;
The above-mentioned above-mentioned data source node into the main chain of alliance's chain sends data acquisition request
Above-mentioned Target Acquisition request is sent to above-mentioned data source node.
It can store above-mentioned data acquisition rule and node type in above-mentioned first node and closed with the corresponding of rule is obtained System, after the node type for getting above-mentioned data source node, can determine in the data acquisition rule of above-mentioned storage And it obtains the corresponding target data of the node type and obtains rule.Such as the target data obtain rule specifically can specify that it is above-mentioned The data acquisition of destination node needs which condition, mainly the first node identity of verifying initiation data acquisition request.
The requirement that above-mentioned first node can obtain rule according to above-mentioned target data, which generates above-mentioned Target Acquisition, requests, then Above-mentioned target data acquisition request is sent to above-mentioned data source node, to provide the proof of identification needed, is come convenient for the data Source node is judged, it is determined whether shared data, if the confirmation of above-mentioned data source node can after sharing above-mentioned target data To send above-mentioned target data to first node, then execute step 204.
In a kind of optional embodiment, the target data that first node can obtain above-mentioned determination obtains testing in rule Label is demonstrate,proved, obtains the corresponding target identity information of above-mentioned verifying label, it includes above-mentioned target that Xiang Shangshu data source node, which is sent, The data acquisition request of identity information.
Specifically, above-mentioned target data, which obtains in rule, may include verifying label, i.e., these verifying labels can indicate Some Verification Projects when the authentication of the data source node requirements, then first node can be true by above-mentioned verifying label Fixed corresponding Verification Project obtains corresponding target identity information and (for example needs key, digital signature or credit grade up to upper Limit), above-mentioned target identity information is provided when sending above-mentioned data acquisition request, is obtained convenient for the data source node according to data It takes rule to be verified, improves the safety in data sharing.
Wherein, above-mentioned steps 202 and this step 203 can also be respectively with reference to the steps 101 and step in embodiment illustrated in fig. 1 Specific descriptions in rapid 102, details are not described herein again.
204, the target data from above-mentioned data source node is received, the data analysis node in Xiang Shangshu side chain is sent Data analysis request comprising above-mentioned target data, above-mentioned data analysis request are used to indicate above-mentioned data analysis node to above-mentioned Target data is analyzed.
Since alliance's chain can provide big data analysis interface, first node can also request to divide target data Analysis.The side chain node for executing data analysis function, i.e., above-mentioned side chain can be set in side chain belonging to the first node In data analysis node.First node can send the data comprising above-mentioned target data to above-mentioned data analysis node and analyze Request, analyzes above-mentioned data analysis node to above-mentioned target data, above-mentioned data analysis node can be according to present count According to parser carry out data analysis, obtain the analysis of target data as a result, and to first node send, step can be executed later Rapid 205.
Wherein, Various types of data can be integrated into different types of reference report template by above-mentioned data analysis node, by Enterprise's node independently selects.Collage-credit data analysis is done by side chain, can be generated and be different from making by oneself for traditional people's row reference report Adopted reference report, selection are flexible.
It optionally, can be in the autonomous additions and deletions side chain node of first node.All kinds of mechanisms add side chain node and main chain node Separation does not influence main chain business, i.e. Added Business scene only needs newly-increased side chain (node).
It is further alternative, if special joint can also be arranged in main chain not by the way of above-mentioned additions and deletions side chain.Because of connection Alliance's chain network supports the characteristic of multichannel, independent channel is arranged, certain nodes having permission is made to carry out small-scale cluster, He can not interact node herein.The special joint in main chain can be set by above-mentioned data analysis node, the node Allow first node send target data come carry out data analysis and provide analysis as a result, the interaction between two nodes be secrecy, Oneself transmission rule and/or encryption rule can be set in the transaction that can be understood as the cluster internal, and analysis result can not It broadcasts again.Also security strategy can be set, by side chain processing result safe transmission to main chain.
205, it receives from above-mentioned data analysis node to the analysis result of above-mentioned target data.
First node can store in the local database after receiving the above-mentioned analysis result to target data, can To be checked and be shared.
In a kind of optional embodiment, this method further include:
The second informative abstract is generated according to the analysis result of above-mentioned target data, above-mentioned second informative abstract includes above-mentioned number According to the Data Identification of analysis node and the analysis result of above-mentioned target data;
Above-mentioned second informative abstract is sent to the main chain node of above-mentioned alliance's chain.
First node can also generate the second informative abstract, to share the analysis knot of target data to other main chain nodes Fruit.Specifically, above-mentioned second informative abstract may include the analysis result of above-mentioned first node address and above-mentioned target data Data Identification, by above-mentioned second informative abstract, other main chain nodes are available to arrive the first node address, to the first segment The analysis result of the point request target data.
By hashed in all data transmission procedures, and while broadcasting, only transmits informative abstract, can't be by Decrypt private data.Each node data is there is also in respective database, in entire alliance's chain network, the reference base of bottom The phenomenon that plinth data are not in, will not be stolen.
Data processing method of the side chain based on above-mentioned alliance's chain in conjunction with main chain, and light weight more more efficient than simple main chain Change.And opening and closing principle is followed, plug is strong, convenient for increasing or shutting down business newly, and is directed to collage-credit data, can be based on side The customized reference report template of chain node, possesses publicity and privacy.
The main chain of alliance's chain of the embodiment of the present application can ((Hyperledger) Project Technical be realized based on super account book. Super account book is the open source projects for being intended to push the inter-trade application of block chain.It provides a modular framework, frame The execution (being known as " chaincode " in Fabric project) of node, intelligent contract in structure and configurable common recognition and member Service.One Fabric network includes that companion's node (Peer nodes) executes chaincode contract, accesses account book data, back The interface of book transaction and referred to as application program.Mandator node (Orderer nodes) is responsible for ensuring the consistency of this block chain And convey the transaction endorsed to the companions in network;And MSP service, mainly as certificate authority (Certificate Authority) X.509 certificate is used to verify member identities and role for management.Based on super account book, may exist at least four classes Special joint: endorsement node, confirmation node, ordering joint, certificate node.
In the embodiment of the present application, authorization requests are sent to user terminal by first node, on above-mentioned authorization requests carry State Data Identification, first node is when receiving the confirmation to above-mentioned authorization requests from above-mentioned user terminal and instructing, from upper It states and obtains above-mentioned first information abstract in the main chain of alliance's chain, determine that above-mentioned Data Identification is corresponding according to above-mentioned data origin information Target data data source node, then above-mentioned data source node into the main chain of alliance's chain sends data acquisition and asks It asks, above-mentioned data acquisition request carries above-mentioned Data Identification, receives the target data from above-mentioned data source node later, i.e., It is made a summary by above-mentioned target information, the node in alliance's chain can determine data source and then obtain target data, it can increase Add data acquisition source, and safety is higher, reduces the cost of data acquisition and data maintenance;It can also be into above-mentioned side chain Data analysis node send include above-mentioned target data data analysis request, above-mentioned data analysis request is used to indicate above-mentioned Data analysis node analyzes above-mentioned target data, is can receive later from above-mentioned data analysis node to above-mentioned target The analysis of data is as a result, alliance's chain main chain and side chain can be combined, based on the real big data of data sharing platform creation Analysis not only ensure that privacy, but also realize data sharing and analysis integration, and side chain is rationally arranged, can make main chain light weight Change, promotes information processing efficiency.
It is above-mentioned that mainly the scheme of the embodiment of the present application is described from the angle of method side implementation procedure.It is understood that , in order to realize the above functions, it comprises execute the corresponding hardware configuration of each function and/or software mould for electronic equipment Block.Those skilled in the art should be readily appreciated that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, the present invention can be realized with the combining form of hardware or hardware and computer software.Some function actually with Hardware or computer software drive the mode of hardware to execute, the specific application and design constraint item depending on technical solution Part.Professional technician can be to specifically realizing described function using distinct methods, but this realization is not It is considered as beyond the scope of this invention.
The embodiment of the present application can carry out the division of functional module according to above method example to electronic equipment, for example, can With each functional module of each function division of correspondence, two or more functions can also be integrated in a processing module In.Above-mentioned integrated module both can take the form of hardware realization, can also be realized in the form of software function module.It needs It is noted that be schematical, only a kind of logical function partition to the division of module in the embodiment of the present application, it is practical real It is current that there may be another division manner.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of terminal device provided by the embodiments of the present application, the terminal device 300 can be the terminal device of first node, including obtain module 310, determining module 320 and transmission module 330, in which:
The acquisition module 310 obtains first information abstract for first node, and the first information abstract includes data Mark and data origin information;
The determining module 320, for determining the corresponding number of targets of the Data Identification according to the data origin information According to data source node;The transmission module 330 sends number for the data source node into the main chain of alliance's chain According to acquisition request, the data acquisition request carries the Data Identification;
The transmission module 330 is also used to, and receives the target data from the data source node, Xiang Suoshu alliance chain Side chain node send include the target data process instruction, the process instruction be used to indicate the side chain node according to The data processing rule disposed on side chain handles the target data to obtain processing result;
The transmission module 330 is also used to, and receives the processing result from the side chain node.
Optionally, the acquisition module 310 is specifically used for:
In response to the acquisition instruction comprising user identifier, the user identifier corresponding first is obtained from local data base Informative abstract.
Optionally, the transmission module 330 is also used to, before the acquisition module 310 obtains first information abstract, Xiang Yong Family terminal sends authorization requests, and the authorization requests carry the Data Identification;
The acquisition module 310 is specifically used for, the transmission module 330 receive from the user terminal to institute When stating the confirmation instruction of authorization requests, the first information abstract is obtained from the main chain of alliance's chain.
Optionally, the transmission module 330 is specifically used for, and the data analysis node in Xiang Suoshu side chain is sent comprising described The data analysis request of target data, the data analysis request are used to indicate the data analysis node to the target data It is analyzed;
It receives from the data analysis node to the analysis result of the target data.
Optionally, the terminal device 300 further includes generation module 340, for the analysis knot according to the target data Fruit generates the second informative abstract, and second informative abstract includes the analysis knot of the first node address and the target data The Data Identification of fruit;
The transmission module 330 is also used to, and the main chain node of Xiang Suoshu alliance chain sends second informative abstract.
Optionally, above-mentioned acquisition module 310 is also used to, the number of the transmission module 330 into the main chain of alliance's chain Before sending data acquisition request according to source Nodes, the node type of the data source node is obtained, obtains the data The corresponding target data of the node type of source node obtains rule;
Above-mentioned generation module 340 is also used to, and is obtained rule according to the target data and is generated Target Acquisition request, the mesh Marking acquisition request includes that the target data obtains information to be verified as defined in rule, and the information to be verified is used for the data Source Nodes verify the first node;
The transmission module 330 is specifically used for, and Xiang Suoshu data source node sends the Target Acquisition request.It is optional , above-mentioned terminal device 300 further includes integrating module 350, receives for the transmission module 330 and comes from the data source section After the target data of point, the received target data and data with existing are integrated, generate target data modification information; The transmission module 330 is also used to, and the target data modification information, the target data change are broadcasted in alliance's chain Information includes the first node address.
According to the specific embodiment of the embodiment of the present application, Fig. 1 and the data processing method shown in Fig. 2 based on alliance's chain The step 101 being related to~104,201~205 modules that can be in terminal device 300 as shown in Figure 3 are performed.
By the terminal device 300 of the embodiment of the present application, terminal device 300 can obtain the first information by first node Abstract, wherein first information abstract includes Data Identification and data origin information, and determining further according to above-mentioned data origin information should The data source node of the corresponding target data of Data Identification, and then the data source node into the main chain of alliance's chain sends number According to acquisition request, wherein data acquisition request carries Data Identification;It can receive the target from the data source node later Data, and the process instruction comprising above-mentioned target data can be sent to the side chain node of alliance's chain, which is used for Indicate that the side chain node handles above-mentioned target data according to the data processing rule disposed on side chain to obtain processing result;? To receive the processing result from above-mentioned side chain node, alliance's chain main chain and side chain can be combined, pass through main chain and information The form of abstract increases data acquisition source, while convenient realizations data sharing, due to reasonable side chain setting progress data Processing, improves the efficiency of data processing.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind terminal device disclosed in the embodiment of the present application.Such as Fig. 4 institute Show, which includes processor 401 and memory 402, wherein terminal device 400 can also include bus 403, place Reason device 401 and memory 402 can be connected with each other by bus 403, and bus 403 can be Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a seed type convenient for indicating Bus.Wherein, terminal device 400 can also include input-output equipment 404, and input-output equipment 404 may include display Screen, such as liquid crystal display.Memory 402 is used to store one or more programs comprising instruction;Processor 401 is for calling Method and step some or all of is mentioned in the above-mentioned Fig. 1 and Fig. 2 embodiment of the instruction execution being stored in memory 402.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
By the terminal device 400 of the embodiment of the present application, terminal device 400 can obtain the first information by first node Abstract, wherein first information abstract includes Data Identification and data origin information, and determining further according to above-mentioned data origin information should The data source node of the corresponding target data of Data Identification, and then the data source node into the main chain of alliance's chain sends number According to acquisition request, wherein data acquisition request carries Data Identification;It can receive the target from the data source node later Data, and the process instruction comprising above-mentioned target data can be sent to the side chain node of alliance's chain, which is used for Indicate that the side chain node handles above-mentioned target data according to the data processing rule disposed on side chain to obtain processing result;? To receive the processing result from above-mentioned side chain node, alliance's chain main chain and side chain can be combined, pass through main chain and information The form of abstract increases data acquisition source, while convenient realizations data sharing, due to reasonable side chain setting progress data Processing, improves the efficiency of data processing.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of the data processing method based on alliance's chain step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.

Claims (10)

1. a kind of data processing method based on alliance's chain, which is characterized in that the described method includes:
First node obtains first information abstract, and the first information abstract includes Data Identification and data origin information;
The data source node that the corresponding target data of the Data Identification is determined according to the data origin information, to alliance's chain Main chain in the data source node send data acquisition request, the data acquisition request carries the Data Identification;
The target data from the data source node is received, it includes the target that the side chain node of Xiang Suoshu alliance chain, which is sent, The process instruction of data, the process instruction be used to indicate the side chain node according to the data processing rule disposed on side chain at The target data is managed to obtain processing result;
Receive the processing result from the side chain node.
2. the method according to claim 1, wherein first node acquisition first information abstract includes:
The first node obtains the user identifier pair in response to the acquisition instruction comprising user identifier from local data base The first information abstract answered.
3. the method according to claim 1, wherein the first node obtain the first information abstract before, institute State method further include:
The first node sends authorization requests to user terminal, and the authorization requests carry the Data Identification;
The first node obtains first information abstract
The first node receive from the user terminal when being instructed to the confirmations of the authorization requests, from described The first information abstract is obtained in the main chain of alliance's chain.
4. according to the method in claim 2 or 3, which is characterized in that described send to the side chain node of alliance's chain is wrapped Process instruction containing the target data includes:
Data analysis node into the side chain sends the data analysis request comprising the target data, the data analysis Request is used to indicate the data analysis node and analyzes the target data;
The processing result of the reception from the side chain node include:
It receives from the data analysis node to the analysis result of the target data.
5. method according to claim 1-3, which is characterized in that described receive comes from the data analysis node After the analysis result of the target data, the method also includes:
The second informative abstract is generated according to the analysis result of the target data, second informative abstract includes the first segment The Data Identification of the analysis result of dot address and the target data;
Second informative abstract is sent to the main chain node of alliance's chain.
6. according to the method described in claim 5, it is characterized in that, the data source section into the main chain of alliance's chain Before point sends data acquisition request, the method also includes:
The node type for obtaining the data source node obtains the corresponding number of targets of node type of the data source node It is regular according to obtaining;
Rule is obtained according to the target data and generates Target Acquisition request, and the Target Acquisition request includes the target data Information to be verified as defined in rule is obtained, the information to be verified carries out the first node for the data source node Verifying;
The data source node into the main chain of alliance's chain sends data acquisition request
The Target Acquisition request is sent to the data source node.
7. method according to claim 5 or 6, which is characterized in that the mesh of the reception from the data source node After marking data, the method also includes:
The received target data and data with existing are integrated, target data modification information is generated, in alliance's chain The middle broadcast target data modification information, the target data modification information includes the first node address.
8. a kind of terminal device characterized by comprising obtain module, determining module and transmission module, in which:
The acquisition module obtains first information abstract for first node, first information abstract include Data Identification and Data origin information;
The determining module, for determining the data of the corresponding target data of the Data Identification according to the data origin information Source Nodes;The transmission module sends data acquisition request for the data source node into the main chain of alliance's chain, The data acquisition request carries the Data Identification;
The transmission module is also used to, and receives the target data from the data source node, the side chain of Xiang Suoshu alliance chain Node sends the process instruction comprising the target data, and the process instruction is used to indicate the side chain node according on side chain The data processing rule of deployment handles the target data to obtain processing result;
The transmission module is also used to, and receives the processing result from the side chain node.
9. a kind of terminal device, which is characterized in that including processor, input equipment, output equipment and memory, the processing Device, input equipment, output equipment and memory are connected with each other, wherein the memory is for storing computer program, the meter Calculation machine program includes program instruction, and the processor is configured for calling described program instruction, executes claim 1-7 such as and appoints Method described in one.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor The described in any item methods of 1-7.
CN201910423015.1A 2019-05-21 2019-05-21 Data processing method, terminal device and computer storage medium based on alliance's chain Pending CN110245185A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910423015.1A CN110245185A (en) 2019-05-21 2019-05-21 Data processing method, terminal device and computer storage medium based on alliance's chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910423015.1A CN110245185A (en) 2019-05-21 2019-05-21 Data processing method, terminal device and computer storage medium based on alliance's chain

Publications (1)

Publication Number Publication Date
CN110245185A true CN110245185A (en) 2019-09-17

Family

ID=67884622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910423015.1A Pending CN110245185A (en) 2019-05-21 2019-05-21 Data processing method, terminal device and computer storage medium based on alliance's chain

Country Status (1)

Country Link
CN (1) CN110245185A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN112235360A (en) * 2020-09-26 2021-01-15 建信金融科技有限责任公司 Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium
CN112508571A (en) * 2020-12-17 2021-03-16 平安国际智慧城市科技股份有限公司 Data processing method and device based on block chain, computer equipment and storage medium
CN112540957A (en) * 2020-12-03 2021-03-23 齐鲁工业大学 File secure storage and sharing system based on mixed block chain and implementation method

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107169865A (en) * 2017-04-24 2017-09-15 北京果仁宝科技有限公司 Asset data processing system based on block chain technology
WO2018145554A1 (en) * 2017-02-08 2018-08-16 腾讯科技(深圳)有限公司 Data processing method, related device and system, and computer readable storage medium
CN108647962A (en) * 2018-04-27 2018-10-12 腾讯科技(深圳)有限公司 Credit investigation system, the storage method of collage-credit data, device, equipment and medium
CN109241087A (en) * 2018-09-27 2019-01-18 福建福链科技有限公司 A kind of data processing method and terminal of alliance's chain
CN109377319A (en) * 2018-10-30 2019-02-22 平安科技(深圳)有限公司 Purchase vehicle information processing method, device, equipment and storage medium based on alliance's chain
SG11201901760SA (en) * 2017-08-01 2019-04-29 Zhongan Information Technology Service Co Ltd Method and system for accessing out-of-chain data based on consortium block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018145554A1 (en) * 2017-02-08 2018-08-16 腾讯科技(深圳)有限公司 Data processing method, related device and system, and computer readable storage medium
CN107169865A (en) * 2017-04-24 2017-09-15 北京果仁宝科技有限公司 Asset data processing system based on block chain technology
SG11201901760SA (en) * 2017-08-01 2019-04-29 Zhongan Information Technology Service Co Ltd Method and system for accessing out-of-chain data based on consortium block chain
CN108647962A (en) * 2018-04-27 2018-10-12 腾讯科技(深圳)有限公司 Credit investigation system, the storage method of collage-credit data, device, equipment and medium
CN109241087A (en) * 2018-09-27 2019-01-18 福建福链科技有限公司 A kind of data processing method and terminal of alliance's chain
CN109377319A (en) * 2018-10-30 2019-02-22 平安科技(深圳)有限公司 Purchase vehicle information processing method, device, equipment and storage medium based on alliance's chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN111046078B (en) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 Credit investigation method and device based on block chain and electronic equipment
CN112235360A (en) * 2020-09-26 2021-01-15 建信金融科技有限责任公司 Data sharing method, device and system based on alliance chain, electronic equipment and computer readable storage medium
CN112540957A (en) * 2020-12-03 2021-03-23 齐鲁工业大学 File secure storage and sharing system based on mixed block chain and implementation method
CN112508571A (en) * 2020-12-17 2021-03-16 平安国际智慧城市科技股份有限公司 Data processing method and device based on block chain, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110210961A (en) Data capture method, server and computer storage medium based on alliance's chain
CN110245185A (en) Data processing method, terminal device and computer storage medium based on alliance's chain
CN110246017A (en) Data capture method, terminal device and computer storage medium based on alliance's chain
CN110493007A (en) A kind of Information Authentication method, apparatus, equipment and storage medium based on block chain
CN110222529A (en) Assets management method, electronic equipment and computer storage medium based on alliance's chain
CN109450910A (en) Data sharing method, data sharing network and electronic equipment based on block chain
CN109525671A (en) Date storage method, electronic equipment and storage medium based on block chain
CN110223157A (en) Data capture method, electronic equipment and computer storage medium based on alliance's chain
CN110555029A (en) ticket management method and device based on block chain and storage medium
CN105493146A (en) Devices, frameworks and methodologies for enabling user-driven determination of body size and shape information and utilisation of such information across a networked environment
CN110263025A (en) Data liquidation method, electronic equipment and computer storage medium based on alliance's chain
CN109155731A (en) The management of password transaction
CN109753815A (en) Data processing method, data processing network and electronic equipment based on block chain
CN109670974A (en) A kind of risk monitoring and control method and device, electric terminal
CN110246040A (en) Trade management method, electronic equipment and computer storage medium based on alliance's chain
CN203350880U (en) POS safety certification device and system
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN103490893A (en) Information leakage testing control method, device and system and information channel safety certification device
CN110493754A (en) A kind of SIM card resource allocation methods, system, terminal device and storage medium
CN104951968A (en) Lottery E-commerce automatic investment method and system
CN113609224A (en) Crowdsourcing operation method and system for realizing privacy protection based on block chain
CN105913343A (en) Mobile Internet service application-based service supervision system
CN109241762A (en) Assets information acquisition methods, device and computer equipment based on block chain technology
CN105227592A (en) A kind of Internet architecture and implementation method
EP3852332B1 (en) Processing request for personal data with data owner's permission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20190917

WD01 Invention patent application deemed withdrawn after publication