CN110365670A - Blacklist sharing method, device, computer equipment and storage medium - Google Patents

Blacklist sharing method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110365670A
CN110365670A CN201910610289.1A CN201910610289A CN110365670A CN 110365670 A CN110365670 A CN 110365670A CN 201910610289 A CN201910610289 A CN 201910610289A CN 110365670 A CN110365670 A CN 110365670A
Authority
CN
China
Prior art keywords
blacklist
inquiry
upload
encryption
terminal
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910610289.1A
Other languages
Chinese (zh)
Other versions
CN110365670B (en
Inventor
赖骏
刘恩科
王梦寒
高建欣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
OneConnect Smart Technology Co Ltd
Original Assignee
OneConnect Smart Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by OneConnect Smart Technology Co Ltd filed Critical OneConnect Smart Technology Co Ltd
Priority to CN201910610289.1A priority Critical patent/CN110365670B/en
Publication of CN110365670A publication Critical patent/CN110365670A/en
Priority to PCT/CN2019/122871 priority patent/WO2021003980A1/en
Application granted granted Critical
Publication of CN110365670B publication Critical patent/CN110365670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computational Linguistics (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application involves block storage region field, in particular to a kind of blacklist sharing method, device, computer equipment and storage medium.The described method includes: obtaining the blacklist acquisition request that inquiry terminal is sent, inquiry mark is carried in blacklist acquisition request, according to the access authority of inquiry identity verification inquiry terminal;When the access authority verification for inquiring terminal passes through, the corresponding first encryption blacklist of blacklist acquisition request is obtained from the block chain of storage blacklist;The corresponding upload side's information of identification the first encryption blacklist generates authority checking request according to upload side's information, and authority checking request is sent to inquiry terminal;The authorized certificate that inquiry terminal is returned according to authority checking request is received, and is decrypted to obtain inquiry blacklist according to first encryption blacklist of the authorized certificate to acquisition;Inquiry blacklist is sent to inquiry terminal.The safety circulation of the blacklist data between multiple enterprises can be effectively realized using this method.

Description

Blacklist sharing method, device, computer equipment and storage medium
Technical field
This application involves blacklist technology of sharing fields, more particularly to a kind of blacklist sharing method, device, computer Equipment and storage medium.
Background technique
The subscriber blacklist generated in financial company's transaction business is very important data, and enterprise can be helped to handle Risk profile is carried out when business and risk averse, some enterprises also can be by the subscriber blacklists of oneself and other in cooperative process Partner is shared.
The blacklist sharing method of traditional industry is usually directed to data transmission and two side of data receiver, and sender will be black List data is sent to recipient, and protecting data encryption transmission data are generallyd use in transmission process;However, being related to surpassing When blacklist between Guo Liangge enterprise is shared, since the cooperative relationship between each enterprise is complicated, the shared side of traditional blacklist Method can not effectively realize the safety circulation of the blacklist data between multiple enterprises.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of blacklist that can be effectively realized between multiple enterprises The blacklist sharing method, device, computer equipment and the storage medium that circulate safely of data.
A kind of blacklist sharing method, which comprises
The blacklist acquisition request that inquiry terminal is sent is obtained, inquiry mark is carried in the blacklist acquisition request, The access authority of terminal is inquired according to the inquiry identity verification;
When the access authority verification of the inquiry terminal passes through, the black name is obtained from the block chain of storage blacklist Single acquisition request corresponding first encrypts blacklist;
It identifies the corresponding upload side's information of the first encryption blacklist, authority checking is generated according to upload side's information Request, and authority checking request is sent to the inquiry terminal;
The authorized certificate that the inquiry terminal is returned according to authority checking request is received, and according to the authorized certificate First encryption blacklist of the acquisition is decrypted to obtain inquiry blacklist;
The inquiry blacklist is sent to the inquiry terminal.
In one of the embodiments, the method also includes:
The blacklist upload request that transmission terminal is sent in reception carries upload mark in the blacklist upload request;
According to the upload permissions of upper transmission terminal described in the upload identity verification;
When the upload permissions of the upper transmission terminal are verified, the shared blacklist that the upper transmission terminal is sent is received;
The second encryption blacklist will be obtained after the shared blacklist encryption, and the second encryption blacklist is stored in On block chain.
It is described in one of the embodiments, to obtain the second encryption blacklist after the shared blacklist encryption, and will The second encryption blacklist is stored on block chain, comprising:
Identify the first user information and the corresponding promise breaking data of first user information in the shared blacklist;
The first user mark is generated according to first user information;
Second encryption blacklist is generated to the promise breaking data encryption, and the second encryption blacklist is stored in block In first block of chain, wherein position of first block in the block chain is expressed as the first label;
Established inquiry list is obtained, first user is indicated and is looked into described in be saved in corresponding with first label It askes in list.
Second user mark is carried in the blacklist acquisition request in one of the embodiments, then it is described from depositing It stores up and obtains the corresponding first encryption blacklist of the blacklist acquisition request in the block chain of blacklist, comprising:
The inquiry list is obtained, the second user is inquired from the inquiry list and indicates corresponding second label;
The corresponding block of second label is positioned from the block chain, obtains and is deposited on the corresponding block of second label The corresponding first encryption blacklist of the second user mark of storage.
It is described in one of the embodiments, that the inquiry blacklist is sent to after the inquiry terminal, further includes:
Receive and record the report information of return of the inquiry terminal according to the inquiry blacklist;
The inquiry blacklist is detected according to the report information;
When detecting the inquiry blacklist mistake, the corresponding upload power for uploading mark of the inquiry blacklist is limited Limit.
It is described in one of the embodiments, that the inquiry blacklist is sent to after the inquiry terminal, further includes:
It receives the inquiry terminal and request is updated according to the blacklist that the blacklist data is sent, the blacklist updates It include more new data in request;
The more new data is saved in the block chain.
A kind of blacklist sharing means, described device include:
Access authority verification module, the blacklist acquisition request sent for obtaining inquiry terminal, the blacklist obtain Inquiry mark is carried in request, and the access authority of terminal is inquired according to the inquiry identity verification;
Data acquisition module, for when it is described inquiry terminal access authority verification pass through when, from storage blacklist area The corresponding first encryption blacklist of the blacklist acquisition request is obtained in block chain;
Business licenses module is uploaded, for identification the corresponding upload side's information of the first encryption blacklist, according to described Upload side's information generates authority checking request, and authority checking request is sent to the inquiry terminal;
Data decryption module, the authorized certificate returned for receiving the inquiry terminal according to authority checking request, And it is decrypted to obtain inquiry blacklist according to first encryption blacklist of the authorized certificate to the acquisition;
Data return module, for the inquiry blacklist to be sent to the inquiry terminal.
Described device in one of the embodiments, further include:
Upload request receiving module, the blacklist upload request sent for receiving upper transmission terminal, the blacklist upload Upload mark is carried in request;
Upload permissions authentication module, the upload permissions for the upper transmission terminal according to the upload identity verification;
Data reception module, for receiving the upper transmission terminal when the upload permissions of the upper transmission terminal are verified The shared blacklist sent;
Data memory module, for that will obtain the second encryption blacklist after the shared blacklist encryption, and by described the Two encryption blacklists are stored on block chain.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes any of the above-described the method when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of method described in any of the above embodiments is realized when row.
Above-mentioned blacklist sharing method, device, computer equipment and storage medium establish the multiple cooperative enterprises of storage Blacklist block chain, when there is cooperative enterprise to want to download from block chain the blacklist of other enterprises upload, by looking into It askes terminal and sends blacklist acquisition request to the block end of the chain, the cooperative enterprise for lifting blacklist acquisition request can be used as issuer, Whether server elder generation revene lookup terminal has the permission of access block chain, if so, whether then inquire in block chain has issuer to wait for The the first encryption blacklist obtained, and examine whether issuer obtains the authorization of this blacklist upload side, when obtaining authorization, then Server obtains the first encryption blacklist from block chain, and decrypts to obtain inquiry blacklist to it, and inquiry blacklist is sent To inquiry terminal, the blacklist for completing this obtains operation;The above method manages what multiple cooperative enterprises provided by block chain Blacklist avoids being tampered before blacklist is obtained by other cooperative enterprises, and cooperative enterprise is only allowed to obtain blacklist When the authorization of upload side, the blacklist that upload side uploads could be obtained, the blacklist safety between multiple enterprises can be effectively realized Circulation.
Detailed description of the invention
Fig. 1 is the application scenario diagram of blacklist sharing method in one embodiment;
Fig. 2 is the flow diagram of blacklist sharing method in one embodiment;
Fig. 3 is the flow diagram that blacklist enters chain step in one embodiment;
Fig. 4 is the flow diagram of step S308 in one embodiment;
Fig. 5 is the structural block diagram of blacklist sharing means in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Blacklist sharing method provided by the embodiments of the present application, can be applied in application environment as shown in Figure 1.Its In, terminal 102 is communicated with the server 104 of block chain link by network by network.When issuer needs interrogation zone When the blacklist data that the cooperative enterprise stored on block chain is shared, sent by terminal 102 to the server 104 of connection block chain Blacklist acquisition request, server 104 verifies the access authority of terminal 102, after Authority Verification passes through, if being stored on block chain The blacklist data to be obtained of terminal 102, then the upload side's authorization terminal 102 for obtaining this blacklist data obtain blacklist data Authorized certificate, blacklist data is decrypted, and returns to terminal 102.Wherein, terminal 102 can be, but not limited to be various individuals Computer, laptop, smart phone, tablet computer and portable wearable device, server 104 can use independent clothes The server cluster of business device either multiple servers composition is realized.
In one embodiment, as shown in Fig. 2, providing a kind of blacklist sharing method, it is applied in Fig. 1 in this way Server 104 for be illustrated, comprising the following steps:
S202 obtains the blacklist acquisition request that inquiry terminal is sent, inquiry mark is carried in blacklist acquisition request, According to the access authority of inquiry identity verification inquiry terminal.
Wherein, inquiry terminal refers to the blacklist data function of being capable of providing and obtain on block chain, and is suitable for enterprise The terminal of the issuer of the blacklist of terminal, i.e. block chain storage can be, but not limited to be various personal computers, notebook electricity Brain, smart phone, tablet computer and portable wearable device.
Blacklist acquisition request is the black name of acquisition inquiring terminal and initiating to the server or the block end of the chain of connection block chain Single request.Server or the block end of the chain can provide an application program for access, inquiry terminal installation to inquiry terminal After this application program, the information that the query interface provided by this application program receives user's input generates blacklist acquisition and asks It asks, which can be for browser or using App or small routine or lightweight application program etc..Inquire the available user of terminal In the username and password of login interface input, and the username and password of input is uploaded onto the server or the block end of the chain is tested Card after being verified, inquires terminal from login interface and switches into query interface.The username and password be registration when user with The block end of the chain passes through block chain after signing an agreement or server authenticates the username and password passed through.It inquires terminal and obtains user The relevant information of the need inquiry inputted on query interface, as needed to inquire an enterprise or whether organized in its cooperative enterprise In blacklist, then full name, number of registration of enterprise etc. are provided as relevant information;Whether such as need to inquire someone in its cooperation enterprise In the blacklist of industry, then name, identification card number, phone number of this person etc. are provided as relevant information, instruction inquiry terminal will The relevant information inputted on interface generates blacklist acquisition request.
Inquiry mark is the proof that whether inquiry terminal has the permission for obtaining the blacklist stored on block chain for identification, After the corresponding user of inquiry terminal and block chain provider sign cooperation agreement, block chain provider can distribute inquiry mark and supply The blacklist shared on this accessed enterprise block chain;Inquiry mark can be the word of occupancy fixed byte in blacklist acquisition request Symbol string, or other can recognize form.
Specifically, whether it includes certain enterprise, tissue or individual in block chain cooperation that issuer needs to inquire in block chain With the presence or absence of promise breaking record in enterprise, blacklist acquisition request can be sent to server, include to be used in blacklist acquisition request Whether identification inquiry terminal has the inquiry mark for accessing the permission of data on block chain, and server is whole to inquiry according to inquiry mark The access authority at end is verified.
S204 obtains blacklist from the block chain of storage blacklist when the access authority verification for inquiring terminal passes through The corresponding first encryption blacklist of acquisition request.
Wherein, the first encryption blacklist is issuer's encrypted data of blacklist this time to be obtained, stores blacklist Block chain be it is a kind of sequentially in time or data block is combined by other setting logical orders in such a way that sequence is connected A kind of linked data structure, and the distributed account book that can not be distorted He can not forge guaranteed in a manner of cryptography, due to area Block chain can not distort characteristic, it is ensured that the blacklist data being stored on chain is true and safe.Data ciphering method on chain It can be and cryptographic Hash is obtained to the data encryption of block each on chain, and the cryptographic Hash of each block passes through Merkel tree (one kind two Fork tree conduction management method) it is managed, block chain data ciphering method is not limited to above-mentioned cryptographic Hash, can also be used common Encryption Algorithm.
Specifically, if access authority verification success of the server to inquiry terminal, allows to inquire terminal inquiry block chain The shared blacklist of other upper enterprises, server can inquire corresponding blacklist number according to blacklist acquisition request on block chain According to;If access authority verification fails, do not allow to inquire terminal access block chain.In addition, when access authority verification failure, clothes Business device can return to error message to inquiry terminal, inform the reason of inquiry terminal this visit fails, so that inquiry terminal obtains Obtain corresponding data after access authority from block chain again.
S206, the corresponding upload side's information of identification the first encryption blacklist, generates authority checking according to upload side's information and asks It asks, and authority checking request is sent to inquiry terminal.
Wherein, blacklist upload side of the authority checking request for making issuer provide the first encryption blacklist allows to inquire Terminal obtains the request of its shared blacklist, can be the forms such as the information of inquiry terminal interface identification or mail.
Specifically, inquired on block chain when server blacklist acquisition request it is corresponding first encryption blacklist after, Whether the upload side for also needing to verify this blacklist authorizes issuer, and server generates authority checking request, is sent to inquiry Terminal, so that inquiry terminal provides authorisation verification.
S208 receives the authorized certificate that inquiry terminal is returned according to authority checking request, and according to authorized certificate to acquisition The first encryption blacklist be decrypted to obtain inquiry blacklist.
Specifically, after inquiry terminal receives authority checking request, the blacklist of above-mentioned first encryption blacklist is uploaded The authorized certificate of side is back to server, and server passes through authorized certificate audit, that is, allows to inquire terminal and obtain the first encryption The corresponding blacklist of blacklist, server are decrypted to obtain to the first encryption blacklist using the decipherment algorithm opposite with Encryption Algorithm Inquire blacklist.
Inquiry blacklist is sent to inquiry terminal by S210.
Specifically, inquiry blacklist is sent to inquiry after by obtaining inquiry blacklist in step S208 by server Terminal completes the operation that inquiry terminal this time obtains blacklist from block chain.
Optionally, inquiry terminal obtain blacklist data after, can according in blacklist data therein associated user disobey About record the risk to judge corresponding enterprise or individual.That is inquiry terminal can be according to own service to one step of carry out on blacklist Analysis, it is (refund of the client on the such blacklist overdue time, overdue to the promise breaking information of the user reflected on blacklist data Amount of money etc.), the risk class of user is set, determines the risk of the user on this blacklist data.Also it is uploaded in combination with blacklist Side confidence level come the confidence level of its blacklist data is judged (think if bank is in the blacklist side of uploading its upload The confidence level of blacklist data is higher, and if individual financial institution, then confidence level is lower).
Above-mentioned blacklist sharing method establishes the block chain of the blacklist of the multiple cooperative enterprises of storage, when there is cooperation When enterprise wants to download the blacklist of other enterprises upload from block chain, blacklist is sent to the block end of the chain by inquiry terminal Acquisition request, the cooperative enterprise for lifting blacklist acquisition request can be used as issuer, and whether server elder generation revene lookup terminal has The permission of block chain is accessed, if so, the first encryption blacklist for whether having issuer to be obtained then inquired in block chain, and is examined Whether issuer obtains the authorization of this blacklist upload side, and when obtaining authorization, then server obtains first from block chain and adds Close blacklist, and it is decrypted to obtain inquiry blacklist, inquiry blacklist is sent to inquiry terminal, completes this blacklist Obtain operation;The above method manages the blacklist that multiple cooperative enterprises provide by block chain, avoids being closed in blacklist by other Make to be tampered before enterprise obtains, and only allow cooperative enterprise when obtaining the authorization of blacklist upload side, upload could be obtained The blacklist of Fang Shangchuan, the blacklist that can be effectively realized between multiple enterprises circulate safely.
In one embodiment, Fig. 3 is referred to, above-mentioned blacklist sharing method can also include that blacklist enters chain step, It specifically includes:
S302, the blacklist upload request that transmission terminal is sent in reception carry upload mark in blacklist upload request.
Wherein, upper transmission terminal is the terminal for needing to upload the cooperative enterprise of data to block chain, i.e., the storage of block chain is black The terminal of the upload side of list can be, but not limited to be various personal computers, laptop, smart phone, tablet computer With portable wearable device.
Blacklist upload request is that the server or the block end of the chain of upper transmission terminal to connection block chain are black by sharing for local List storage can be the request that user lifts at the interface that the technical staff that block chain is developed provides to the request on block chain Message.
Uploading mark is the proof that whether upper transmission terminal has the permission that data are uploaded to block chain for identification, at end last time After holding corresponding cooperative enterprise and block chain provider to sign cooperation agreement, block chain provider can distribute upload mark for this enterprise Industry uploads data to block chain;Uploading mark can be character string that fixed byte is occupied in blacklist acquisition request, can also be with It can recognize form for other.
Specifically, when upload side needs to upload blacklist to block chain, the request of blacklist last time can be sent to server, it is black Whether there is the upload mark for the permission that data are uploaded to block chain in list upload request comprising upper transmission terminal for identification.
S304, according to the upload permissions for uploading transmission terminal on identity verification.
Specifically, server tests upper transmission terminal to the upload permissions that block chain uploads data according to upload mark Card.
S306, when the upload permissions of upper transmission terminal are verified, the shared blacklist of transmission terminal transmission in reception.
Wherein, shared blacklist is that upload side wanted last time to store into block chain, shares for the partner that upload side authorizes Blacklist data, it may include the contents such as relevant information, transaction record of blacklist enterprise and blacklist individual.
Specifically, if server is verified upper transmission terminal to the upload permissions that block chain uploads data, from upper Transmission terminal obtains its shared blacklist that be stored on block chain.
S308 will obtain the second encryption blacklist, and the second encryption blacklist be stored in area after the encryption of shared blacklist On block chain.
Wherein, the second encryption blacklist is the shared encrypted data of blacklist, cipher mode and the first black name of encryption Single cipher mode is consistent, all the format to save data on block chain.
Specifically, the encryption of shared blacklist is generated the second encryption blacklist before shared blacklist cochain by server It is saved on block chain, the data for completing this enter chain operation.
In above-described embodiment, the blacklist data shared in block chain is that upload side by upper transmission terminal is sent to server , server needs first to carry out upload permissions verifying to upper transmission terminal before data enter chain.
In one embodiment, refer to Fig. 4, in the step S308 in above-described embodiment will shared blacklist encryption after The second encryption blacklist is obtained, and the second encryption blacklist is stored on block chain, can specifically include:,
S402 identifies the first user information and the corresponding promise breaking data of the first user information in shared blacklist.
Wherein, the first user information is the information for the promise breaking user that shared blacklist includes, and promise breaking user here can be with It is promise breaking enterprise or individual;If the first user information may include user account information, subscriber identity information, user's communication information Etc., subscriber identity information may include identification number, name, driver's license information etc., user's communication information may include phone number, Instant communication number, E-mail address etc..Then the corresponding promise breaking data of the first user information are promise breaking enterprise or individual in upload side Promise breaking historical record in process of exchange can be promise breaking enterprise or the personal overdue refund note when buying credit class product Record is also possible to non-performing loan record of enterprise etc., this promise breaking information can be collected according to the type of service of upload side.
Specifically, the shared blacklist that upload side uploads includes two parts content: the first user information and the first user letter Cease corresponding promise breaking data.Server needs first to extract this two-part after getting the shared blacklist that upload side uploads Content, extracting method may include: to identify keyword relevant to the first user information or promise breaking data in shared blacklist, The information of shared blacklist is divided into the first user information and the corresponding promise breaking data of the first user information, for example, black when sharing List is an electrical form (such as Excel), the title comprising promise breaking enterprise and number of registration and each promise breaking enterprise in table Funds on account overdue time, amount owed etc., the title of settable enterprise, the key that the number of registration of enterprise is the first user information Word, enterprise's funds on account overdue time, amount owed are the keyword of promise breaking data, when server identifies these keywords, The information of shared blacklist is divided into the first user information and the corresponding promise breaking data of the first user information.Upload side uploads it Before, it can carry out individually building table according to the storage format of block chain, server is facilitated to identify above-mentioned two parts content.
S404 generates the first user mark according to the first user information.
Wherein, the first user mark is the mark for the promise breaking data of the first user of inquiry storage on block chain, can To be a string for distinguishing the character strings of different user, such as the number of registration to promise breaking enterprise or personal name, identification card number, The encrypted characters string that the encryption of the information such as phone generates.
Specifically, block chain is quickly traversed for convenience of subsequent query side and carries out data query, by the way of user's mark The promise breaking information of the user stored on management block chain.Server needs before saving the data in block chain first will be to be saved User information generate the identifiable user's mark of unique and server, include first using in the shared blacklist uploaded such as this The promise breaking at family records, then generates the first user mark according to the first user information.
S406 generates the second encryption blacklist to promise breaking data encryption, and the second encryption blacklist is stored in block chain The first block in, wherein position of first block in block chain is expressed as the first label.
Wherein, the first block is the block for being used to save the shared blacklist that upload side uploads on block chain, block chain Technical staff can set data upload rule and be managed to the data of upload.Such as area can be successively created sequentially in time The shared blacklist that block storage upload side uploads, can also be managed according to the information of upload side.And technical staff is block Each block on chain establishes label, and the label of the first block can be expressed as the first label.
Specifically, server again carries out the corresponding promise breaking data of the first user information in shared blacklist to be uploaded Encryption is saved it in and is uploaded in the first block that rule obtains according to the data set, and store method is general block The method of chain storing data such as generates the Hash of this block according to the data stored in the cryptographic Hash of a upper block and this block Value.
S408 obtains established inquiry list, by the first user mark it is corresponding with the first label be saved in it is established It inquires in list.
Wherein, inquiry list be for convenience of on block chain inquire data establish management list, wherein should comprising with Mapping relations between the corresponding user's mark of family information and the label of block corresponding with data storage area block.Specifically, when When having new data to enter chain on block chain, server indicates corresponding first user of the first user information newly entered in chain data Corresponding first label of block of data is corresponding is saved in established inquiry for promise breaking corresponding with the first user information of storage In list.
In above-described embodiment, describes block chain and obtaining new preservation process when entering chain data, indicated by user It manages the promise breaking user information stored in chain and improves inquiry velocity, and guarantee the safety of data.
In one embodiment, second user mark is carried in blacklist acquisition request, then from the area of storage blacklist The corresponding first encryption blacklist of blacklist acquisition request is obtained in block chain, comprising: obtain inquiry list, look into from inquiry list It askes second user and indicates corresponding second label;The corresponding block of the second label is positioned from block chain, it is corresponding to obtain the second label Block on store second user mark it is corresponding first encryption blacklist.
Wherein, second user mark is the user's mark for the user information that this issuer needs to inquire, format and the One user mark is consistent, can be a string for distinguishing the character string of different user, such as number of registration to promise breaking enterprise or a The encrypted characters string that the encryption of the information such as name, identification card number, the phone of people generates.
Second label is that server inquires second user and indicates the corresponding block that stores on block chain of promise breaking data Label, format is identical as the first label.
Specifically, the process that server obtains corresponding data according to the blacklist acquisition request of issuer from block chain can To be the second label for finding storing data from inquiry list according to the second user mark in blacklist acquisition request Then block navigates to this block in block chain, obtain data from this block, carries out subsequent decrypting process.
In above-described embodiment, according to the storage method of blacklist data in block chain, server is described in detail according to black The step of user's mark in list acquisition request obtains corresponding promise breaking data from block chain.
In one embodiment, inquiry blacklist being sent to after inquiry terminal in above-mentioned steps S210, can be with Include: receive and record queries terminal according to inquiry blacklist return report information;According to report information to the black name of inquiry Singly detected;When detecting inquiry blacklist mistake, the upload permissions that the corresponding upload side of blacklist identifies are inquired in limitation.
Specifically, report information is after inquiring the blacklist that terminal obtains on block chain, it is found that this blacklist presence is not true Real information or dangerous information such as wooden horse etc., the requirement server sent to server end detect the safety of blacklist upload side Information;It can be the software interactive data etc. generated according to the information that the user of inquiry terminal inputs on interface.Server After the report information for receiving inquiry terminal feedback, inquiry blacklist corresponding to report information is needed to detect, if detection Be true, i.e. blacklist mistake to the case where inquiry terminal feedback information reflection, the upload that can limit this blacklist upload side is weighed Limit does not allow its access then, generates a visit that is, when detecting the inquiry corresponding upload side's identification access block chain of blacklist Ask that error message sends so far upload side and identifies corresponding terminal, so that the side of upload is identified corresponding user's offer proves to solve the visit Ask limited case.
Optionally, server can be according to the method that report information detects inquiry blacklist, and server is to institute There is the report information of inquiry terminal feedback to be recorded, when accumulation reflects what same upload side uploaded beyond default inquiry terminal Blacklist there are when untrue information or dangerous information, limit this blacklist upload side access block chain permission.
In above-described embodiment, the accuracy of the data uploaded on block chain is monitored by cooperation member.
In one embodiment, inquiry blacklist being sent to after inquiry terminal in above-mentioned steps S210, can be with It include: to receive inquiry terminal to update request according to the blacklist that blacklist data is sent, blacklist updates in request comprising updating Data;More new data is saved in block chain.
Wherein, it is inquiry terminal after receiving blacklist data that blacklist, which updates request, inquires enterprise's discovery of terminal New promise breaking row has occurred in this enterprise by the blacklist data inaccuracy of acquisition or the enterprise in blacklist data or individual For the data that can then update these update the request that request is uploaded on block chain by blacklist, can be according to inquiry The forms such as the software interactive data that the information that the user of terminal inputs on interface generates.
Specifically, inquiry terminal can lift black after downloading blacklist data in block chain according to this blacklist data List updates request, and the blacklist updated can carry out editing a upload, block chain according to the format of the blacklist data of downloading After receiving more new data, i.e., this is updated according to the process flow for receiving new blacklist upload request in above-described embodiment Data are saved, and upload side at this time is inquiry terminal, and the blacklist without being stored on block chain to original is distorted, Server can be updated according to blacklist requests, and establishes the connection between the blacklist data for updating front and back, it is convenient after inquiry. Therefore the blacklist record of same enterprise or individual on issuer's inquiry block chain may inquire multiple blacklist datas, That is this enterprise or the personal promise breaking information in different upload enterprises, issuer can need to obtain according to the business of oneself to be corresponded to The authorization of upload side obtains suitable blacklist data from block chain.
In above-described embodiment, allows issuer to lift blacklist according to the blacklist data of acquisition and update request, to block Stored blacklist is updated in chain, but this updates step and will not distort to stored blacklist data.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of blacklist sharing means, comprising: access authority verification mould Block 100, uploads business licenses module 300, data decryption module 400 and data return module 500 at data acquisition module 200, In:
Access authority verification module 100, the blacklist acquisition request sent for obtaining inquiry terminal, blacklist acquisition are asked Inquiry mark is carried in asking, according to the access authority of inquiry identity verification inquiry terminal.
Data acquisition module 200, for when inquire terminal access authority verification pass through when, from storage blacklist block The corresponding first encryption blacklist of blacklist acquisition request is obtained in chain.
Business licenses module 300 is uploaded, for identification the corresponding upload side's information of the first encryption blacklist, according to upload side Information generates authority checking request, and authority checking request is sent to inquiry terminal.
Data decryption module 400, the authorized certificate returned for receiving inquiry terminal according to authority checking request, and according to Authorized certificate is decrypted to obtain inquiry blacklist to the first encryption blacklist of acquisition.
Data return module 500 is sent to inquiry terminal for that will inquire blacklist.
In one embodiment, above-mentioned blacklist sharing means can also include:
Upload request receiving module, the blacklist upload request sent for receiving upper transmission terminal, blacklist upload request In carry upload mark.
Upload permissions authentication module, for according to the upload permissions for uploading transmission terminal on identity verification.
Data reception module, for when the upload permissions of upper transmission terminal are verified, what transmission terminal was sent in reception to be total to Enjoy blacklist.
Data memory module, for the second encryption blacklist will to be obtained after the encryption of shared blacklist, and the second encryption is black List is stored on block chain.
In one embodiment, the data memory module in above-mentioned blacklist sharing means may include:
Data segmentation unit, the first user information in shared blacklist and the first user information are corresponding separated for identification About data.
User indicates generation unit, for generating the first user mark according to the first user information.
Block storage unit for generating the second encryption blacklist to promise breaking data encryption, and encrypts blacklist for second It is stored in the first block of block chain, wherein position of first block in block chain is expressed as the first label.
List update unit, for obtaining established inquiry list, by the first user mark guarantor corresponding with the first label It is stored in established inquiry list.
In one embodiment, the data acquisition module 200 of above-mentioned blacklist sharing means may include:
Data positioning unit on chain, for obtaining inquiry list, inquiry second user mark is corresponding from inquiry list Second label.
Data query unit obtains the corresponding area of the second label for positioning the corresponding block of the second label from block chain The corresponding first encryption blacklist of the second user mark stored on block.
In one embodiment, above-mentioned blacklist sharing means can also include:
Report information receiving module, for receive and record queries terminal according to inquiry blacklist return offence reporting letter Breath.
Detection module, for being detected according to report information to inquiry blacklist.
Permission limits module, for when detecting inquiry blacklist mistake, the corresponding upload side of blacklist to be inquired in limitation The upload permissions of mark.
In one embodiment, above-mentioned blacklist sharing means can also include:
Data reception module is updated, request is updated according to the blacklist that blacklist data is sent for receiving inquiry terminal, It includes more new data in request that blacklist, which updates,.
Data storage module is updated, for more new data to be saved in block chain.
Specific about blacklist sharing means limits the restriction that may refer to above for blacklist sharing method, This is repeated no more.Modules in above-mentioned blacklist sharing means can come fully or partially through software, hardware and combinations thereof It realizes.Above-mentioned each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also be with software Form is stored in the memory in computer equipment, executes the corresponding operation of the above modules in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for storing blacklist shared data.The network interface of the computer equipment is used for logical with external terminal Cross network connection communication.To realize a kind of blacklist sharing method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, which performs the steps of when executing computer program obtains the blacklist acquisition that inquiry terminal is sent It requests, inquiry mark is carried in blacklist acquisition request, according to the access authority of inquiry identity verification inquiry terminal;Work as inquiry When the access authority verification of terminal passes through, blacklist acquisition request corresponding first is obtained from the block chain of storage blacklist and is added Close blacklist;The corresponding upload side's information of identification the first encryption blacklist generates authority checking request according to upload side's information, and Authority checking request is sent to inquiry terminal;Receive the authorized certificate that inquiry terminal is returned according to authority checking request, and root It is decrypted to obtain inquiry blacklist according to first encryption blacklist of the authorized certificate to acquisition;Inquiry blacklist is sent to inquiry Terminal.
In one embodiment, reception upper transmission terminal is also performed the steps of when processor executes computer program to send Blacklist upload request, upload mark is carried in blacklist upload request;According to upload identity verification on transmission terminal it is upper Pass permission;When the upload permissions of upper transmission terminal are verified, the shared blacklist of transmission terminal transmission in reception;Black name will be shared The second encryption blacklist is obtained after single encryption, and the second encryption blacklist is stored on block chain.
In one embodiment, that realizes when processor execution computer program will obtain second after the encryption of shared blacklist Blacklist is encrypted, and the second encryption blacklist is stored on block chain, comprising: identifies the first user letter in shared blacklist Cease promise breaking data corresponding with the first user information;The first user mark is generated according to the first user information;Promise breaking data are added It is dense to be stored in the first block of block chain at the second encryption blacklist, and by the second encryption blacklist, wherein the first block Position in block chain is expressed as the first label;Established inquiry list is obtained, by the first user mark and the first label Correspondence is saved in established inquiry list.
In one embodiment, processor executes in the blacklist acquisition request realized when computer program and carries second User's mark, then processor executes the blacklist acquisition that obtains from the block chain of storage blacklist realized when computer program and asks Seek corresponding first encryption blacklist, comprising: obtain inquiry list, the inquiry second user mark corresponding the from inquiry list Two labels;The corresponding block of the second label is positioned from block chain, obtains the second user stored on the corresponding block of the second label Indicate corresponding first encryption blacklist.
In one embodiment, processor executes the blacklist that will inquire realized when computer program and is sent to inquiry terminal Later, further includes: receive and record queries terminal according to inquiry blacklist return report information;According to report information to looking into Blacklist is ask to be detected;When detecting inquiry blacklist mistake, the corresponding upload side of limitation inquiry blacklist identifies upper Pass permission.
In one embodiment, processor executes the blacklist that will inquire realized when computer program and is sent to inquiry terminal Later, further includes: receive inquiry terminal according to the blacklist that blacklist data is sent and update request, blacklist updates to be wrapped in request Containing more new data;More new data is saved in block chain.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor obtains the blacklist acquisition request that inquiry terminal is sent, and blacklist obtains Inquiry mark is carried in request, according to the access authority of inquiry identity verification inquiry terminal;When the access authority of inquiry terminal When being verified, the corresponding first encryption blacklist of blacklist acquisition request is obtained from the block chain of storage blacklist;Identification The corresponding upload side's information of first encryption blacklist, generates authority checking request according to upload side's information, and authority checking is asked It asks and is sent to inquiry terminal;The authorized certificate that inquiry terminal is returned according to authority checking request is received, and according to authorized certificate pair The the first encryption blacklist obtained is decrypted to obtain inquiry blacklist;Inquiry blacklist is sent to inquiry terminal.
In one embodiment, reception upper transmission terminal hair is also performed the steps of when computer program is executed by processor The blacklist upload request sent carries upload mark in blacklist upload request;According to transmission terminal on upload identity verification Upload permissions;When the upload permissions of upper transmission terminal are verified, the shared blacklist of transmission terminal transmission in reception;It will share black The second encryption blacklist is obtained after list encryption, and the second encryption blacklist is stored on block chain.
In one embodiment, that realizes when computer program is executed by processor will obtain the after the encryption of shared blacklist Two encryption blacklists, and the second encryption blacklist is stored on block chain, comprising: identify the first user in shared blacklist Information and the corresponding promise breaking data of the first user information;The first user mark is generated according to the first user information;To promise breaking data Encryption generates the second encryption blacklist, and the second encryption blacklist is stored in the first block of block chain, wherein the firstth area Position of the block in block chain is expressed as the first label;Established inquiry list is obtained, by the first user mark and the first mark Number correspondence is saved in established inquiry list.
In one embodiment, is carried in the blacklist acquisition request realized when computer program is executed by processor Two users mark is then calculated the blacklist that obtains from the block chain of storage blacklist realized when machine program is executed by processor and is obtained Request corresponding first encryption blacklist, comprising: obtain inquiry list, inquiry second user mark is corresponding from inquiry list Second label;The corresponding block of the second label is positioned from block chain, second stored on the corresponding block of the second label is obtained and uses The corresponding first encryption blacklist of family mark.
In one embodiment, that realizes when computer program is executed by processor is sent to inquiry eventually for inquiry blacklist After end, further includes: receive and record queries terminal according to inquiry blacklist return report information;According to report information pair Inquiry blacklist is detected;When detecting inquiry blacklist mistake, the corresponding upload side of limitation inquiry blacklist is identified Upload permissions.
In one embodiment, that realizes when computer program is executed by processor is sent to inquiry eventually for inquiry blacklist After end, further includes: receive inquiry terminal according to the blacklist that blacklist data is sent and update request, blacklist updates in request Include more new data;More new data is saved in block chain.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of blacklist sharing method, which comprises
The blacklist acquisition request that inquiry terminal is sent is obtained, inquiry mark is carried in the blacklist acquisition request, according to The access authority of terminal is inquired described in the inquiry identity verification;
When the access authority verification of the inquiry terminal passes through, the blacklist is obtained from the block chain of storage blacklist and is obtained Take the corresponding first encryption blacklist of request;
It identifies the corresponding upload side's information of the first encryption blacklist, authority checking is generated according to upload side's information and is asked It asks, and authority checking request is sent to the inquiry terminal;
The authorized certificate that the inquiry terminal is returned according to authority checking request is received, and according to the authorized certificate to institute The the first encryption blacklist for stating acquisition is decrypted to obtain inquiry blacklist;
The inquiry blacklist is sent to the inquiry terminal.
2. the method according to claim 1, wherein the method also includes:
The blacklist upload request that transmission terminal is sent in reception carries upload mark in the blacklist upload request;
According to the upload permissions of upper transmission terminal described in the upload identity verification;
When the upload permissions of the upper transmission terminal are verified, the shared blacklist that the upper transmission terminal is sent is received;
The second encryption blacklist will be obtained after the shared blacklist encryption, and the second encryption blacklist is stored in block On chain.
3. according to the method described in claim 2, it is characterized in that, it is described will obtain after the shared blacklist encryption second plus Close blacklist, and the second encryption blacklist is stored on block chain, comprising:
Identify the first user information and the corresponding promise breaking data of first user information in the shared blacklist;
The first user mark is generated according to first user information;
Second encryption blacklist is generated to the promise breaking data encryption, and the second encryption blacklist is stored in block chain In first block, wherein position of first block in the block chain is expressed as the first label;
First user is indicated into be saved in established inquiry list corresponding with first label.
4. according to the method described in claim 3, it is characterized in that, carrying second user mark in the blacklist acquisition request Show, then it is described that the corresponding first encryption blacklist of the blacklist acquisition request, packet are obtained from the block chain of storage blacklist It includes:
The inquiry list is obtained, the second user is inquired from the inquiry list and indicates corresponding second label;
The corresponding block of second label is positioned from the block chain, is stored on the corresponding block of acquisition second label The second user mark corresponding first encrypts blacklist.
5. the method according to claim 1, wherein described be sent to the inquiry eventually for the inquiry blacklist After end, further includes:
Receive and record the report information of return of the inquiry terminal according to the inquiry blacklist;
The inquiry blacklist is detected according to the report information;
When detecting the inquiry blacklist mistake, the upload power that the corresponding upload side of the inquiry blacklist identifies is limited Limit.
6. the method according to claim 1, wherein described be sent to the inquiry eventually for the inquiry blacklist After end, further includes:
It receives the inquiry terminal and request is updated according to the blacklist that the blacklist data is sent, the blacklist updates request In include more new data;
The more new data is saved in the block chain.
7. a kind of blacklist sharing means, which is characterized in that described device includes:
Access authority verification module, the blacklist acquisition request sent for obtaining inquiry terminal, the blacklist acquisition request In carry inquiry mark, according to it is described inquiry identity verification described in inquire terminal access authority;
Data acquisition module, for when it is described inquiry terminal access authority verification pass through when, from storage blacklist block chain It is middle to obtain the corresponding first encryption blacklist of the blacklist acquisition request;
Business licenses module is uploaded, for identification the corresponding upload side's information of the first encryption blacklist, according to the upload Square information generates authority checking request, and authority checking request is sent to the inquiry terminal;
Data decryption module, the authorized certificate returned for receiving the inquiry terminal according to authority checking request, and root It is decrypted to obtain inquiry blacklist according to first encryption blacklist of the authorized certificate to the acquisition;
Data return module, for the inquiry blacklist to be sent to the inquiry terminal.
8. device according to claim 7, which is characterized in that described device further include:
Upload request receiving module, the blacklist upload request sent for receiving upper transmission terminal, the blacklist upload request In carry upload mark;
Upload permissions authentication module, the upload permissions for the upper transmission terminal according to the upload identity verification;
Data reception module is sent for when the upload permissions of the upper transmission terminal are verified, receiving the upper transmission terminal Shared blacklist;
Data memory module for that will obtain the second encryption blacklist after the shared blacklist encryption, and described second is added Close blacklist is stored on block chain.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 6 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 6 is realized when being executed by processor.
CN201910610289.1A 2019-07-08 2019-07-08 Blacklist sharing method and device, computer equipment and storage medium Active CN110365670B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201910610289.1A CN110365670B (en) 2019-07-08 2019-07-08 Blacklist sharing method and device, computer equipment and storage medium
PCT/CN2019/122871 WO2021003980A1 (en) 2019-07-08 2019-12-04 Blacklist sharing method and apparatus, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910610289.1A CN110365670B (en) 2019-07-08 2019-07-08 Blacklist sharing method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110365670A true CN110365670A (en) 2019-10-22
CN110365670B CN110365670B (en) 2022-07-08

Family

ID=68218376

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910610289.1A Active CN110365670B (en) 2019-07-08 2019-07-08 Blacklist sharing method and device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN110365670B (en)
WO (1) WO2021003980A1 (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111259448A (en) * 2020-01-17 2020-06-09 中国建设银行股份有限公司 Data sharing method and device
CN111694899A (en) * 2020-06-12 2020-09-22 中国银行股份有限公司 Blacklist sharing method and system based on block chain
CN111708992A (en) * 2020-05-06 2020-09-25 咪咕文化科技有限公司 Report data access method and device, electronic equipment and storage medium
CN112184426A (en) * 2020-10-12 2021-01-05 深圳壹账通智能科技有限公司 Data sharing method, system, server and computer readable storage medium
WO2021003980A1 (en) * 2019-07-08 2021-01-14 深圳壹账通智能科技有限公司 Blacklist sharing method and apparatus, computer device and storage medium
CN112446702A (en) * 2020-11-17 2021-03-05 深圳市元征科技股份有限公司 Data verification method and device and node equipment
CN112511651A (en) * 2021-01-28 2021-03-16 支付宝(杭州)信息技术有限公司 Service access method and device based on block chain
CN112581011A (en) * 2020-12-25 2021-03-30 深圳市元征科技股份有限公司 Lease management method, lease management device, terminal equipment and storage medium
CN112699088A (en) * 2020-12-30 2021-04-23 中国信息通信研究院 Method, system and medium for sharing fraud-related data
CN112905536A (en) * 2021-02-07 2021-06-04 全链通有限公司 Data verification synchronization method and device based on block chain
CN112989386A (en) * 2021-03-31 2021-06-18 苏州黑云智能科技有限公司 Blacklist sharing method and system based on accidental transmission
CN113569295A (en) * 2021-09-24 2021-10-29 浙江甲骨文超级码科技股份有限公司 Blacklist data sharing method and obtaining method
CN113743953A (en) * 2021-01-18 2021-12-03 北京京东拓先科技有限公司 First-marketing qualification information acquisition method and equipment and computer-readable storage medium
CN113905134A (en) * 2021-10-21 2022-01-07 中国联合网络通信集团有限公司 Address list blacklist management method, system, equipment and medium based on block chain
CN114296651A (en) * 2021-12-28 2022-04-08 上海右云信息技术有限公司 Method and equipment for storing user-defined data information
CN115118474A (en) * 2022-06-20 2022-09-27 广东省工业边缘智能创新中心有限公司 Identification query and storage management method, identification agent module and authority management system
CN115134150A (en) * 2022-06-29 2022-09-30 中国工商银行股份有限公司 Block chain-based data acquisition method and system, storage medium and electronic device

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113064923B (en) * 2021-04-30 2024-04-16 中国工商银行股份有限公司 Detection method, device, equipment and storage medium of blacklist screening system
CN113553588B (en) * 2021-07-28 2024-05-24 中国南方电网有限责任公司 Terminal software management method
CN115643226B (en) * 2022-09-06 2023-11-21 广州市玄武无线科技股份有限公司 Message sending disturbance-free configuration method, device and storage medium
CN117459634B (en) * 2023-11-22 2024-06-11 深圳市众智达信息科技有限公司 Method, system and medium for improving cross-data center blacklist interface access performance

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180113145A (en) * 2017-04-05 2018-10-15 삼성에스디에스 주식회사 Method for processing blockchain based real-time transaction and system thereof
CN109327418A (en) * 2017-07-31 2019-02-12 平安科技(深圳)有限公司 Data sharing method, device and computer readable storage medium
CN109344647A (en) * 2018-09-12 2019-02-15 上海点融信息科技有限责任公司 For the access credentials generation method of block chain network, data access method, storage medium, calculate equipment
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain
CN109858272A (en) * 2018-05-23 2019-06-07 深圳崀途科技有限公司 Blacklist data processing system based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10762479B2 (en) * 2017-04-05 2020-09-01 Samsung Sds Co., Ltd. Method and system for processing blockchain-based real-time transaction
CN110365670B (en) * 2019-07-08 2022-07-08 深圳壹账通智能科技有限公司 Blacklist sharing method and device, computer equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180113145A (en) * 2017-04-05 2018-10-15 삼성에스디에스 주식회사 Method for processing blockchain based real-time transaction and system thereof
CN109327418A (en) * 2017-07-31 2019-02-12 平安科技(深圳)有限公司 Data sharing method, device and computer readable storage medium
CN109858272A (en) * 2018-05-23 2019-06-07 深圳崀途科技有限公司 Blacklist data processing system based on block chain
CN109344647A (en) * 2018-09-12 2019-02-15 上海点融信息科技有限责任公司 For the access credentials generation method of block chain network, data access method, storage medium, calculate equipment
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2021003980A1 (en) * 2019-07-08 2021-01-14 深圳壹账通智能科技有限公司 Blacklist sharing method and apparatus, computer device and storage medium
CN111259448A (en) * 2020-01-17 2020-06-09 中国建设银行股份有限公司 Data sharing method and device
CN111708992A (en) * 2020-05-06 2020-09-25 咪咕文化科技有限公司 Report data access method and device, electronic equipment and storage medium
CN111708992B (en) * 2020-05-06 2023-07-14 咪咕文化科技有限公司 Report data access method and device, electronic equipment and storage medium
CN111694899A (en) * 2020-06-12 2020-09-22 中国银行股份有限公司 Blacklist sharing method and system based on block chain
CN112184426A (en) * 2020-10-12 2021-01-05 深圳壹账通智能科技有限公司 Data sharing method, system, server and computer readable storage medium
CN112446702A (en) * 2020-11-17 2021-03-05 深圳市元征科技股份有限公司 Data verification method and device and node equipment
CN112581011A (en) * 2020-12-25 2021-03-30 深圳市元征科技股份有限公司 Lease management method, lease management device, terminal equipment and storage medium
CN112581011B (en) * 2020-12-25 2024-04-02 深圳市元征科技股份有限公司 Lease management method, lease management device, terminal equipment and storage medium
CN112699088A (en) * 2020-12-30 2021-04-23 中国信息通信研究院 Method, system and medium for sharing fraud-related data
CN113743953A (en) * 2021-01-18 2021-12-03 北京京东拓先科技有限公司 First-marketing qualification information acquisition method and equipment and computer-readable storage medium
CN112511651A (en) * 2021-01-28 2021-03-16 支付宝(杭州)信息技术有限公司 Service access method and device based on block chain
CN112511651B (en) * 2021-01-28 2022-02-18 支付宝(杭州)信息技术有限公司 Service access method and device based on block chain
CN112905536B (en) * 2021-02-07 2024-01-02 全链通有限公司 Data verification synchronization method and device based on block chain
CN112905536A (en) * 2021-02-07 2021-06-04 全链通有限公司 Data verification synchronization method and device based on block chain
CN112989386A (en) * 2021-03-31 2021-06-18 苏州黑云智能科技有限公司 Blacklist sharing method and system based on accidental transmission
CN112989386B (en) * 2021-03-31 2023-09-22 苏州黑云智能科技有限公司 Blacklist sharing method and system based on careless transmission
CN113569295A (en) * 2021-09-24 2021-10-29 浙江甲骨文超级码科技股份有限公司 Blacklist data sharing method and obtaining method
CN113569295B (en) * 2021-09-24 2022-02-15 浙江甲骨文超级码科技股份有限公司 Blacklist data sharing method and obtaining method
CN113905134A (en) * 2021-10-21 2022-01-07 中国联合网络通信集团有限公司 Address list blacklist management method, system, equipment and medium based on block chain
CN114296651A (en) * 2021-12-28 2022-04-08 上海右云信息技术有限公司 Method and equipment for storing user-defined data information
CN114296651B (en) * 2021-12-28 2023-08-01 上海右云信息技术有限公司 Method and device for storing custom data information
CN115118474A (en) * 2022-06-20 2022-09-27 广东省工业边缘智能创新中心有限公司 Identification query and storage management method, identification agent module and authority management system
CN115134150A (en) * 2022-06-29 2022-09-30 中国工商银行股份有限公司 Block chain-based data acquisition method and system, storage medium and electronic device

Also Published As

Publication number Publication date
WO2021003980A1 (en) 2021-01-14
CN110365670B (en) 2022-07-08

Similar Documents

Publication Publication Date Title
CN110365670A (en) Blacklist sharing method, device, computer equipment and storage medium
JP7530890B2 (en) Distributed Ledgers for Cryptographic Digital Identities
EP3618394B1 (en) Data sharing method, client, server, computing device, and storage medium
US11095449B2 (en) System and method for securely processing an electronic identity
CN110535833B (en) Data sharing control method based on block chain
US11250142B1 (en) System and method for protecting data in business transactions
US10146948B2 (en) Secure network access
CN110489393A (en) Promise breaking information query method, device, computer equipment and storage medium
US8656180B2 (en) Token activation
US8555079B2 (en) Token management
US8972719B2 (en) Passcode restoration
US20210042804A1 (en) Data security system and method
CN111787530B (en) Block chain digital identity management method based on SIM card
US20200358759A1 (en) Access to data stored in a cloud
AU2017204769A1 (en) Differential client-side encryption of information originating from a client
US20150047003A1 (en) Verification authority and method therefor
CN112567716B (en) Secure data transmission system and method
CN109446259B (en) Data processing method and device, processor and storage medium
CN110442654A (en) Promise breaking information query method, device, computer equipment and storage medium
CN112231284A (en) Block chain-based big data sharing system, method, device and storage medium
CN108965228B (en) Dispute relief system with KYC data mark of multiple keys and method thereof
CN113015991A (en) Secure digital wallet processing system
CN109359485A (en) Invoice data shared system and method based on block chain
JP2019533852A (en) Software-based switch for providing products and / or services to users without compromising privacy
EP3400695A1 (en) System, method and apparatus for data transmission

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant