CN110489488B - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN110489488B
CN110489488B CN201910774646.8A CN201910774646A CN110489488B CN 110489488 B CN110489488 B CN 110489488B CN 201910774646 A CN201910774646 A CN 201910774646A CN 110489488 B CN110489488 B CN 110489488B
Authority
CN
China
Prior art keywords
node
processing
feature value
party
processor
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910774646.8A
Other languages
Chinese (zh)
Other versions
CN110489488A (en
Inventor
陈尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910774646.8A priority Critical patent/CN110489488B/en
Publication of CN110489488A publication Critical patent/CN110489488A/en
Application granted granted Critical
Publication of CN110489488B publication Critical patent/CN110489488B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the application discloses a data processing method and a device, wherein the method comprises the following steps: when the client node has a target characteristic value in the blockchain and requests the client node to determine a corresponding processor node, the client node can acquire client information sent by the client node, wherein the client information comprises processing conditions for processing the target characteristic value. Correspondingly, the authorized party node in the block chain determines a processing party node for processing the target characteristic value, and generates a processing application including a processing party identifier corresponding to the processing party node. The block chain acquires the relevant information of the processor node through the processor identifier, so that whether the processor node meets the processing condition required by the consignor node can be determined, the processing application can be subjected to uplink processing when the processing condition is met, and the target characteristic value is transferred to the processor node based on the processing application. The method can improve the possibility that the variation trend of the target characteristic value in the data processing process meets the data processing expectation.

Description

Data processing method and device
Technical Field
The present application relates to the field of data processing, and in particular, to a data processing method and apparatus.
Background
In one data processing mode, the client can transfer the feature value of the client to the client, and the client selects an appropriate feature value processor to perform data processing on the feature value transferred by the client according to the feature value processing condition of the client, so as to increase the value of the feature value.
However, since the feature value processing party that meets the feature value processing condition is determined by the authorized party, in some cases, the actual processing condition of the feature value processing party selected by the authorized party may not meet the feature value processing condition of the authorized party, which may result in that the feature value processing party does not increase the value of the feature value as expected during the process of processing the feature value of the authorized party, or even decreases the value, resulting in a loss to the authorized party.
Disclosure of Invention
In order to solve the technical problem, the application provides a data processing method and a data processing device, which avoid the situation that the determined processing side node does not meet the processing condition, thereby improving the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation.
The embodiment of the application discloses the following technical scheme:
in a first aspect, an embodiment of the present application provides a data processing method, where the method includes:
acquiring entrusting information sent by an entrusting party node in a block chain, wherein the entrusting information comprises a processing condition for processing a target characteristic value of the entrusting party;
acquiring a processing application of a trusted node in the block chain, wherein the processing application comprises a processor identifier corresponding to a processor node in the block chain;
determining whether the processor node meets the processing condition according to the processor identifier;
and if so, performing uplink processing on the processing application, and transferring the target characteristic value to the processor node based on the processing application.
Optionally, the transferring the target characteristic value to the processor node based on the processing application includes:
transferring the target feature value from the principal node to the processing side node based on the processing application.
Optionally, after the transferring the target feature value to the processor node based on the processing application, the method further includes:
acquiring an execution application of the processor node, wherein the execution application comprises a processing mode of the processor node on the target characteristic value;
and if the processing mode meets the authentication condition of the block chain, performing uplink processing on the execution application.
Optionally, the delegation information further includes a transfer condition and a transferred party identifier corresponding to the transferred party node, and after the target feature value is transferred to the processor node based on the processing application, the method further includes:
determining a first characteristic value added by the processing side node in the process of processing the target characteristic value;
determining a second characteristic value from the first characteristic values according to the transfer condition;
transferring the second feature value from the processing node to the transferee node according to the transferee identification.
Optionally, after determining the first feature value added by the processing node in the process of processing the target feature value, the method further includes:
if the first characteristic value is not determined or the first characteristic value is determined not to meet the transfer condition, determining a second characteristic value from the consignor node according to the transfer condition;
transferring the second feature value from the principal node to the transferee node.
Optionally, the delegation information further includes a delegation party identifier corresponding to the delegation party node, and after the second feature value is determined from the first feature value according to the transfer condition, the method further includes:
determining a third characteristic value from the first characteristic values according to the transfer condition;
and transferring the third characteristic value from the processing side node to the consignor node according to the consignor identifier.
Optionally, the delegation information further includes a delegation identifier corresponding to the delegation node and a numerical value of the target feature value, and the method further includes:
acquiring verification information generated by the authorized party node, wherein the verification information is determined by the authorized party according to the magnitude relation between the entrustable characteristic value of the authorized party node and the target characteristic value, and the entrustable characteristic value is determined according to the identification of the entrusting party;
and determining whether to carry out uplink processing on the entrusted information according to the verification information.
Optionally, the entrusting party node, the entrusted party node and the processing party node all belong to nodes in a block chain; if the rotated node is involved, the rotated node belongs to the node in the block chain.
In a second aspect, an embodiment of the present application provides a data processing apparatus, which includes a first obtaining unit, a second obtaining unit, a first determining unit, and a first transferring unit:
the first acquisition unit is used for acquiring entrusting information sent by an entrusting party node in a block chain, and the entrusting information comprises processing conditions for processing a target characteristic value of the entrusting party;
the second obtaining unit is configured to obtain a processing application of a trusted node in the blockchain, where the processing application includes a handler identifier corresponding to a handler node in the blockchain;
the first determination unit is used for determining whether the processor node meets the processing condition according to the processor identifier;
the first transfer unit is configured to, if it is determined that the processor node meets the processing condition, perform uplink processing on the processing application, and transfer the target characteristic value to the processor node based on the processing application.
Optionally, the first transfer unit is specifically configured to:
transferring the target feature value from the principal node to the processing side node based on the processing application.
Optionally, the apparatus further includes a third acquiring unit and a uplink unit:
the third obtaining unit is configured to obtain an execution application of the processor node after the target feature value is transferred to the processor node based on the processing application, where the execution application includes a processing manner of the processor node on the target feature value;
and the uplink unit is used for performing uplink processing on the execution application if the processing mode meets the authentication condition of the block chain.
Optionally, the apparatus further includes a second determining unit, a third determining unit, and a second transferring unit:
the second determining unit is configured to determine, after the target feature value is transferred to the processing-side node, a first feature value added by the processing-side node in a process of processing the target feature value, where the delegation information further includes a transfer condition and a transferred-side identifier corresponding to a transferred-side node;
the third determining unit is used for determining a second characteristic value from the first characteristic values according to the transfer condition;
the second transfer unit is configured to transfer the second feature value from the processing node to the transferred node according to the transferred identifier.
Optionally, the apparatus further includes a fourth determining unit and a third transferring unit:
the fourth determining unit is configured to, after the determining of the first feature value added by the processing-side node in the process of processing the target feature value, determine a second feature value from the entrusting-side node according to the transfer condition if the first feature value is not determined or the first feature value is determined not to satisfy the transfer condition;
the third transfer unit is configured to transfer the second feature value from the requester node to the transferee node.
Optionally, the apparatus further includes a fifth determining unit and a fourth transferring unit:
the fifth determining unit is configured to determine, after the second feature value is determined from the first feature value according to the transfer condition, a third feature value from the first feature value according to the transfer condition, where the delegation information further includes a delegation party identifier corresponding to a delegation party node;
and the fourth transfer unit is configured to transfer the third feature value from the processing-side node to the principal-side node according to the principal identifier.
Optionally, the apparatus further includes a fourth obtaining unit and a sixth determining unit:
the fourth acquiring unit is configured to acquire verification information generated by the trusted party node, where the verification information is determined by the trusted party according to a magnitude relationship between a delegateable feature value that the delegating party node has and the target feature value, the delegateable feature value is determined according to the delegating party identifier, and the delegating information further includes a delegating party identifier corresponding to the delegating party node and a numerical value of the target feature value;
the sixth determining unit is configured to determine whether to perform uplink processing on the delegation information according to the verification information.
In a third aspect, an embodiment of the present application provides an apparatus for data processing, where the apparatus includes a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to execute the data processing method of the first aspect according to instructions in the program code.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium for storing program code for executing the data processing method according to the first aspect of the claims.
According to the technical scheme, the client node, the delegated node and the processing node are all in the block chain, and when the client node has the target characteristic value in the block chain and needs to delegate the delegated node to determine the corresponding processing node, the client node can acquire the delegation information sent by the client node, wherein the delegation information comprises the processing conditions for processing the target characteristic value. Correspondingly, the authorized party node in the block chain determines a processing party node for processing the target characteristic value, and generates a processing application including a processing party identifier corresponding to the processing party node. And acquiring related information of the processor node through the processor identifier so as to determine whether the processor node meets the processing condition required by the consignor node, and if so, performing uplink processing on the processing application and transferring the target characteristic value to the processor node based on the processing application. The method and the device have the advantages that whether the processing side node meets the processing requirements of the entrusting side node or not is judged, the entrusted side node is not judged, the processing conditions provided by the entrusting side node are directly judged, the condition that the determined processing side node does not meet the processing conditions is avoided, and the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic view of an application scenario of a data processing method according to an embodiment of the present application;
fig. 2 is a flowchart of a data processing method according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a data processing system according to an embodiment of the present application;
fig. 4a is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4b is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4c is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4d is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4e is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4f is a schematic diagram of a data processing apparatus according to an embodiment of the present application;
fig. 5 is a block diagram of an apparatus for data processing according to an embodiment of the present disclosure;
fig. 6 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
At present, when a client node needs to request a feature value of the client node for processing, a client node mainly determines a processor for processing the feature value of the client according to a processing condition provided by the client node, which may cause that the actual processing capability of the processor determined by the client node does not accord with the feature value processing condition of the client, that is, the client node has a high proxy risk, thereby possibly causing the client to lose. The delegate risk may be that the delegate executes the delegation task without depending on the intention of the delegation party, such as not determining the processing party according to the intention of the delegation party, or performing other processing methods on the feature value of the delegation party that do not meet the intention of the delegation party.
For this purpose, an embodiment of the present application provides a data processing method, where the data processing method is executed based on a block chain, where a delegator node, a delegatee node, and a handler node in the method are all in the block chain, and the method determines, by the block chain, whether a handler node determined by the delegator node satisfies a requirement of the delegator node according to a processing condition provided by the delegator node after the delegator node determines the handler node, and if so, performs uplink processing on the processing application, thereby determining that the handler node processes a target feature value of the delegator node. Therefore, the block chain directly determines whether the processing side node meets the requirement of the consignor node according to the processing condition of the consignor node, but not the consignor node determines the processing side node by itself, so that the situation that the processing side node determined by the consignor node does not meet the processing condition is avoided, and the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation is improved.
The feature in the embodiment of the present application may be a virtual resource that embodies a certain value, where the virtual resource exists in a block chain, for example, the feature may be a game gold, and the feature value may be a numerically quantized virtual resource, for example, the feature value may be 100 game gold. The target characteristic value is a characteristic value which requires other nodes to be entrusted to perform data processing by the entrusting party node in the embodiment of the application.
The client may be a client that issues a request task, the client may be a client that accepts the request task, and the processor may be a client that processes a feature value of the client. The requesting node, the trusted node, and the processing node may be a terminal device or a server, respectively, and the embodiments of the present application are not limited thereto.
First, an application scenario of the embodiment of the present application is described. The method can be applied to terminal equipment, and the terminal equipment can be equipment such as an intelligent terminal, a computer, a Personal Digital Assistant (PDA for short), a tablet computer and the like.
The data processing method can also be applied to a server, the server is a device for providing data processing service for the terminal device, the server can upload the request information sent by the request side node and the processing application of the requested side node to the server, and the server utilizes the data processing method provided by the embodiment of the application to control the transfer of the target characteristic value. The server may be an independent server or a server in a cluster.
In order to facilitate understanding of the technical solution of the present application, the following describes a data processing method provided in the embodiments of the present application with reference to an actual application scenario.
Referring to fig. 1, fig. 1 is a schematic view of an application scenario of a data processing method according to an embodiment of the present application. The data processing method of the embodiment of the present application may be performed by a data processing apparatus in which a blockchain is deployed, and the data processing apparatus may be a server or a terminal. For example, the blockchain may be deployed in the server 101 to perform the steps in the embodiments of the present application through the server 101. The blockchain technology may be an application mode of a computer technology such as distributed data storage, point-to-point transmission, a consensus mechanism, and an encryption algorithm. It should be noted that the block chain technique has the following advantages: the blockchain adopts a storage mode of distributed data, so that centralized hardware or management mechanisms do not exist any more, and the rights and obligations of each node in the blockchain are equal, thereby realizing the decentralized advantage of data processing. And the data in the block chain is public for each node, so that the information of the whole block chain is ensured to be highly transparent. In addition, data in the block chain cannot be tampered and cannot be manually intervened, and objectivity of the data in the block chain is guaranteed.
The blockchain may include a delegator node 102, a delegator node 103, and a handler node 104, where the delegator node 102, the delegator node 103, and the handler node 104 may be servers.
In this embodiment of the present application, when a client node 102 in a block chain needs to client a target feature value that the client node 102 has, corresponding client information may be generated. The target characteristic value can be a certain amount of virtual resources which need to be entrusted and processed by an entrusting party; for example: if the trustee node has 100 game coins and the trustee wishes to perform trustee processing on 30 coins, the 30 coins can be the target characteristic value of the trustee node 102; the delegation information may embody a delegation intention of a delegating party, and the delegation information may include a processing condition for processing a target feature value of the node 102 of the delegating party, where the processing condition may be a condition that is required to be satisfied by a processing party that is provided by the delegating party and processes the target feature value. For example, the processing conditions may be: the processing party that processes the target feature value may not be the original company whose investment risk factor is higher than m.
The delegator node 102 may, after generating the delegation information, publish the delegation information in a blockchain, which may obtain the delegation information.
Further, each node in the block chain may know the request information, and after the requester node 102 issues the request information, the requester node 103 in the block chain may acquire the request information, specify the handler node 104 for handling the target feature value for the requester based on the handling condition in the request information, and then may generate a handling application including the handler identifier based on the handler identifier corresponding to the handler node 104. The processor identifier may be information that uniquely identifies the processor node, for example, the processor identifier may be unique encoding (ID) information of the processor node.
For example, the following steps are carried out: the processing conditions of the trusted party node 103 based on the trusted party node 102 are as follows: if the processor processing the target feature value cannot be the original company whose investment risk coefficient is higher than m, and determines, as the processor, a company X whose investment risk coefficient is lower than m and whose creation age is 10 years for the client, the process application generated by the client node 103 may include: ID information of the company X (i.e., a handler identification corresponding to the handler node).
The delegatee node 103 can issue the processing application in a blockchain that can obtain the processing application after generating the processing application.
It should be noted that the block chain may uniquely determine the node corresponding to the identifier based on the identifier corresponding to each node therein, further obtain information of each node, and perform an operation such as transferring a characteristic value to each node, for example: the blockchain may obtain information that company X has on the blockchain, such as the age created by the company, the investment risk coefficient of the company investment project, and the like, according to ID information of company X (i.e., identifier of the processing party corresponding to the processing party node).
Then, after acquiring the request information sent by the requester node 102 and the processing request sent by the callee node 103, the blockchain may acquire, in the blockchain, information about the handler node 104 based on the identifier of the handler in the processing request, where the information about the acquired handler node may be, for example, information about processing conditions provided by the requester node published in the blockchain, and thus, the blockchain may determine whether the handler node 104 satisfies the processing conditions provided by the requester based on the information about the handler node 104. If the blockchain determines that the processor node 104 satisfies the processing condition, the blockchain may perform uplink processing on the processing application and transfer a target characteristic value to the processor node 104 based on the processing application.
The operation of the blockchain performing the uplink processing on any item may be that the blockchain stores the item in the blockchain, and the uplink item is in a completely public and transparent state for each node in the blockchain. For example: after determining that the processing application meets the processing condition of the consignor node, the blockchain performs uplink processing on the processing application so as to store the processing application in the blockchain, so that any node in the blockchain can know the processing application.
In brief, in the data processing method provided in the embodiment of the present application, in the process of accepting the delegation task, the delegatee node 103 in the blockchain determines only an alternative processing party node for the delegation party node 102, and the final determination of the processing party node is checked and determined by the blockchain executing the data processing method. That is, the delegatee node only has a processing application right for the target feature value, and the blockchain has a final decision right. The party having the application right for the treatment can issue an application for a treatment method of the object, and the party having the decision right can finally decide the treatment method of the object. For example, a delegatee node that has the right to handle the request can provide a handle request for processing the target feature value by the processing node M, and whether the target feature value is ultimately processed by the processing node M is determined by the block chain having the right to decide.
In this way, the blockchain can finally specify the candidate processor node 104 specified by the client node 103 in the blockchain, and when the blockchain specifies that the candidate processor node 104 specified by the client node 103 satisfies the processing condition according to the processing condition of the client node 102, the blockchain can determine that the candidate processor node 104 is the final node of the processing target feature value, perform the uplink processing on the processing application, and transfer the target feature value to the processor node 104 for processing based on the processing application. If the blockchain determines that the candidate processing node 104 does not satisfy the processing condition based on the processing condition of the requesting node 102, the blockchain may determine to reject the candidate processing node 104 as the node that finally processes the target feature value, prohibit the processing application from performing uplink processing, and further prohibit transferring the target feature value to the processing node 104 for processing.
Therefore, according to the data processing method provided by the application, whether the processing side node meets the processing requirement of the client side node or not is judged not to be the client side node, but is finally determined by the block chain directly according to the processing condition provided by the client side node, namely the block chain executing the data processing method is the side for checking whether the processing side node meets the processing condition provided by the client side or not, so that the condition that the determined processing side node does not meet the processing condition is avoided, and the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation is improved.
In addition, the data processing method is executed based on the block chain, because the data in the block chain cannot be tampered and cannot be manually intervened, so that the method for determining the processor node based on the processing condition of the client is strictly executed, and the determined processor node is ensured to strictly follow the will of the client.
Next, a data processing method provided by an embodiment of the present application will be described with reference to the drawings.
Referring to fig. 2, this figure shows a flowchart of a data processing method provided in an embodiment of the present application, where the method includes:
s201: and acquiring the delegation information sent by the node of the delegation party in the block chain.
The data processing method may be performed by a blockchain.
When a client node in the block chain needs to request a target feature value of the client node for processing, the client node may generate request information.
The target feature value in the delegation information may be a certain number of virtual resources that the delegating party needs to perform the delegation process. The delegation information may include a processing condition for processing a target feature value of the delegating party. The processing condition may be a condition that a processing party who processes its target feature value, which is proposed by the entrusting party, needs to satisfy. For example, the processing conditions proposed by the client may be: the processing party that processes the target feature value may not be the original company whose investment risk factor is higher than m.
In this way, the client node can issue the request information in the blockchain after generating the request information, and the blockchain can acquire the request information sent by the client node.
With respect to S201, in a specific implementation, the blockchain performing the data processing may be a blockchain based on an intelligent contract, where the intelligent contract may be a computer protocol that propagates, verifies, or executes the contract in an informational manner.
In this way, the processing conditions that the processing side node should satisfy the entrusting side node can be used as the contract executed in the intelligent contract, so that the processing side node determined for the entrusting side node by the block chain can be ensured to satisfy the processing conditions of the entrusting side node to a greater extent.
S202: and acquiring a processing application of the authorized party node in the block chain.
The delegated node in the block chain can determine a processing party node for processing the target characteristic value of the delegated node according to the processing condition of the delegated node, and generate a processing application including a processing party identifier corresponding to the processing party node.
The processing party identifier may be information uniquely identifying the processing party node, and the blockchain may uniquely determine the processing party node corresponding to the identifier through the processing party identifier, so as to obtain the relevant information disclosed by the processing party node in the blockchain. In a specific implementation, the processor identifier may be, for example, ID information of the processor node.
The delegatee node, after generating the processing application, can publish the processing application in the blockchain, which can obtain the processing application.
It will be appreciated that two scenarios may occur for a processing node determined by a trusted party node for a delegating party node: the processing party node determined by the authorized party node meets the processing condition provided by the authorized party node; alternatively, the processing party node identified by the trusted party node does not comply with the processing conditions provided by the trusted party node.
For example, assume that the processing conditions provided by the principal node are: the processing party that processes the target feature value may not be the original company whose investment risk factor is higher than m. Based on the processing conditions, the processing party specified by the trusted party node as the requesting party node may be, for example, company X, and generate a processing application including node ID information "X" of company X. In fact, the investment risk factor of the company X is n, where n < m, and the creation age is 10 years, it can be seen that the company X does not belong to the original company with an investment risk factor higher than m. That is, the processing node specified by the trusted party node for the requesting party node satisfies the processing condition provided by the requesting party node.
Alternatively, the processing party that the trusted party node may determine for the requester node is company Y, and generates a processing application including node ID information "Y" of company Y. In practice, company Y has an investment risk factor of n ', where n' > m, and a creation age of 0.5 years. It can be seen that this company Y belongs to the original company with an investment risk factor higher than m. That is, the processing node specified by the trusted node for the requesting node does not satisfy the processing conditions provided by the requesting node.
S203: determining whether a processor node in the block chain meets the processing condition according to the processor identifier; if yes, go to step S204.
S204: and performing uplink processing on the processing application, and transferring the target characteristic value to the processor node based on the processing application.
In this embodiment of the application, after obtaining the delegation information sent by the delegation node and the processing application sent by the delegated node, the blockchain may obtain the relevant information of the processing party node based on the processing party identifier in the processing application. Then, it may be determined whether the processing-side node satisfies the processing condition provided by the entrusting-side node based on the acquired information of the processing-side node. If it is determined that the processing node satisfies the processing condition provided by the client, step S204 is executed, in which the processing application is subjected to uplink processing, so as to store the processing application into the blockchain, and the processing application is published to each node in the blockchain. And transferring the target characteristic value to the processor node for data processing based on the processing application (such as according to the processor identifier in the processing application).
The operation of the blockchain performing the uplink processing on any item may be that the blockchain stores the item in the blockchain, and the uplink item is in a completely public and transparent state for each node in the blockchain.
The following exemplifies the method of S203-S204 based on the example in S202 described above.
If the processing node determined by the client node as the client node in the blockchain is a node of company X, the blockchain may determine the node of company X according to the ID information "X" based on the processing application including the node ID information "X" of company X, and obtain the relevant information disclosed by company X in the blockchain, for example, may determine that the investment risk coefficient is n, where n < m and the creation year is 10 years, so that the blockchain may determine these information based on the determined information and according to the processing conditions provided by the client node: and the processor for processing the target characteristic value can not be an initial company with the investment risk coefficient higher than m, and the investment risk and the creation age of the company X are determined to meet the processing conditions of the consignor node. Therefore, the blockchain may determine that the node of company X is the processing node for processing the target feature value, and perform S204, perform uplink processing on the processing application including the node ID information "X" of company X, and transfer the target feature value to the node of company X based on the processing application, so that company X processes the target feature value.
In addition, if the processing node determined by the client node as the client node is a node of company Y, the blockchain may determine the node of company Y according to the ID information "Y" of the processing application including the node ID information "Y" of company Y, and obtain related information disclosed by company Y in the blockchain, for example, may determine that the investment risk coefficient of the blockchain is n ', where n' > m, and the creation age is 0.5 years. Then, the blockchain may determine that the node of company Y is prohibited from being used as the processing-side node for processing the target feature value, and prohibit performing S204, that is, prohibit the uplink processing of the processing application including the node ID information "Y" of company Y, and prohibit transferring the target feature value to the node of company Y for data processing based on the processing application.
According to the technical scheme, the client node, the delegated node and the processing node are all in the block chain, and when the client node has the target characteristic value in the block chain and needs to delegate the delegated node to determine the corresponding processing node, the client node can acquire the delegation information sent by the client node, wherein the delegation information comprises the processing conditions for processing the target characteristic value. Correspondingly, the authorized party node in the block chain determines a processing party node for processing the target characteristic value, and generates a processing application including a processing party identifier corresponding to the processing party node. And acquiring related information of the processor node through the processor identifier so as to determine whether the processor node meets the processing condition required by the consignor node, performing uplink processing on the processing application when the processing condition is met, and transferring the target characteristic value to the processor node based on the processing application. The method and the device have the advantages that whether the processing side node meets the processing requirements of the entrusting side node or not is judged, the entrusted side node is not judged, the processing conditions provided by the entrusting side node are directly judged, the condition that the determined processing side node does not meet the processing conditions is avoided, and the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation is improved.
In an actual scenario, when the trusted party node receives the request task of the requesting party node, if the target feature value is transferred to the trusted party node, the trusted party node is expected to transfer the target feature value to the processing party node for processing, and thus, the trusted party may have a high credit risk (for example, the trusted party may take the target feature value of the requesting party node as owned or may not use it for other purposes), thereby causing a loss to the requesting party. To avoid such a situation and reduce the credit risk of the trusted party, in one possible implementation, the transfer method for the target feature value in S204 may include:
s301: transferring the target feature value from the principal node to the processing side node based on the processing application.
In this embodiment of the present application, before determining a processor node satisfying its processing condition for a client node, a target feature value is always at the client node, and after determining a processor node satisfying its processing condition for the client node, a blockchain may directly transfer the target feature value from the client node to the processor node based on the processing application. That is, in the process of requesting the target feature value by the client node, the client node provides only the candidate processing node for the client node, and the candidate processing node is checked and determined by the block chain executing the data processing method. That is, the authorized node has only a processing application right for the target feature value and does not have a use right, and in the present embodiment, only the processing node finally determined by the block chain has a use right for the target feature value. Therefore, the authorized party node only has the processing application right for the target characteristic value, so that the target characteristic value is not transferred to the authorized party node all the time, thereby avoiding the condition that the characteristic value of the authorized party is lost due to low credit of the authorized party, namely reducing the credit risk of the authorized party.
It can be understood that, after transferring the target characteristic value to the processing side node based on the processing application in S204, the processing side node may perform a corresponding processing manner for the target characteristic value, and in order to reduce a risk that the processing side node adopts an unsafe processing manner for the target characteristic value, in one possible implementation manner, the method may further include:
s401: and acquiring an execution application of the processor node, wherein the execution application comprises a processing mode of the processor node on the target characteristic value.
In this embodiment, after transferring the target feature value to the processor node in the block chain, the processor node may determine an appropriate processing manner for the target feature value, for example: the processing mode determined by the processing side node for the target characteristic value may be: and putting the target characteristic value into a certain investment project provided by the processor node, and then generating an execution application comprising the processing mode by the processor node and sending the execution application to the block chain for verification.
The blockchain may obtain the execution request.
S402: and if the processing mode meets the authentication condition of the block chain, performing uplink processing on the execution application.
The authentication conditions may include: the target eigenvalue is processed in the way of the uplink items in the block chain. Each processing side node can report the items of the processing characteristic values to the block chain for checking, and the block chain can carry out uplink processing on the items passing the checking of the processing side nodes.
In this embodiment of the present application, after acquiring an execution application of a processor node, a block chain may determine whether a processing manner in the execution application meets an authentication condition of the block chain, that is, determine whether the processing manner belongs to an item that has been linked in the block chain, if it is determined that the processing manner meets the authentication condition, perform uplink processing on the execution application, and if it is determined that the processing manner does not meet the authentication condition, prohibit the execution application from performing uplink processing.
The following illustrates the method of S401-S402:
assuming that the block chain has item O and item P, based on this, if the processing method determined by the processing node for the target eigenvalue is: and processing the target characteristic value through the item P, sending an execution application including the processing mode to a block chain by the processing side node, receiving the execution application by the block chain, determining that the processing mode meets the authentication condition based on the processing mode known by the processing mode, wherein the item in the processing mode belongs to the uplink-already item in the block chain, and performing uplink processing on the execution application by the block chain, and further processing the target characteristic value through the processing mode in the execution application in the subsequent step.
If the processing mode determined by the processing side node for the target characteristic value is as follows: and processing the target characteristic value through the item Q, after the processing party node sends the execution application including the processing mode to the block chain, the block chain receives the execution application, and based on the processing mode in the block chain, the item in the processing mode does not belong to the uplink item in the block chain, and the block chain determines that the processing mode does not meet the authentication condition, so that the block chain prohibits the uplink processing of the execution application, and prohibits the processing of the target characteristic value through the processing mode in the execution application.
According to the scheme, the authentication condition of the processing mode determined by the processing side node is verified by applying the block chain, so that the processing side node can be ensured to determine the uplink processing mode of the block chain for the target characteristic value as far as possible, and the processing side node is ensured to adopt a safer processing mode for the target characteristic value to a greater extent.
In fact, the principal may provide a way to assign increased feature values in the blockchain based on the expected growth trend of the target feature values when processed by the data, wherein the party accepting the feature values assigned by the principal may be the transferred party, and the transferred node may also be in the blockchain executing the data processing method. Therefore, in a possible implementation manner, when the entrusting node generates the entrusting information, the transfer condition and the transferred party identifier corresponding to the transferred party node can be added. The transfer condition may be a condition for transferring the increased characteristic value portion, the transferred party identifier may be information that uniquely characterizes the transferred party node, and accordingly, the blockchain may determine information of the transferred party node according to the transferred party identifier, and perform an operation such as transferring the characteristic value to the transferred party node. In this way, the delegation information of the delegating node in the block chain further includes a transfer condition and a transferred party identifier corresponding to the transferred party node.
Then, after S204, the method further comprises:
s501: and determining a first characteristic value added by the processing side node in the process of processing the target characteristic value.
Wherein the first characteristic value may be a characteristic value actually increased in the process of processing the target characteristic value by the processing-side node.
In this embodiment, the client node may set an allocation time node of the first characteristic value in the blockchain, where the allocation time node may be, for example, a time node within a preset time period (e.g., 1 day per month). In this way, the blockchain can determine, every time a time node is assigned, a first characteristic value that the processing-side node increases in processing the target characteristic value.
S502: determining a second feature value from the first feature values according to the transition condition.
The transfer condition in the delegation information may include a characteristic value condition assigned to the transferred node, for example, the transfer condition includes: any percentage (e.g., 20%) of the increased feature value is transferred to the transferee node every time the time node is assigned.
In this way, the blockchain may determine the second characteristic value from the first characteristic values according to the branching condition. The second feature value may be a feature value of a transfer to a transferred node, which is determined according to a transfer condition. For example: if the first characteristic value a is determined at the processing side node, the transfer condition comprises: every time the time node is assigned, 20% of the growing eigenvalue is transferred to the rounded node, and the second eigenvalue determined may be 0.2a (a × 20%).
S503: transferring the second feature value from the processing node to the transferee node according to the transferee identification.
Thus, after determining the second eigenvalue from the first eigenvalue of the processing node, the blockchain may perform uplink processing on the allocation manner for transferring the second eigenvalue from the processing node to the transferred node, so that the blockchain may transfer the second eigenvalue from the processing node to the transferred node according to the transferred identifier based on the allocation manner. It will be appreciated that each node in the blockchain may know the manner in which the characteristic values are assigned this time.
The following exemplifies the methods of S501 to S503.
It is assumed that the client node is provided in the block chain to perform eigenvalue assignment on 1 day per month, and the transition conditions include: every time the time node is assigned, 20% of the growing eigenvalues are transferred to the transferred node. Then, the blockchain may determine a first feature value that the processing-side node increases in processing the target feature value on 1 month, and assuming that the blockchain determines a first feature value a from the processing-side node on 1 month, a second feature value of 0.2a may be determined from the first feature value a depending on the transition condition. Then, the blockchain may perform uplink processing on the allocation manner of transferring the second eigenvalue from the processing node to the transferred node, and transfer the second eigenvalue 0.2a from the processing node to the transferred node according to the transferred party identifier.
By adding the allocation mode of the characteristic value while generating the entrusting information, the target characteristic value does not need to be allocated after being increased, the operation of an entrusting party is facilitated, and the fact that the node to be converted receives the allocated characteristic value in time is guaranteed.
With respect to S501, after the blockchain determines the first feature value added by the processing node in the process of processing the target feature value, the following situation may occur: when the time node is allocated by the consignor node, if the time node for recovering the first feature value from the processing node is not yet available, the first feature value cannot be determined by the processing node, or, for example, the transfer condition includes: in order to ensure that the transferred node can receive the assigned feature value on time, after executing S501, the method further includes:
s601: and if the first characteristic value is not determined or the first characteristic value is determined not to meet the transfer condition, determining a second characteristic value from the consignor node according to the transfer condition.
In this embodiment of the present application, if the blockchain does not determine the first feature value at the processing node or the determined first feature value does not satisfy the transfer condition, the consignor node usually includes an additional feature value, and therefore the blockchain may determine the second feature value at the consignor node according to the transfer condition.
S602: transferring the second feature value from the principal node to the transferee node.
Then, after determining the second characteristic value from the delegator node, the blockchain may perform uplink processing on an allocation manner of transferring the second characteristic value from the delegator node to the transferee node, so that the blockchain may transfer the determined second characteristic value from the delegator node to the transferee node. Accordingly, each node in the block chain can know the way of assigning the eigenvalue this time.
The following exemplifies the methods of S601 to S602.
Assume that the branch conditions in the delegation information include: and transferring the characteristic value b to the turned node every time the time node is allocated. However, at the assigned time node, the blockchain does not determine the first characteristic value or the determined first characteristic value a, a < b at the processing side node, and the client side node also has a characteristic value c, c > b, then the blockchain may determine the characteristic value b from the client side node, which is the second characteristic value determined from the characteristic values of the client side node. Then, the blockchain may perform uplink processing in an allocation manner for transferring the second characteristic value from the requesting node to the transferred node, and may transfer the second characteristic value b from the requesting node to the transferred node.
Thus, after the block chain determines the second feature value from the requester node, the block chain can transfer the second feature value from the requester node to the transferee node. Thus, it can be ensured that the transferred party can receive the assigned characteristic value on an on-schedule basis.
In addition, it is understood that, for S502, the value of the first feature value determined by the blockchain from the processing-side node may be higher than the value of the second feature value allocated to the transferred-side node, and for the processing of the feature values remaining after the second feature value is determined from the first feature value, in a possible implementation manner, the generated delegation information may further include a delegation identifier corresponding to the delegation-side node. The delegator identifier may be information uniquely characterizing the delegator node, and for example, the delegator identifier may be ID information corresponding to the delegator node. Then, after performing S402, the method further includes:
s701: determining a third feature value from the first feature values according to the transition condition.
The transfer condition provided by the client node may include a processing condition of the feature value remaining after the first feature value is assigned. For example, the delegation conditions can include: and transferring the characteristic value remained after the first characteristic value is distributed to the consignor node.
In an embodiment of the present application, the blockchain may determine the third eigenvalue from the first eigenvalue according to a transfer condition. The third feature value may be a feature value transferred to the principal node, which is determined according to the transfer condition.
S702: and transferring the third characteristic value from the processing side node to the consignor node according to the consignor identifier.
Thus, after the block chain determines the third characteristic value from the client node, the block chain can perform uplink processing in an allocation manner of transferring the third characteristic value from the processing node to the client node. The blockchain may thus transfer the third characteristic value from the handler node to the delegator node in accordance with the delegator identification. Each node in the blockchain may learn the manner in which the characteristic values are assigned this time.
For example, assume that the blockchain determines a first feature value a from the processing node, determines a second feature value B from the first feature value a according to the delegation condition, and transfers the second feature value B from the processing node to the transferred node, where a > B, and the transfer condition includes: and transferring all the feature values left after the first feature value is distributed to the consignor node, and then the block chain can take the feature values (a-b) left on the processing side node as third feature values and carry out uplink processing by using the distribution mode of transferring the third feature values from the processing side node to the consignor node. The blockchain may thus transfer the third characteristic value from the handler node to the delegator node based on the delegator identification.
By the method, after the second characteristic value is determined from the first characteristic value, a third characteristic value can be determined from the first characteristic value, and the third characteristic value is transferred to the consignor node. Therefore, the consignor can conveniently process the recovered characteristic value in time and effectively, and the utilization rate of the consignor to the characteristic value is improved. For example, after obtaining the third feature value, the delegator may delegate the third feature value to another node of the processing party for processing, so as to increase the third feature value by time.
In this embodiment of the present application, the trusted party node may determine an appropriate processing party node for the delegating party node according to the processing condition of the delegating party node, and generate the processing application, but in order to avoid a situation that the work of the trusted party node is invalid due to a false request generated by the delegating party node (for example, the delegating party node does not have a target feature value that needs to be delegated), in a possible implementation, the delegating information may further include a delegating party identifier corresponding to the delegating party node and a value of the target feature value. Based on this, the method further comprises:
s801: and acquiring the verification information generated by the authorized party node.
In this embodiment of the present application, the delegatee node may obtain the delegatee characteristic value that the delegator node has, according to the delegator identifier in the delegation information. The trusted node may then generate the verification information based on a magnitude relationship between the trusted characteristic value of the requesting node and the target characteristic value of the request information. The verification information may be determined by the delegatee according to a magnitude relationship between the deletable characteristic value and the target characteristic value, and may be used to inform whether the delegation task of the blockchain deleter node is real, for example, the generated verification information may be: and the entrusting party node has an entrusting characteristic value smaller than the target characteristic value in the entrusting information, and does not execute the entrusting task of the entrusting party node.
S802: and determining whether to carry out uplink processing on the entrusted information according to the verification information.
Thus, the blockchain can determine whether to perform uplink processing on the delegation information according to the verification information. For example, if the blockchain determines that the delegatee node has a delegateable feature value smaller than the target feature value in the delegatee delegation information according to the verification information, and the blockchain can know that the delegation task of the delegatee node is false, it can be determined that the delegation information sent by the delegatee node is not subjected to uplink processing, and thus the blockchain cannot know the delegation information of the delegatee node, and the delegation task is not executed any more. If the blockchain determines that the entrustable characteristic value of the entrusting party node is not less than the target characteristic value in the entrusting party entrusting information according to the verification information, and the blockchain can know that the entrusting task of the entrusting party node is real, the blockchain can determine to carry out uplink processing on the entrusting information sent by the entrusting party node and execute the entrusting task.
By the method, the block chain can determine whether the entrusting task proposed by the entrusting party node is real or not, and determine whether to carry out chain loading processing on the entrusting information according to the authenticity of the entrusting party task, and if the entrusting task of the entrusting party node is determined to be false, the chain loading processing can not be carried out on the entrusting information, so that the entrusted party node can be prevented from determining the processing party node for the entrusted party node and executing subsequent steps, the work effectiveness of the entrusted party is ensured, and the data processing efficiency is improved.
It should be noted that the data processing method provided in the embodiment of the present application may be applied to financial products with agent risk or credit risk, including but not limited to products such as private recruitment trusts, public recruitment funds, bank financing, and the like.
Next, a description will be given by taking an example of applying the data processing method provided in the embodiment of the present application to a trusted product. Referring to fig. 3, a schematic diagram of a data processing system according to an embodiment of the present application is shown. Wherein, a federation chain can be established based on the block chain technology and the intelligent contract technology, and the federation chain is used as the block chain to execute the data processing method.
It should be noted that each node in the blockchain is a blockchain certified node conforming to the federation protocol, and the nodes should comply with the specification code of the blockchain.
Wherein, for the processor node in the blockchain, it needs to submit the certified product information in the alliance chain, such as whether the stock, bond, or property investment project of the public development company is concerned. It can link the information of each item in the block chain and indicate the expected growth of the feature value in each item and the distribution mode of the grown feature value in a functional form according to the alliance protocol and the specification code.
When a principal needs to commit and process funds it has, it can exchange these funds at the principal node for an electronic money token (token), which can be a target characteristic value of the principal node. In a practical scenario, the electronic money currently circulated in the market is usually issued by the electronic trust, and the electronic money token in the embodiment of the present application may be the electronic money issued by a bank (e.g. a central bank) in a unified manner, so that the industry regulation barrier of the electronic trust issuing market can be broken, and the gap of the electronic money in the market regulation can be filled.
The requester node may set request information including a processing condition for processing a target feature value of the requester node, a value of the target feature value, ID information of the requester node, a transfer condition, ID information of the transferee node, and the like, and initiate a request. Wherein the transferred party may be a beneficiary, in a specific implementation, the transferred party may be the entrusting party itself, or may be a third party (such as a will order, an educational fund, etc.), and the transfer condition may be, for example, that the amount of the second characteristic value transferred to the transferred party is limited to not more than 2% of the first characteristic value increased per year. The blockchain may then obtain the delegation request and delegation information and record the target characteristic values and delegation information of the delegation party node. Furthermore, the delegator node may specify the delegator node in the form of a function.
The trusted party node may acquire the request and the request information of the requesting party node during the existence of the request relationship, and may acquire the trusted feature value of the requesting party node based on the ID information of the requesting party node in the request information. Then, verification information is generated according to the magnitude relation between the target characteristic value of the client node and the deletable characteristic value, and the verification information is issued. The generated verification information may include a delegation request to the accepting delegation node when the delegatee node determines that the target characteristic value of the delegation node is not higher than its delegateable characteristic value. And when the authorized party node issues verification information for accepting authorization in the block chain, the broadcast authorization is successful. In this way, the blockchain can save the request information of the client node into the blockchain, i.e. perform uplink processing on the request information of the client node.
Then, the trusted node may determine, for the requesting node, a processing node that satisfies its processing condition, and generate a processing application including a processing identifier (processing ID information) corresponding to the processing node, so that the blockchain may acquire information of the processing node based on the processing identifier in the processing application to check whether the processing node satisfies the processing condition of the requesting node. If it is determined that the processing condition is satisfied, the blockchain may declare that the processing node processes the target feature value.
The blockchain may thus transfer the target characteristic value of the delegator node to the handler node. And the processing side node processes the target characteristic value. In a particular implementation, the processing node may process the target feature value with the assistance of the trusted node. In this block chain, the target feature value may be always stored in the client node, and the client node may have ownership over the target feature value, and transfer the target feature value to the processor node may only indicate that the processor node has access to the target feature value after transferring the target feature value. In this way, since no real electronic money token transfer takes place, only within the blockchain (on the chain) the feature value authorization is declared, and the delegate node has only to initiate the feature value transfer process, it has no chance to contact the target feature value, thus avoiding the credit risk, i.e. by means of electronic money technology. And moreover, the processing side node receiving the target characteristic value is also a node authenticated by the block chain, so that the safety of the target characteristic value in the block chain is further ensured.
Then, according to the time node set by the requester node, a first feature value which is increased from the processor node may be determined, according to the transfer condition in the request information and the transferee identifier corresponding to the transferee node, a second feature value transferred to the transferee node may be determined from the first feature value, the second feature value may be transferred to the transferee node, and if the first feature value is not determined from the processor node or the determined first feature value does not satisfy the transfer condition (if the first feature value is less than the second feature value), the second feature value may be determined from the feature value of the requester node according to the transfer condition, and the second feature value may be transferred from the requester node to the transferee node. In addition, if the processing side node determines the second feature value from the first feature value and then includes the remaining feature values, the processing side node determines a third feature value from the first feature value according to the transition condition, and transfers the determined third feature value to the requesting side node so that the requesting side can process the assigned remaining feature values.
It can be seen that, since the effectiveness of data processing is strictly performed by a block chain, thereby increasing the collusion difficulty and reducing the agent risk of the trusted party, even when the trusted party is out of the country or unconscious, the trusted party and the transferred party must comply with the contract terms (i.e., the processing conditions, the transition conditions, etc. in the trust information) predetermined by the trusted party, that is, the agent risk is avoided by the intelligent contract technique. And the decentralized financial product issuing mode reduces the issuing cost and improves the project income.
In addition, after the block chain transfers the target feature value to the processing node, the processing node in the block chain may determine a processing manner for the target feature value, generate an execution application based on the determined processing manner, and upload the generated execution application to the block chain. Then, the blockchain may obtain an execution application sent by the processing node, and determine whether a processing manner in the execution application meets an authentication condition in the blockchain, where the authentication condition may include: the stocks or bonds invested with the target characteristic value are publicly issued stocks or bonds; the investment projects processed by the target characteristic values are investment projects subjected to supervision and preparation, and the like. In this way, when the blockchain determines that the processing manner meets the authentication condition in the blockchain, the blockchain may perform uplink processing on the execution application, so that the blockchain performs corresponding processing on the target feature value based on the execution application.
Based on the data processing method provided by the foregoing embodiment, this embodiment provides a data processing apparatus, referring to fig. 4a, where fig. 4a shows a schematic diagram of a data processing apparatus provided by an embodiment of the present application, and the apparatus includes a first obtaining unit 401, a second obtaining unit 402, a first determining unit 403, and a first transferring unit 404:
the first obtaining unit 401 is configured to obtain delegation information sent by a delegation party node in a block chain, where the delegation information includes a processing condition for processing a target feature value of the delegation party;
the second obtaining unit 402 is configured to obtain a processing application of a trusted node in a blockchain, where the processing application includes a handler identifier corresponding to a handler node in the blockchain;
the first determining unit 403 is configured to determine whether the processor node satisfies the processing condition according to the processor identifier;
the first transfer unit 404 is configured to, if it is determined that the processing-side node meets the processing condition, perform uplink processing on the processing application, and transfer the target characteristic value to the processing-side node based on the processing application.
In a possible implementation manner, the first transferring unit 404 is specifically configured to:
transferring the target feature value from the principal node to the processing side node based on the processing application.
In a possible implementation manner, referring to fig. 4b, fig. 4b shows a schematic diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus further includes a third obtaining unit 405 and an uplink unit 406:
the third obtaining unit 405, configured to obtain an execution application of the processor node after the target feature value is transferred to the processor node based on the processing application, where the execution application includes a processing manner of the processor node on the target feature value;
the uplink unit 406 is configured to perform uplink processing on the execution application if the processing manner meets the authentication condition of the block chain.
In a possible implementation manner, referring to fig. 4c, this fig. 4c shows a schematic diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus further includes a second determining unit 407, a third determining unit 408, and a second transferring unit 409:
the second determining unit 407 is configured to determine, after the target feature value is transferred to the processor node, a first feature value added by the processor node in the process of processing the target feature value, where the delegation information further includes a transfer condition and a transferred party identifier corresponding to a transferred party node;
the third determining unit 408 is configured to determine a second feature value from the first feature values according to the transition condition;
the second transfer unit 409 is configured to transfer the second feature value from the processing node to the transferred node according to the transferred identifier.
In a possible implementation manner, referring to fig. 4d, fig. 4d shows a schematic diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus further includes a fourth determining unit 410 and a third transferring unit 411:
the fourth determining unit 410 is configured to, after the determining of the first feature value added by the processing-side node in the process of processing the target feature value, determine, if the first feature value is not determined or the first feature value is determined not to satisfy the transfer condition, a second feature value from the entrusting-side node according to the transfer condition;
the third transferring unit 411 is configured to transfer the second feature value from the delegator node to the transferee node.
In a possible implementation manner, referring to fig. 4e, this fig. 4e shows a schematic diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus further includes a fifth determining unit 412 and a fourth transferring unit 413:
the fifth determining unit 412 is configured to determine, after the second feature value is determined from the first feature value according to the transition condition, a third feature value from the first feature value according to the transition condition, where the delegation information further includes a delegation party identifier corresponding to a delegation party node;
the fourth transferring unit 413 is configured to transfer the third feature value from the processing node to the principal node according to the principal identifier.
In a possible implementation manner, referring to fig. 4f, fig. 4f shows a schematic diagram of a data processing apparatus provided in an embodiment of the present application, where the apparatus further includes a fourth obtaining unit 414 and a sixth determining unit 415:
the fourth obtaining unit 414 is configured to obtain verification information generated by the trusted party node, where the verification information is determined by the trusted party according to a magnitude relationship between a delegateable feature value that the trusted party node has and the target feature value, the delegateable feature value is determined according to the delegator identifier, and the delegation information further includes a delegator identifier corresponding to the delegator node and a value of the target feature value;
the sixth determining unit 415 is configured to determine whether to perform uplink processing on the delegation information according to the verification information.
According to the technical scheme, the client node, the delegated node and the processing node are all in the block chain, and when the client node has the target characteristic value in the block chain and needs to delegate the delegated node to determine the corresponding processing node, the client node can acquire the delegation information sent by the client node, wherein the delegation information comprises the processing conditions for processing the target characteristic value. Correspondingly, the principal node in the block chain determines a processor node for processing the target characteristic value, and generates a processing application including a processor identifier corresponding to the processor node. And acquiring related information of the processor node through the processor identifier so as to determine whether the processor node meets the processing condition required by the consignor node, and if so, performing uplink processing on the processing application and transferring the target characteristic value to the processor node based on the processing application. The method and the device have the advantages that whether the processing side node meets the processing requirements of the entrusting side node or not is judged, the entrusted side node is not judged, the processing conditions provided by the entrusting side node are directly judged, the condition that the determined processing side node does not meet the processing conditions is avoided, and the possibility that the change trend of the target characteristic value in the data processing process meets the data processing expectation is improved.
The embodiment of the present application further provides an apparatus for data processing, which is described below with reference to the accompanying drawings. Referring to fig. 5, an embodiment of the present application provides an apparatus 500 for processing, where the apparatus 500 may also be a terminal apparatus, and the terminal apparatus may be any intelligent terminal including a mobile phone, a tablet computer, a Personal Digital Assistant (PDA), a Point of Sales (POS), a vehicle-mounted computer, and the terminal apparatus is a mobile phone:
fig. 5 is a block diagram illustrating a partial structure of a mobile phone related to a terminal device provided in an embodiment of the present application. Referring to fig. 5, the handset includes: a Radio Frequency (RF) circuit 510, a memory 520, an input unit 530, a display unit 540, a sensor 550, an audio circuit 560, a wireless fidelity (WiFi) module 570, a processor 580, and a power supply 590. Those skilled in the art will appreciate that the handset configuration shown in fig. 5 is not intended to be limiting and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components.
The following describes each component of the mobile phone in detail with reference to fig. 5:
RF circuit 510 may be used for receiving and transmitting signals during information transmission and reception or during a call, and in particular, for processing downlink information of a base station after receiving the downlink information to processor 580; in addition, the data for designing uplink is transmitted to the base station. In general, RF circuit 510 includes, but is not limited to, an antenna, at least one Amplifier, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, RF circuit 510 may also communicate with networks and other devices via wireless communication. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Message Service (SMS), and the like.
The memory 520 may be used to store software programs and modules, and the processor 580 executes various functional applications and data processing of the mobile phone by operating the software programs and modules stored in the memory 520. The memory 520 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data (such as audio data, a phonebook, etc.) created according to the use of the cellular phone, and the like. Further, the memory 520 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device.
The input unit 530 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the cellular phone. Specifically, the input unit 530 may include a touch panel 531 and other input devices 532. The touch panel 531, also called a touch screen, can collect touch operations of a user on or near the touch panel 531 (for example, operations of the user on or near the touch panel 531 by using any suitable object or accessory such as a finger or a stylus pen), and drive the corresponding connection device according to a preset program. Alternatively, the touch panel 531 may include two parts, a touch detection device and a touch controller. The touch detection device detects the touch direction of a user, detects a signal brought by touch operation and transmits the signal to the touch controller; the touch controller receives touch information from the touch sensing device, converts the touch information into touch point coordinates, and sends the touch point coordinates to the processor 580, and can receive and execute commands sent by the processor 580. In addition, the touch panel 531 may be implemented by various types such as a resistive type, a capacitive type, an infrared ray, and a surface acoustic wave. The input unit 530 may include other input devices 532 in addition to the touch panel 531. In particular, other input devices 532 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 540 may be used to display information input by the user or information provided to the user and various menus of the mobile phone. The Display unit 540 may include a Display panel 541, and optionally, the Display panel 541 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like. Further, the touch panel 531 may cover the display panel 541, and when the touch panel 531 detects a touch operation on or near the touch panel 531, the touch panel is transmitted to the processor 580 to determine the type of the touch event, and then the processor 580 provides a corresponding visual output on the display panel 541 according to the type of the touch event. Although the touch panel 531 and the display panel 541 are shown as two separate components in fig. 5 to implement the input and output functions of the mobile phone, in some embodiments, the touch panel 531 and the display panel 541 may be integrated to implement the input and output functions of the mobile phone.
The handset may also include at least one sensor 550, such as a light sensor, motion sensor, and other sensors. Specifically, the light sensor may include an ambient light sensor and a proximity sensor, wherein the ambient light sensor may adjust the brightness of the display panel 541 according to the brightness of ambient light, and the proximity sensor may turn off the display panel 541 and/or the backlight when the mobile phone is moved to the ear. As one of the motion sensors, the accelerometer sensor can detect the magnitude of acceleration in each direction (generally, three axes), can detect the magnitude and direction of gravity when stationary, and can be used for applications of recognizing the posture of a mobile phone (such as horizontal and vertical screen switching, related games, magnetometer posture calibration), vibration recognition related functions (such as pedometer and tapping), and the like; as for other sensors such as a gyroscope, a barometer, a hygrometer, a thermometer, and an infrared sensor, which can be configured on the mobile phone, further description is omitted here.
Audio circuitry 560, speaker 561, and microphone 562 may provide an audio interface between a user and a cell phone. The audio circuit 560 may transmit the electrical signal converted from the received audio data to the speaker 561, and convert the electrical signal into a sound signal by the speaker 561 for output; on the other hand, the microphone 562 converts the collected sound signals into electrical signals, which are received by the audio circuit 560 and converted into audio data, which are then processed by the audio data output processor 580, and then passed through the RF circuit 510 to be sent to, for example, another cellular phone, or output to the memory 520 for further processing.
WiFi belongs to short distance wireless transmission technology, and the mobile phone can help the user to send and receive e-mail, browse web pages, access streaming media, etc. through the WiFi module 570, which provides wireless broadband internet access for the user. Although fig. 5 shows the WiFi module 570, it is understood that it does not belong to the essential constitution of the handset, and can be omitted entirely as needed within the scope not changing the essence of the invention.
The processor 580 is a control center of the mobile phone, connects various parts of the entire mobile phone by using various interfaces and lines, and performs various functions of the mobile phone and processes data by operating or executing software programs and/or modules stored in the memory 520 and calling data stored in the memory 520, thereby performing overall monitoring of the mobile phone. Alternatively, processor 580 may include one or more processing units; preferably, the processor 580 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into processor 580.
The handset also includes a power supply 590 (e.g., a battery) for powering the various components, which may preferably be logically coupled to the processor 580 via a power management system, such that the power management system may be used to manage charging, discharging, and power consumption.
Although not shown, the mobile phone may further include a camera, a bluetooth module, etc., which are not described herein.
In this embodiment, the processor 580 included in the terminal device further has the following functions:
acquiring entrusting information sent by an entrusting party node in a block chain, wherein the entrusting information comprises a processing condition for processing a target characteristic value of the entrusting party;
acquiring a processing application of a trusted party node in a block chain, wherein the processing application comprises a processor identifier corresponding to the processor node in the block chain;
determining whether the processor node meets the processing condition according to the processor identifier;
and if so, performing uplink processing on the processing application, and transferring the target characteristic value to the processor node based on the processing application.
The device for determining a drop-off site provided in this embodiment may be a server, please refer to fig. 6, where fig. 6 is a structural diagram of the server 600 provided in this embodiment, and the server 600 may generate a relatively large difference due to different configurations or performances, and may include one or more Central Processing Units (CPUs) 1622 (e.g., one or more processors) and a memory 632, and one or more storage media 630 (e.g., one or more mass storage devices) storing an application 642 or data 644. Memory 632 and storage medium 630 may be, among other things, transient or persistent storage. The program stored in the storage medium 630 may include one or more modules (not shown), each of which may include a series of instruction operations for the server. Still further, the central processor 622 may be configured to communicate with the storage medium 630 and execute a series of instruction operations in the storage medium 630 on the server 600.
The server 600 may also include one or more power supplies 626, one or more wired or wireless network interfaces 650, one or more input-output interfaces 658, and/or one or more operating systems 641, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
The steps performed by the server in the above embodiments may be based on the server structure shown in fig. 6.
The CPU 622 is configured to execute the following steps:
acquiring entrusting information sent by an entrusting party node in a block chain, wherein the entrusting information comprises a processing condition for processing a target characteristic value of the entrusting party;
acquiring a processing application of a trusted party node in a block chain, wherein the processing application comprises a processor identifier corresponding to the processor node in the block chain;
determining whether the processor node meets the processing condition according to the processor identifier;
and if so, performing uplink processing on the processing application, and transferring the target characteristic value to the processor node based on the processing application.
The terms "first," "second," "third," "fourth," and the like in the description of the application and the above-described figures, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The above embodiments are only used for illustrating the technical solutions of the present application, and not for limiting the same; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions in the embodiments of the present application.
Those of ordinary skill in the art will understand that: all or part of the steps for realizing the method embodiments can be completed by hardware related to program instructions, the program can be stored in a computer readable storage medium, and the program executes the steps comprising the method embodiments when executed; and the aforementioned storage medium may be at least one of the following media: various media that can store program codes, such as read-only memory (ROM), RAM, magnetic disk, or optical disk.
It should be noted that, in the present specification, all the embodiments are described in a progressive manner, and the same and similar parts among the embodiments may be referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, they are described in a relatively simple manner, and reference may be made to some of the descriptions of the method embodiments for related points. The above-described embodiments of the apparatus and system are merely illustrative, and the units described as separate parts may or may not be physically separate, and the parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. One of ordinary skill in the art can understand and implement it without inventive effort.
The above description is only one specific embodiment of the present application, but the scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (13)

1. A method of data processing, the method comprising:
acquiring entrusting information sent by an entrusting party node in a block chain, wherein the entrusting information comprises a processing condition for processing a target characteristic value of the entrusting party, a transfer condition and a transferred party identifier corresponding to a transferred party node;
acquiring a processing application of a trusted node in the block chain, wherein the processing application comprises a processor identifier corresponding to a processor node in the block chain;
determining whether the processor node meets the processing condition according to the processor identifier;
if so, performing uplink processing on the processing application, and transferring the target characteristic value to the processor node based on the processing application;
determining a first characteristic value added by the processing side node in the process of processing the target characteristic value;
determining a second characteristic value from the first characteristic values according to the transfer condition;
transferring the second feature value from the processing node to the transferee node according to the transferee identification.
2. The method of claim 1, wherein said transferring the target feature value to the processor node based on the processing application comprises:
transferring the target feature value from the principal node to the processing side node based on the processing application.
3. The method of claim 1, wherein after said transferring the target feature value to the processor node based on the processing application, the method further comprises:
acquiring an execution application of the processor node, wherein the execution application comprises a processing mode of the processor node on the target characteristic value;
and if the processing mode meets the authentication condition of the block chain, performing uplink processing on the execution application.
4. The method of claim 1, wherein after the determining the first feature value added by the processor node in processing the target feature value, the method further comprises:
if the first characteristic value is not determined or the first characteristic value is determined not to meet the transfer condition, determining a second characteristic value from the consignor node according to the transfer condition;
transferring the second feature value from the principal node to the transferee node.
5. The method of claim 1, wherein the delegation information further includes a delegate identifier corresponding to a delegate node, and wherein after determining a second feature value from the first feature values according to the transition condition, the method further comprises:
determining a third characteristic value from the first characteristic values according to the transfer condition;
and transferring the third characteristic value from the processing side node to the consignor node according to the consignor identifier.
6. The method of claim 1, wherein the delegation information further includes a delegation identifier corresponding to the delegation node and a value of the target feature value, and wherein the method further comprises:
acquiring verification information generated by the authorized party node, wherein the verification information is determined by the authorized party according to the magnitude relation between the entrustable characteristic value of the authorized party node and the target characteristic value, and the entrustable characteristic value is determined according to the identification of the entrusting party;
and determining whether to carry out uplink processing on the entrusted information according to the verification information.
7. A data processing apparatus characterized by comprising a first acquisition unit, a second acquisition unit, a first determination unit, a first transfer unit, a second determination unit, a third determination unit, and a second transfer unit:
the first acquisition unit is used for acquiring entrusting information sent by an entrusting party node in a block chain, and the entrusting information comprises processing conditions for processing a target characteristic value of the entrusting party;
the second obtaining unit is configured to obtain a processing application of a trusted node in the blockchain, where the processing application includes a handler identifier corresponding to a handler node in the blockchain;
the first determination unit is used for determining whether the processor node meets the processing condition according to the processor identifier;
the first transfer unit is configured to, if it is determined that the processor node meets the processing condition, perform uplink processing on the processing application, and transfer the target feature value to the processor node based on the processing application;
the second determining unit is configured to determine, after the target feature value is transferred to the processing-side node, a first feature value added by the processing-side node in a process of processing the target feature value, where the delegation information further includes a transfer condition and a transferred-side identifier corresponding to a transferred-side node;
the third determining unit is used for determining a second characteristic value from the first characteristic values according to the transfer condition;
the second transfer unit is configured to transfer the second feature value from the processing node to the transferred node according to the transferred identifier.
8. The apparatus according to claim 7, wherein the first transfer unit is specifically configured to:
transferring the target feature value from the principal node to the processing side node based on the processing application.
9. The apparatus of claim 7, further comprising a third acquisition unit and a uplink unit:
the third obtaining unit is configured to obtain an execution application of the processor node after the target feature value is transferred to the processor node based on the processing application, where the execution application includes a processing manner of the processor node on the target feature value;
and the uplink unit is used for performing uplink processing on the execution application if the processing mode meets the authentication condition of the block chain.
10. The apparatus according to claim 7, characterized in that the apparatus further comprises a fourth determination unit and a third transfer unit:
the fourth determining unit is configured to, after the determining of the first feature value added by the processing-side node in the process of processing the target feature value, determine a second feature value from the entrusting-side node according to the transfer condition if the first feature value is not determined or the first feature value is determined not to satisfy the transfer condition;
the third transfer unit is configured to transfer the second feature value from the requester node to the transferee node.
11. The apparatus according to claim 7, characterized in that the apparatus further comprises a fifth determining unit and a fourth transferring unit:
the fifth determining unit is configured to determine, after the second feature value is determined from the first feature value according to the transfer condition, a third feature value from the first feature value according to the transfer condition, where the delegation information further includes a delegation party identifier corresponding to a delegation party node;
and the fourth transfer unit is configured to transfer the third feature value from the processing-side node to the principal-side node according to the principal identifier.
12. An apparatus for data processing, the apparatus comprising a processor and a memory:
the memory is used for storing program codes and transmitting the program codes to the processor;
the processor is configured to perform the data processing method of any one of claims 1 to 6 according to instructions in the program code.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium is configured to store a program code for executing the data processing method of any one of claims 1 to 6.
CN201910774646.8A 2019-08-21 2019-08-21 Data processing method and device Active CN110489488B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910774646.8A CN110489488B (en) 2019-08-21 2019-08-21 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910774646.8A CN110489488B (en) 2019-08-21 2019-08-21 Data processing method and device

Publications (2)

Publication Number Publication Date
CN110489488A CN110489488A (en) 2019-11-22
CN110489488B true CN110489488B (en) 2021-06-15

Family

ID=68552615

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910774646.8A Active CN110489488B (en) 2019-08-21 2019-08-21 Data processing method and device

Country Status (1)

Country Link
CN (1) CN110489488B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111563273A (en) * 2020-04-30 2020-08-21 中国银行股份有限公司 Information verification method and related equipment

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106991164A (en) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 Method, device and electronic equipment that finance data is handled are used for based on block chain
CN107301536A (en) * 2017-06-12 2017-10-27 腾讯科技(深圳)有限公司 Resource transfers method and device
CN108053198A (en) * 2017-12-28 2018-05-18 广东蜂助手网络技术股份有限公司 A kind of Digital Media transaction system based on block chain technology
CN108540568A (en) * 2018-04-23 2018-09-14 移康智能科技(上海)股份有限公司 Computing capability sharing method and smart machine
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN108805570A (en) * 2018-06-01 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN108885760A (en) * 2016-02-22 2018-11-23 科因普拉格株式会社 Financial institution's certificate based on block chain distorts verifying system and method
CN109040168A (en) * 2018-06-08 2018-12-18 浙江捷尚人工智能研究发展有限公司 Block chain information transmission method, electronic equipment, storage medium and system
CN109086140A (en) * 2018-08-21 2018-12-25 上海点融信息科技有限责任公司 The method, apparatus and storage medium of data processing are carried out in block chain
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
CN109240826A (en) * 2018-08-15 2019-01-18 泰链(厦门)科技有限公司 Multi-tiling chain network interior joint shares computational resource allocation method when calculating equipment
CN109257427A (en) * 2018-09-26 2019-01-22 网宿科技股份有限公司 A kind of method for processing business and system based on block chain
CN109299058A (en) * 2018-11-06 2019-02-01 北京新唐思创教育科技有限公司 Academic storage method, academic querying method and computer storage medium
CN109472593A (en) * 2018-10-10 2019-03-15 远光软件股份有限公司 A kind of settlement method based on block chain technology, device and block chain network
CN109640175A (en) * 2018-11-21 2019-04-16 齐乐无穷(北京)文化传媒有限公司 A kind of block chain encipher-decipher method based on video file
CN109727135A (en) * 2019-01-23 2019-05-07 昧来网络科技(上海)有限公司 Promote method, the computer-readable medium of the operation of block chain information and processing capacity
CN109784882A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device
CN109981586A (en) * 2019-02-27 2019-07-05 北京柏链基石科技有限公司 A kind of vertex ticks method and device
CN110009510A (en) * 2019-01-22 2019-07-12 阿里巴巴集团控股有限公司 Transaction processing system, method, calculating equipment and storage medium based on block chain
CN110033260A (en) * 2018-12-14 2019-07-19 阿里巴巴集团控股有限公司 The method of payment and device of service fee, electronic equipment
CN110033387A (en) * 2019-04-12 2019-07-19 泰康保险集团股份有限公司 Claims Resolution data processing method, device, medium and electronic equipment based on block chain
CN110060146A (en) * 2019-04-03 2019-07-26 平安普惠企业管理有限公司 A kind of data transfering method and relevant device

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108885760A (en) * 2016-02-22 2018-11-23 科因普拉格株式会社 Financial institution's certificate based on block chain distorts verifying system and method
CN106991164A (en) * 2017-03-31 2017-07-28 北京京东金融科技控股有限公司 Method, device and electronic equipment that finance data is handled are used for based on block chain
CN107301536A (en) * 2017-06-12 2017-10-27 腾讯科技(深圳)有限公司 Resource transfers method and device
CN108053198A (en) * 2017-12-28 2018-05-18 广东蜂助手网络技术股份有限公司 A kind of Digital Media transaction system based on block chain technology
CN108540568A (en) * 2018-04-23 2018-09-14 移康智能科技(上海)股份有限公司 Computing capability sharing method and smart machine
CN108696514A (en) * 2018-04-27 2018-10-23 腾讯科技(深圳)有限公司 Resource collects task management method, device, storage medium and system
CN108805570A (en) * 2018-06-01 2018-11-13 腾讯科技(深圳)有限公司 Data processing method, device and storage medium
CN109040168A (en) * 2018-06-08 2018-12-18 浙江捷尚人工智能研究发展有限公司 Block chain information transmission method, electronic equipment, storage medium and system
CN109102299A (en) * 2018-08-01 2018-12-28 腾讯科技(深圳)有限公司 Resource transfers data managing method, device and storage medium
CN109240826A (en) * 2018-08-15 2019-01-18 泰链(厦门)科技有限公司 Multi-tiling chain network interior joint shares computational resource allocation method when calculating equipment
CN109086140A (en) * 2018-08-21 2018-12-25 上海点融信息科技有限责任公司 The method, apparatus and storage medium of data processing are carried out in block chain
CN109257427A (en) * 2018-09-26 2019-01-22 网宿科技股份有限公司 A kind of method for processing business and system based on block chain
CN109472593A (en) * 2018-10-10 2019-03-15 远光软件股份有限公司 A kind of settlement method based on block chain technology, device and block chain network
CN109299058A (en) * 2018-11-06 2019-02-01 北京新唐思创教育科技有限公司 Academic storage method, academic querying method and computer storage medium
CN109640175A (en) * 2018-11-21 2019-04-16 齐乐无穷(北京)文化传媒有限公司 A kind of block chain encipher-decipher method based on video file
CN109784882A (en) * 2018-12-14 2019-05-21 深圳壹账通智能科技有限公司 Alliance's chain information distribution control method and terminal device
CN110033260A (en) * 2018-12-14 2019-07-19 阿里巴巴集团控股有限公司 The method of payment and device of service fee, electronic equipment
CN110009510A (en) * 2019-01-22 2019-07-12 阿里巴巴集团控股有限公司 Transaction processing system, method, calculating equipment and storage medium based on block chain
CN109727135A (en) * 2019-01-23 2019-05-07 昧来网络科技(上海)有限公司 Promote method, the computer-readable medium of the operation of block chain information and processing capacity
CN109981586A (en) * 2019-02-27 2019-07-05 北京柏链基石科技有限公司 A kind of vertex ticks method and device
CN110060146A (en) * 2019-04-03 2019-07-26 平安普惠企业管理有限公司 A kind of data transfering method and relevant device
CN110033387A (en) * 2019-04-12 2019-07-19 泰康保险集团股份有限公司 Claims Resolution data processing method, device, medium and electronic equipment based on block chain

Also Published As

Publication number Publication date
CN110489488A (en) 2019-11-22

Similar Documents

Publication Publication Date Title
WO2018177124A1 (en) Service processing method and device, data sharing system and storage medium
CN111066284B (en) Service certificate management method, terminal and server
WO2019158001A1 (en) Blockchain generating method, and related device and system
CN103729765B (en) A kind of authentication control method, terminal, server, terminal device and system
WO2018145554A1 (en) Data processing method, related device and system, and computer readable storage medium
US20160253664A1 (en) Attestation by proxy
WO2018019261A1 (en) Resource transfer method and apparatus
CN110401715A (en) Resource collects task management method, device, storage medium and system
CN111064713B (en) Node control method and related device in distributed system
US20190205976A1 (en) Account number registration method, apparatus, and system
CN113821803B (en) Security architecture system, security management method and computing device
CN110650216A (en) Cloud service request method and device
WO2018233584A1 (en) Method, device, computer apparatus, and storage medium for transferring account value
CN110601858B (en) Certificate management method and device
CN110489488B (en) Data processing method and device
CN113506100B (en) Alliance chain data processing method, device, computer equipment and storage medium
CN114092101B (en) Transaction verification method and device, storage medium and electronic equipment
CN110532324A (en) Notice information methods of exhibiting, device, equipment and storage medium based on block chain
CN113935070B (en) Data processing method, device and equipment based on block chain and storage medium
CN110570289A (en) service processing method, device, equipment and storage medium based on block chain
CN111476562A (en) Virtual resource transfer method, device, electronic equipment and storage medium
CN113378221B (en) Account information processing method and device
CN105490810B (en) Method, device and system for processing virtual resource data
CN113806801B (en) Transaction information uplink method, device, computer equipment and storage medium
CN114745374B (en) File transmission method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40016871

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant