CN110889140A - Data processing method and storage medium - Google Patents

Data processing method and storage medium Download PDF

Info

Publication number
CN110889140A
CN110889140A CN201911209939.8A CN201911209939A CN110889140A CN 110889140 A CN110889140 A CN 110889140A CN 201911209939 A CN201911209939 A CN 201911209939A CN 110889140 A CN110889140 A CN 110889140A
Authority
CN
China
Prior art keywords
user
information
object information
target object
dimensional code
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911209939.8A
Other languages
Chinese (zh)
Inventor
蔡弋戈
秦青
王乐庆
杨晨
李琴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911209939.8A priority Critical patent/CN110889140A/en
Publication of CN110889140A publication Critical patent/CN110889140A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention discloses a data processing method and a storage medium, wherein the method comprises the following steps: the method comprises the steps of obtaining target object information matched with first user information from a storage area, obtaining a public key of a second user based on second user information, encrypting the target object information through the public key of the second user, further generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to the second user, so that the second user can recognize the two-dimensional code after receiving the two-dimensional code, and decrypt the two-dimensional code information based on a private key of the second user to obtain the target object information of the first user. By implementing the embodiment of the invention, the target object information of the first user can be quickly obtained, and the query efficiency of the object information is favorably improved.

Description

Data processing method and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a data processing method and a storage medium.
Background
In recent years, due to the rapid development of network technologies, computers have been applied to aspects of our lives, and we have gone around with social intercourse, travel, shopping, travel, marriage, education, insurance, and the like, without digitalization and informatization. Mobile internet and information technology have gradually changed our past lifestyle.
Conventionally, in the query of object information (for example, personal education history information, marital information, insurance information, and the like), an individual cannot query object information of another person due to privacy problems, and if one person (hereinafter, referred to as a second user) wants to know object information of the other person (hereinafter, referred to as a first user), the first user can query the object information through a relevant organization and then inform the second user, which results in low query efficiency.
Disclosure of Invention
The embodiment of the invention provides a data processing method and a storage medium, which can improve the query efficiency of object information.
In one aspect, an embodiment of the present invention provides a data processing method, where the method is applied to a node of a blockchain network, and the method includes:
receiving an authorization request submitted by a first user and used for authorizing a second user to perform object information query, wherein the authorization request comprises first user information of the first user and second user information of the second user;
acquiring target object information matched with the first user information from a storage area;
acquiring a public key of the second user based on the second user information, and encrypting the target object information through the public key of the second user;
and generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to the second user.
On the other hand, an embodiment of the present invention provides another data processing method, where the method includes:
acquiring a two-dimensional code comprising target object information of a first user, wherein the two-dimensional code is generated based on the target object information encrypted by a public key of a second user;
identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code;
decrypting the two-dimensional code information based on the private key of the second user to obtain the target object information;
and outputting the target object information in a display interface.
In another aspect, an embodiment of the present invention provides a data processing apparatus, where the apparatus includes:
the system comprises a communication module, a first object information query module and a second object information query module, wherein the communication module is used for receiving an authorization request submitted by a first user and used for authorizing a second user to perform object information query, and the authorization request comprises first user information of the first user and second user information of the second user;
the processing module is used for acquiring target object information matched with the first user information from the storage area;
the processing module is further configured to obtain a public key of the second user based on the second user information, encrypt the target object information through the public key of the second user, and generate a two-dimensional code according to the encrypted target object information;
the communication module is further configured to send the two-dimensional code to the second user.
In another aspect, an embodiment of the present invention provides another data processing apparatus, where the apparatus includes:
the acquisition module is used for acquiring a two-dimensional code comprising target object information of a first user, wherein the two-dimensional code is generated based on the target object information encrypted by a public key of a second user;
the processing module is used for identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code;
the processing module is further configured to decrypt the two-dimensional code information based on the private key of the second user to obtain the target object information;
and the output module is used for outputting the target object information in a display interface.
In another aspect, an embodiment of the present invention provides an electronic device, including a processor, a memory, and a communication interface, where the processor, the memory, and the communication interface are connected to each other, where the memory is used to store a computer program that supports a terminal to execute the foregoing method, and the computer program includes program instructions, and the processor is configured to call the program instructions to perform the following steps: receiving an authorization request submitted by a first user and used for authorizing a second user to perform object information query through a communication interface, wherein the authorization request comprises first user information of the first user and second user information of the second user; acquiring target object information matched with the first user information from a storage area; acquiring a public key of the second user based on the second user information, and encrypting the target object information through the public key of the second user; and generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to the second user through a communication interface.
In another aspect, an embodiment of the present invention provides a terminal device, including a processor, a memory, a communication interface, and an output device, where the processor, the memory, the communication interface, and the output device are connected to each other, where the memory is used to store a computer program that supports a terminal to execute the foregoing method, the computer program includes program instructions, and the processor is configured to call the program instructions and perform the following steps: acquiring a two-dimensional code comprising target object information of a first user, wherein the two-dimensional code is generated based on the target object information encrypted by a public key of a second user; identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code; decrypting the two-dimensional code information based on the private key of the second user to obtain the target object information; and outputting the target object information in a display interface through the output equipment.
In still another aspect, an embodiment of the present invention provides a computer-readable storage medium, in which computer program instructions are stored, and when the computer program instructions are executed by a processor, the computer program instructions are used to execute the data processing method.
In the embodiment of the invention, a node of the block chain network can acquire target object information matched with first user information from a storage area, acquire a public key of a second user based on second user information, encrypt the target object information through the public key of the second user, further generate a two-dimensional code according to the encrypted target object information, and send the two-dimensional code to the second user, so that the second user can recognize the two-dimensional code after receiving the two-dimensional code and decrypt the two-dimensional code information based on a private key of the second user to obtain the target object information of the first user. By adopting the mode, the second user can quickly obtain the target object information of the first user, and the query efficiency of the object information is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic structural diagram of a block chain according to an embodiment of the present invention;
FIG. 2 is a block diagram of a data processing system according to an embodiment of the present invention;
FIG. 3 is an interaction flow diagram of a data processing method according to an embodiment of the present invention;
FIG. 4 is a block diagram of an alternative data processing system, according to an embodiment of the present invention;
FIG. 5 is a schematic flow chart diagram of a data processing method according to an embodiment of the present invention;
FIG. 6 is a schematic flow chart diagram of a data processing method according to another embodiment of the present invention;
fig. 7 is a schematic block diagram of a data processing apparatus according to an embodiment of the present invention;
fig. 8 is a schematic block diagram of an electronic device according to an embodiment of the present invention;
fig. 9 is a schematic block diagram of another data processing apparatus proposed by an embodiment of the present invention;
fig. 10 is a schematic block diagram of a terminal device according to an embodiment of the present invention.
Detailed Description
The Block Chain (Block Chain) is a Chain data structure which combines data blocks in a sequential connection mode according to a time sequence and is a distributed book which is cryptographically used for ensuring that the data cannot be tampered and forged. Multiple independent distributed nodes (i.e., block-linked node devices) maintain the same record. The blockchain technology realizes decentralization and becomes a foundation for credible digital asset storage, transfer and transaction.
Taking the block chain structure diagram shown in fig. 1 as an example, when new data needs to be written into the block chain, the data is collected into a block (block) and added to the end of the existing block chain, and the newly added block of each node is ensured to be identical through a consensus algorithm. A plurality of transaction records are recorded in each block, and the transaction records also comprise the hash (hash) value of the previous block, and all blocks store the hash value of the previous block in the way and are connected in sequence to form a block chain. The hash value of the previous block is stored in the block head of the next block in the block chain, and when the transaction data in the current block changes, the hash value of the block is changed, so that the transaction data uploaded to the block chain network is difficult to tamper, the transaction is carried out on the block chain, the transaction process is transparent, and the reliability of the transaction data is improved.
In order to better understand a data processing method disclosed in the embodiment of the present invention, a block chain system to which the embodiment of the present invention is applicable is first described below.
Referring to fig. 2, fig. 2 is a schematic diagram of an architecture of a data processing system according to an embodiment of the present disclosure. As shown in fig. 2, the data processing system includes at least one terminal device 200 and a blockchain network 201, where the blockchain network 201 includes a plurality of nodes, such as a first node 2010 and a second node 2011 shown in fig. 2, it should be noted that the blockchain network 201 shown in fig. 2 is composed of the first node 2010 and the two second nodes 2011, which is only for example and does not constitute a limitation to the embodiments of the present application. For example, in another example, the blockchain network 201 may be comprised of one first node 2010 and four second nodes 2011.
In one embodiment, the first node 2010 may be any one of the blockchain nodes in the blockchain network, and the first node 2010 may transmit the two-dimensional code to the terminal device 200. In an embodiment, the first node 2010 may be a block link point device closest to the terminal device 200, and the first node 2010 may also be a block link node device with the best communication quality with the terminal device 200, which is not limited herein.
In one embodiment, the first nodes 2010 are selected from all first nodes in the blockchain network according to a consensus algorithm, wherein the consensus algorithm includes, but is not limited to, a Proof of workload (Proof of Work, PoW) algorithm, a Proof of rights (Proof of stamp, PoS) algorithm, a granted Proof of rights (DPoS) algorithm, a Practical Byzantine Fault Tolerant (PBFT) algorithm, and the like. The first node 2010 may also be obtained by periodic election through a consensus algorithm, and the first nodes 2010 obtained by periodic election in different periods may be the same or different.
Referring to fig. 3 for a data processing system proposed in fig. 2, fig. 3 is an interaction schematic diagram of a data processing method disclosed in an embodiment of the present application, where a first user may send, through a terminal device (i.e., a terminal device corresponding to the first user), an authorization request for authorizing a second user to perform object information query to a node of a blockchain network in S301, where the authorization request includes first user information of the first user and second user information of the second user. Further, after receiving the authorization request, the node may obtain, in S302, target object information matched with the first user information from the storage area, obtain a public key of the second user based on the second user information, encrypt, in S303, the target object information with the public key of the second user, generate a two-dimensional code according to the encrypted target object information, and send, in S304, the two-dimensional code to the second user. Further, after the second user receives the two-dimensional code through the terminal device (i.e., the terminal device corresponding to the second user), the terminal device may identify the two-dimensional code in S305 to obtain two-dimensional code information corresponding to the two-dimensional code, and decrypt the two-dimensional code information based on the private key of the second user to obtain the target object information. Further, the target object information is output in the display interface in S306 by the terminal device. The object information may include personal education experience information, marital information, insurance information, travel contract information, and the like.
Referring to fig. 4, fig. 4 is a schematic diagram of an architecture of a data processing system according to an embodiment of the present application. As shown in fig. 4, the data processing system includes a third platform 400, a blockchain network 401, where the blockchain network 401 includes a plurality of nodes, such as a first node 4010 and a second node 4011 shown in fig. 4, where any node in the blockchain network 401 may be a server corresponding to the third platform 400, such as the first node 4010. In this case, the first user and the second user may be identity bound through the third platform 400 (e.g., an applet) such that the third platform possesses public keys to which the users of the bound identity (i.e., the first user and the second user) belong. When the first user wants to authorize the second user to query the object information of the first user, the user information of the first user and the user information of the second user can be input through the third platform, and an authorization request for authorizing the second user to query the object information is submitted. And the user information of the second user comprises account information of the second user on a third platform. Further, after receiving an authorization request submitted by a first user and used for authorizing a second user to query object information, a server (the server is a node in the blockchain network) corresponding to the third platform 400 may obtain target object information matched with the first user information from the storage area, obtain a public key of the second user based on the second user information, encrypt the target object information by using the public key of the second user, generate a two-dimensional code according to the encrypted target object information, and bind the two-dimensional code with account information of the second user in the third platform 400. Further, after the second user logs in the third platform 400 through the own account information, the two-dimensional code may be recognized to obtain two-dimensional code information corresponding to the two-dimensional code, the two-dimensional code information is decrypted based on a private key of the second user to obtain target object information, and then the target object information is output in a display interface corresponding to the third platform 400. In this way, the second user can quickly query the target object information of the first user through the third platform.
The data processing method provided by the embodiment of the invention can be applied to the fields of social contact, travel, shopping, travel, marriage, education, insurance and the like, and the object information can comprise personal education experience information, marital information, insurance information, travel contract information and the like, wherein in the case of marriage, the knowledge ways of two parties of marriage comprise introduction of acquaintances or marriage partners, marriage website marriage and the like. In the process of recognizing both parties of marriage and love, the parties may not know the respective marriage information (for example, whether the marriage status is married), the communication between both parties of marriage and love lacks security guarantee, and there may be a risk of marriage if one party is in the married status. Therefore, it is important in the field of marriage to inquire about marriage information of one or both parties.
At present, for the query of marital information, due to privacy problems, individuals cannot query the marital information of other people, if a party of marriage (hereinafter, referred to as a second user) wants to know the marital information of the other party (hereinafter, referred to as a first user), the first user can carry own identity document to a related mechanism (such as a public security bureau, a marital registration authority, and the like) to query, and then inform the second user, and the query efficiency is low.
Based on the data processing method provided by the embodiment of the invention, the object information can comprise marital information, and the block chain and two-dimensional code technology can be applied to the field of marital information query, so that a second user can rapidly query the marital information of a first user, and the marital information query efficiency can be improved.
It is to be understood that the data processing system described in the embodiment of the present invention is for more clearly illustrating the technical solution of the embodiment of the present invention, and does not constitute a limitation to the technical solution provided in the embodiment of the present invention, and as a person having ordinary skill in the art knows that along with the evolution of the system architecture and the appearance of a new service scenario, the technical solution provided in the embodiment of the present invention is also applicable to similar technical problems.
Referring to fig. 5 again, it is a schematic flow chart of a data processing method according to an embodiment of the present invention, where the method according to an embodiment of the present invention may be executed by a node of a blockchain network, where the node may be any node accessing to the blockchain network, and the node may be any form of electronic device, such as a server, a user terminal, and the like. The method of an embodiment of the present invention includes the following steps.
S501: and receiving an authorization request submitted by a first user and used for authorizing a second user to perform object information query, wherein the authorization request comprises first user information of the first user and second user information of the second user. The first user information and the second user information may include identity information (e.g., name, gender, native place, age, identification number, etc.) of the first user and the second user, respectively. The object information may include personal education experience information, marital information, insurance information, travel contract information, and the like, and the marital information includes, for example, one or more of a marital status (e.g., married, not married), a historical number of maritals, and a time of existence (e.g., one year, two years, etc.) of each marital of the first user.
In an embodiment, when a first user wants to authorize a second user to query own object information, an authorization request carrying the first user information and the second user information may be uploaded to a node of a block chain network through a terminal device, so as to authorize the second user to query own object information.
S502: target object information matching the first user information is acquired from the storage area.
The storage area may be an object information query mechanism communicatively connected to the node (for example, if the object information is marital information, the object information query mechanism may be a marital information query mechanism), may also be a local storage area, and may also be a blockchain maintained by a blockchain network. In one embodiment, the storage area is a marital information inquiry mechanism which is in communication connection with the node, and when the node receives an authorization request sent by a first user for authorizing a second user to perform object information inquiry, target object information matched with the first user information, namely the target object information of the first user, can be inquired from the marital information inquiry mechanism which is connected in advance based on the first user information.
In another embodiment, before the node acquires the target object information matched with the first user information from the storage area, the node may further crawl user information and object information of each user from the target website based on object data crawling rules configured for the target website, and store the user information and the object information of each user in the storage area in an associated manner. The target website may be a website corresponding to the target information query mechanism. In this case, after receiving an authorization request sent by the first user to authorize the second user to perform object information query, the node may screen out target object information matching the first user information from object information of each user stored in the storage area. The storage area may be a local storage area of a node, or a blockchain maintained by a blockchain network. The target website may be a website including object information, and for example, assuming that the object information is personal education experience information, the target website may be a learning website or the like; assuming that the object information is marital information, the target website may be a website corresponding to a marital information inquiry mechanism.
In another embodiment, the storage area includes a blockchain maintained by a blockchain network, and before the node acquires target object information matching the first user information from the storage area, an object information upload request submitted by the first user may be further received, where the object information upload request includes the object information of the first user and the user information of the first user. Further, the node may perform consensus verification on the object information of the first user and the user information of the first user, and write the object information of the first user and the user information of the first user into the block chain if the consensus verification passes. Further, after receiving an authorization request sent by a first user for authorizing a second user to perform object information query, the node may obtain target object information matched with the first user information from the blockchain. By adopting the mode, the credibility of the acquired object information can be improved by utilizing the characteristics that the block chain is not falsifiable and not faked.
Or, after receiving the object information uploading request submitted by the first user, the node may write the object information of the first user and the user information of the first user into the blockchain, and may also store the object information of the first user and the user information of the first user in the local storage area. The present invention is not particularly limited in this regard.
In one embodiment, the object information includes marital information, and the node may periodically detect a change in a marital status of the first user, and if it is detected that the marital of the first user is changed, may obtain current marital information of the first user based on the first user information, and adjust the marital information of the first user stored in the storage area based on the current marital information of the first user.
In one embodiment, before the first user submits an authorization request for authorizing the second user to perform object information query to a node of the blockchain network, the own user information (i.e., the first user information) may be digitally signed based on an own private key (hereinafter referred to as a first private key). Further, after receiving the authorization request, the blockchain network may verify the digital signature based on a public key of the first user (hereinafter referred to as a first public key), and if the verification is passed, trigger execution of the step of acquiring the target object information matched with the first user information from the storage area. Or if the verification fails, outputting prompt information to the first user for prompting that the digital signature of the first user is wrong.
In one embodiment, before the node receives the authorization request, the first user may upload its public key to the node, and store the public key in a storage area (e.g., a local storage area, a blockchain maintained by a blockchain network, etc.) by the node. Further, after the node sends the public key of the first user (hereinafter referred to as the first public key) to the storage area, the node may also generate a first sub-public key for the first public key based on a preset public key generation algorithm, and set the first valid time and the first setting time for the first sub-public key. In this case, after the block chain network receives the authorization request, it may be determined that the first sub public key is valid before the first valid time elapses from the first set time, and then the digital signature is verified by using the first sub public key.
S503: and acquiring a public key of the second user based on the second user information, and encrypting the target object information through the public key of the second user.
S504: and generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to a second user.
In one embodiment, the first user and the second user may publish their public keys in the blockchain in advance, and the node may store the public keys corresponding to the first user and the second user in association with the user information corresponding to the first user and the second user. In this case, after the node acquires the target object information, the public key of the second user may be acquired based on the second user information carried in the authorization request, and the target object information may be encrypted by the public key of the second user. And further, generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to a second user. And the second user can conveniently recognize the two-dimension code after receiving the two-dimension code and decrypt the two-dimension code information based on the private key of the second user to obtain the target object information of the first user.
In one embodiment, before the node receives the authorization request, the second user may upload its public key to the node, and store the public key in a storage area (e.g., a local storage area, a blockchain maintained by a blockchain network, etc.) by the node. Further, after storing the public key of the second user (hereinafter referred to as a second public key) in the storage area, the node may further generate a second sub-public key for the second public key based on a preset public key generation algorithm, and set a second valid time and a second set time for the second public key. In this case, the specific implementation manner in which the node obtains the public key of the second user based on the second user information and encrypts the target object information through the public key of the second user may be: and before the second valid time is elapsed from the second set time, the node determines that the second sub public key is valid. Further, under the condition that the second sub public key is determined to be valid, the second sub public key is obtained, and the target object information is encrypted through the second sub public key.
In another embodiment, if the node determines that the second sub public key is invalid, a third sub public key may be generated for the second public key based on the preset public key generation algorithm, a third valid time and a third set time may be set for the third sub public key, and then the currently generated third sub public key is used to encrypt the target object information.
In an embodiment, the target object information includes target marriage information, after the node acquires the target object information matched with the first user information from the storage area, whether the marriage state of the first user is in an unmarried state or not can be detected based on the target marriage information, if the first user is determined to be in the unmarried state based on the target marriage information, the affinity between the first user and the second user is inquired based on the first user information and the second user information, and if the affinity is detected to be the affinity, the affinity warning information is generated. Further, the encrypted two-dimensional code and the close-up warning information can be sent to the second user.
Wherein, the close relation mainly refers to that direct and collateral relatives within the third generation are close relatives, parents brothers and sisters, exterior hall relatives and the like, and according to the view point of related genetics, the incidence of offspring born by close marriage is obviously higher than that of offspring born by non-close breeding in the aspect of some genetic diseases, thereby influencing the quality of human beings and the like and bringing a series of social problems. Therefore, when the node detects that the close relationship exists between the first user and the user, the node can send close warning information to the first user and/or the second user to prompt that the close relationship exists between the first user and the second user, and the situation that the two users unknowingly join a marriage student is prevented from causing irreparable loss.
In another embodiment, the target object information may include target marital information, and if the node determines that the first user is in an unmarried state based on the target marital information, genetic medical history information corresponding to each of the first user and the second user is queried based on the first user information and the second user information, and further, the encrypted two-dimensional code and the encrypted genetic medical history information may be sent to the second user. The genetic medical history information can refer to the genetic medical history of the family where the first user and the second user are located, and can also refer to easily inherited disease information of the first user and the second user. Related diseases such as vision problems, skin problems, migraine, mood problems, intestinal problems, etc. are all diseases that are easily inherited.
In an embodiment, the authorization request further includes authorization right information, and a specific implementation manner of the node acquiring, from the storage area, the target object information matched with the first user information may be: and acquiring object information corresponding to the first user information from the storage area, and screening target object information from the object information corresponding to the first user information based on the indication of the authorization authority information.
Wherein the authorization authority information is used for limiting the scope of querying the object information of the first user. Illustratively, the object information includes marriage information, and the query range indicated by the authorization authority information is the marriage state, assuming that the marriage information of the first user includes the marriage state of the first user, "not married," historical marriage times "3 times," and the existence duration of each marriage. In this case, the node may select target marital information, that is, the marital status "not married", from the marital information corresponding to the first user information based on the instruction of the authorization authority information, and may not acquire the remaining historical marital times "3 times" and the remaining time of each marital. By adopting the mode, the personalized requirements of the first user can be met, and the target marital information of the first user can be acquired more intelligently.
In the embodiment of the present invention, a node of a block chain network may receive an authorization request submitted by a first user and used for authorizing a second user to perform object information query, where the authorization request includes first user information of the first user and second user information of the second user. Further, the node may acquire target object information matched with the first user information from the storage area, acquire a public key of a second user based on the second user information, encrypt the target object information through the public key of the second user, generate a two-dimensional code according to the encrypted target object information, and send the two-dimensional code to the second user, so that the second user can recognize the two-dimensional code after receiving the two-dimensional code, and decrypt the two-dimensional code information based on a private key of the second user to obtain the target object information of the first user. By adopting the mode, the second user can quickly obtain the target object information of the first user, and the query efficiency of the object information is improved.
Referring to fig. 6, a schematic flow chart of a data processing method according to another embodiment of the present invention is shown in fig. 6, where the method includes:
s601: and acquiring a two-dimensional code comprising target object information of the first user, wherein the two-dimensional code is generated based on the target object information encrypted by the public key of the second user.
In one embodiment, the terminal device may access the third platform, and the first user may send, to the third platform, an authorization request for authorizing the second user to perform object information query through the terminal device, where the authorization request includes first user information of the first user and second user information of the second user, so that the third platform generates and returns a two-dimensional code including target object information of the first user based on the authorization request, where the two-dimensional code is generated based on the target object information encrypted by the public key of the second user. Further, the terminal device may receive the two-dimensional code returned by the third platform. The third platform may be a website that the terminal device can access, an application run by the terminal device, or an applet.
In one embodiment, the first user and the second user may be identity bound through the third platform, such that the third platform possesses public keys to which the users of the bound identities (i.e., the first user and the second user) belong. When the first user wants to authorize the second user to query the object information, the user information of the first user and the user information of the second user can be input through the third platform, and an authorization request for authorizing the second user to query the object information is submitted. And the user information of the second user comprises account information of the second user on a third platform.
Further, after the third platform receives the authorization request, the target object information matched with the first user information may be acquired in the target storage area, the target object information is encrypted through the public key of the second user, a two-dimensional code is generated according to the encrypted target object information, and the two-dimensional code is sent to the terminal device.
In an embodiment, when the third platform is an application run by the terminal device or an applet in the running application, after the third platform generates the two-dimensional code according to the encrypted target object information, the two-dimensional code may be output to a display interface of the terminal device.
The target storage area may include a local storage area of the third platform, a database of a server corresponding to the third platform, or an object information query mechanism having a communication connection with the third platform. Or, in an embodiment, when the server corresponding to the third platform is a node in a blockchain network, the target storage area may also be a blockchain maintained by the blockchain network.
In one embodiment, after the third platform receives an authorization request sent by the first user for authorizing the second user to perform object information query, the third platform may query target object information matched with the first user information from a pre-connected object information query mechanism based on the first user information.
In another embodiment, before the third platform acquires the target object information matched with the first user information from the target storage area, the third platform may further crawl user information and object information of each user from the target website based on object data crawling rules configured for the target website, and store the user information and the object information of each user in the storage area in an associated manner. The target website may be a website corresponding to the target information query mechanism. In this case, when the third platform receives an authorization request sent by the first user for authorizing the second user to perform object information query, the third platform may screen out the object information matched with the first user information from the object information of each user stored in the object storage area.
In one embodiment, a first user may send, to a node of a block network, an authorization request for authorizing a second user to perform object information query through a terminal device, so that the node obtains a two-dimensional code including target object information of the first user based on the authorization request, and sends the two-dimensional code to the terminal device corresponding to the second user, where the two-dimensional code is generated based on the target object information encrypted by a public key of the second user. For a specific implementation manner of the node obtaining the two-dimensional code including the target object information of the first user based on the authorization request, refer to steps S501 to S504 in the foregoing embodiment, which is not described herein again.
S602: and identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code.
S603: and decrypting the two-dimensional code information based on the private key of the second user to obtain target object information.
S604: and outputting the target object information in the display interface.
In an embodiment, after the terminal device obtains the two-dimensional code, a second user may identify the two-dimensional code through the terminal device to obtain two-dimensional code information corresponding to the two-dimensional code. Further, the second user can input a private key of the second user to decrypt the two-dimensional code information, and target object information of the first user is obtained. When the detection terminal device detects that the decryption is successful, the target object information can be output in the display interface, so that the user can conveniently and quickly check the target object information of the first user.
In an embodiment, when the third platform or the node of the block network generates the two-dimensional code, an effective time threshold or an effective time threshold of the two-dimensional code may also be set, where both the effective time threshold and the effective time threshold may be preset by a developer according to experimental measurement and calculation data. In an embodiment, when the third platform or the node of the block network generates the two-dimensional code, an effective number threshold is set for the two-dimensional code, when the terminal device identifies the two-dimensional code, a historical identification number of the two-dimensional code may also be obtained, and if the historical identification number is greater than the effective number threshold, two-dimensional code failure information is output to prompt that the identification number of the two-dimensional code reaches an upper limit. If the historical identification frequency is less than or equal to the effective frequency threshold, the two-dimensional code can be normally identified to obtain the two-dimensional code information, and further, the identification frequency of the two-dimensional code can be accumulated once (namely, the historical identification frequency is + 1).
In another embodiment, when the third platform or the node of the block network generates the two-dimensional code, the valid duration threshold and the setting time may be set for the two-dimensional code. When the terminal equipment identifies the two-dimension code, the time difference between the current system time and the set time can be used, if the time difference is greater than the effective duration threshold, two-dimension code failure information is output and used for prompting that the time is too long and the two-dimension code fails; if the time difference is smaller than or equal to the effective duration threshold, the two-dimensional code can be normally identified, and two-dimensional code information is obtained.
In the embodiment of the present invention, the terminal device may obtain the two-dimensional code including the target object information of the first user, where the two-dimensional code is generated based on the target object information encrypted by the public key of the second user, further, the terminal device may identify the two-dimensional code to obtain the two-dimensional code information corresponding to the two-dimensional code, decrypt the two-dimensional code information based on the private key of the second user to obtain the target object information, and further output the target object information in the display interface. By adopting the mode, the second user can quickly obtain the target object information of the first user in a two-dimensional code scanning mode, and the query efficiency of the object information is improved.
Embodiments of the present invention further provide a computer storage medium, in which program instructions are stored, and when the program instructions are executed, the computer storage medium is configured to implement the corresponding method described in the above embodiments.
Based on the description of the above data processing method embodiment, an embodiment of the present invention further provides a data processing apparatus, which may be a computer program (including a program code) running in the above node. The data processing apparatus may be configured to perform the data processing method shown in fig. 3 and 5, referring to fig. 7, and the data processing apparatus may include: a communication module 70 and a processing module 71.
The communication module 70 is configured to receive an authorization request submitted by a first user and used for authorizing a second user to perform object information query, where the authorization request includes first user information of the first user and second user information of the second user;
a processing module 71, configured to obtain target object information matching the first user information from a storage area;
the processing module 71 is further configured to obtain a public key of the second user based on the second user information, encrypt the target object information by using the public key of the second user, and generate a two-dimensional code according to the encrypted target object information;
the communication module 70 is further configured to send the two-dimensional code to the second user.
In one embodiment, the processing module 71 is further configured to crawl user information and object information of each user from a target website based on object data crawling rules configured for the target website; and storing the user information and the object information of each user in a storage area in an associated manner.
In one embodiment, the storage area includes a blockchain maintained by the blockchain network, and the communication module 70 is further configured to receive an object information upload request submitted by the first user, where the object information upload request includes object information of the first user and user information of the first user; the processing module 71 is further configured to perform consensus verification on the object information of the first user and the user information of the first user; and if the consensus verification is passed, writing the object information of the first user and the user information of the first user into the block chain.
In an embodiment, the target object information includes target marital information, and the processing module 71 is further configured to query an affinity between the first user and a second user based on the first user information and the second user information if it is determined that the first user is in an unmarried state based on the target marital information; if the affinity is detected to be close, generating close warning information; the communication module 70 is further configured to send the encrypted two-dimensional code and the close warning information to the second user.
In one embodiment, the target object information includes target marital information, and the processing module 71 is further configured to, if it is determined that the first user is in an unmarried state based on the target marital information, query genetic medical history information corresponding to each of the first user and the second user based on the first user information and the second user information; the communication module 70 is further configured to send the encrypted two-dimensional code and the genetic medical history information to the second user.
In an embodiment, the processing module 71 is specifically configured to acquire object information corresponding to the first user information from a storage area; and screening target object information from the object information corresponding to the first user information based on the indication of the authorization authority information.
Referring to fig. 8 again, the structural diagram of an electronic device according to an embodiment of the present invention is shown, where the electronic device may be any node in a block chain network, for example, a first node or a second node shown in fig. 2 or fig. 4, and the electronic device according to the embodiment of the present invention includes a power supply module and other structures, and includes a processor 801, a memory 802, and a communication interface 803. The processor 801, the memory 802 and the communication interface 803 can exchange data, and the processor 801 realizes corresponding data processing.
The memory 802 may include volatile memory (volatile memory), such as random-access memory (RAM); the memory 802 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 802 may also comprise a combination of memories of the kind described above.
The processor 801 may be a Central Processing Unit (CPU) 801. In one embodiment, the processor 801 may also be a Graphics Processing Unit (GPU) 801. The processor 801 may also be a combination of a CPU and a GPU. In the electronic device, a plurality of CPUs and GPUs may be included as necessary to perform corresponding root data processing systems. In one embodiment, the memory 802 is used to store program instructions. The processor 801 may invoke the program instructions to implement the various methods as described above in embodiments of the invention.
In one embodiment, the processor 801 of the electronic device calls program instructions stored in the memory 802 to receive, through the communication interface 803, an authorization request submitted by a first user for authorizing a second user to perform an object information query, the authorization request including first user information of the first user and second user information of the second user; acquiring target object information matched with the first user information from a storage area; acquiring a public key of the second user based on the second user information, and encrypting the target object information through the public key of the second user; and generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to the second user through a communication interface 803.
In one embodiment, the processor 801 is further configured to crawl user information and object information of each user from a target website based on object data crawling rules configured for the target website; and storing the user information and the object information of each user in a storage area in an associated manner.
In one embodiment, the storage area includes a blockchain maintained by the blockchain network, and the processor 801 is further configured to receive an object information upload request submitted by the first user through the communication interface 803, where the object information upload request includes object information of the first user and user information of the first user; the processor 801 is further configured to perform consensus verification on the object information of the first user and the user information of the first user; and if the consensus verification is passed, writing the object information of the first user and the user information of the first user into the block chain.
In one embodiment, the target object information includes target marital information, and the processor 801 is further configured to query an affinity between the first user and a second user based on the first user information and the second user information if it is determined that the first user is in an unmarried state based on the target marital information; and if the affinity is detected to be affinity, generating affinity alarm information, and sending the encrypted two-dimensional code and the affinity alarm information to the second user through the communication interface 803.
In one embodiment, the target object information includes target marital information, and the processor 801 is further configured to, if it is determined that the first user is in an unmarried state based on the target marital information, query genetic medical history information corresponding to each of the first user and the second user based on the first user information and the second user information, and send the encrypted two-dimensional code and the genetic medical history information to the second user through the communication interface 803.
In an embodiment, the processor 801 is specifically configured to acquire object information corresponding to the first user information from a storage area; and screening target object information from the object information corresponding to the first user information based on the indication of the authorization authority information.
In the embodiment of the present invention, the specific implementation of the processor 801 may refer to the description of relevant contents in the embodiments corresponding to the foregoing drawings.
Based on the description of the foregoing data processing method embodiment, another data processing apparatus is also provided in an embodiment of the present invention, where the data processing apparatus may be a computer program (including a program code) running in the foregoing terminal device. The data processing apparatus may be configured to perform the data processing method shown in fig. 3 and fig. 6, referring to fig. 9, the data processing apparatus may include: an acquisition module 90, a processing module 91 and an output module 92.
An obtaining module 90, configured to obtain a two-dimensional code including target object information of a first user, where the two-dimensional code is generated based on the target object information encrypted by the public key of the second user;
the processing module 91 is configured to identify the two-dimensional code to obtain two-dimensional code information corresponding to the two-dimensional code;
the processing module 91 is further configured to decrypt the two-dimensional code information based on the private key of the second user to obtain the target object information;
and the output module 92 is configured to output the target object information in a display interface.
In an embodiment, the obtaining module 90 is specifically configured to send, to a third platform, an authorization request for authorizing a second user to perform object information query, where the authorization request includes first user information of the first user and second user information of the second user, so that the third platform obtains and returns target object information matched with the first user information based on the authorization request; receiving the target object information returned by the third platform, and encrypting the target object information through the public key of the second user; and generating a two-dimensional code according to the encrypted target object information.
In an embodiment, the obtaining module 90 is specifically configured to receive a two-dimensional code that includes target object information of a first user and is sent by a node of a blockchain network, where the two-dimensional code is obtained by the node based on an authorization request submitted by the first user and used for authorizing a second user to perform target object information query.
Referring to fig. 10 again, it is a schematic structural diagram of a terminal device according to an embodiment of the present invention, where the terminal device according to the embodiment of the present invention includes a power supply module and other structures, and includes a processor 10, a memory 11, a communication interface 12, and an output device 13. The processor 10, the memory 11, the communication interface 12 and the output device 13 can exchange data, and the processor 10 implements corresponding data processing.
The memory 11 may include a volatile memory (volatile memory), such as a random-access memory (RAM); the memory 11 may also include a non-volatile memory (non-volatile memory), such as a flash memory (flash memory), a solid-state drive (SSD), etc.; the memory 11 may also comprise a combination of memories of the kind described above.
The processor 10 may be a Central Processing Unit (CPU) 10. In one embodiment, the processor 10 may also be a Graphics Processing Unit (GPU) 10. The processor 10 may also be a combination of a CPU and a GPU. In the electronic device, a plurality of CPUs and GPUs may be included as necessary to perform corresponding root data processing systems. In one embodiment, the memory 11 is used to store program instructions. The processor 10 may invoke the program instructions to implement the various methods as referred to above in embodiments of the invention.
In one embodiment, the processor 10 of the electronic device calls a program instruction stored in the memory 11 to obtain a two-dimensional code including target object information of a first user through the communication interface 12, where the two-dimensional code is generated based on the target object information encrypted by a public key of a second user; identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code; decrypting the two-dimensional code information based on the private key of the second user to obtain the target object information; and outputting the target object information in a display interface through the output device 13.
In an embodiment, the processor 10 is specifically configured to send, to a third platform through the communication interface 12, an authorization request for authorizing a second user to perform object information query, where the authorization request includes first user information of the first user and second user information of the second user, so that the third platform obtains and returns target object information matched with the first user information based on the authorization request; receiving the target object information returned by the third platform through a communication interface 12, and encrypting the target object information through a public key of the second user; and generating a two-dimensional code according to the encrypted target object information.
In an embodiment, the processor 10 is specifically configured to receive, through the communication interface 12, a two-dimensional code that includes target object information of a first user and is sent by a node of a blockchain network, where the two-dimensional code is obtained by the node based on an authorization request submitted by the first user and used to authorize a second user to perform target object information query.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
While the invention has been described with reference to a particular embodiment, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (10)

1. A data processing method applied to a node of a blockchain network, the method comprising:
receiving an authorization request submitted by a first user and used for authorizing a second user to perform object information query, wherein the authorization request comprises first user information of the first user and second user information of the second user;
acquiring target object information matched with the first user information from a storage area;
acquiring a public key of the second user based on the second user information, and encrypting the target object information through the public key of the second user;
and generating a two-dimensional code according to the encrypted target object information, and sending the two-dimensional code to the second user.
2. The method of claim 1, wherein before the obtaining target object information matching the first user information from the storage area, the method further comprises:
crawling user information and object information of each user from a target website based on object data crawling rules configured for the target website;
and storing the user information and the object information of each user in a storage area in an associated manner.
3. The method of claim 1, wherein the storage area comprises a blockchain maintained by the blockchain network, and before the target object information matching the first user information is obtained from the storage area, the method further comprises:
receiving an object information uploading request submitted by the first user, wherein the object information uploading request comprises the object information of the first user and the user information of the first user;
performing consensus verification on the object information of the first user and the user information of the first user;
and if the consensus verification is passed, writing the object information of the first user and the user information of the first user into the block chain.
4. The method of any one of claims 1-3, wherein the target object information comprises target marital information, and wherein after obtaining the target object information matching the first user information from the storage area, the method further comprises:
if the first user is determined to be in the unmarried state based on the target marital information, inquiring the genetic relationship between the first user and the second user based on the first user information and the second user information;
if the affinity is detected to be close, generating close warning information;
wherein the sending the two-dimensional code to the second user includes:
and sending the encrypted two-dimensional code and the close warning information to the second user.
5. The method of any one of claims 1-3, wherein the target object information comprises target marital information, and wherein after obtaining the target object information matching the first user information from the storage area, the method further comprises:
if the first user is determined to be in the unmarried state based on the target marital information, querying genetic medical history information corresponding to the first user and the second user based on the first user information and the second user information;
wherein, the sending the encrypted two-dimensional code to the second user includes:
and sending the encrypted two-dimensional code and the genetic medical history information to the second user.
6. The method of claim 1, the authorization request further comprising authorization authority information, the obtaining target object information matching the first user information from a storage area comprising:
acquiring object information corresponding to the first user information from a storage area;
and screening target object information from the object information corresponding to the first user information based on the indication of the authorization authority information.
7. A method of data processing, the method comprising:
acquiring a two-dimensional code comprising target object information of a first user, wherein the two-dimensional code is generated based on the target object information encrypted by a public key of a second user;
identifying the two-dimension code to obtain two-dimension code information corresponding to the two-dimension code;
decrypting the two-dimensional code information based on the private key of the second user to obtain the target object information;
and outputting the target object information in a display interface.
8. The method of claim 7, wherein the obtaining the two-dimensional code including the target object information of the first user comprises:
sending an authorization request for authorizing a second user to perform object information query to a third platform, wherein the authorization request comprises first user information of the first user and second user information of the second user, so that the third platform acquires and returns target object information matched with the first user information based on the authorization request;
receiving the target object information returned by the third platform, and encrypting the target object information through the public key of the second user;
and generating a two-dimensional code according to the encrypted target object information.
9. The method of claim 7, wherein the obtaining the two-dimensional code including the target object information of the first user comprises:
receiving a two-dimensional code which is sent by a node of a block chain network and comprises target object information of a first user, wherein the two-dimensional code is obtained by the node based on an authorization request which is submitted by the first user and used for authorizing a second user to carry out target object information query.
10. A computer-readable storage medium, having stored thereon computer program instructions, which, when executed by a processor, are adapted to perform the data processing method of any of claims 1-9.
CN201911209939.8A 2019-11-28 2019-11-28 Data processing method and storage medium Pending CN110889140A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911209939.8A CN110889140A (en) 2019-11-28 2019-11-28 Data processing method and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911209939.8A CN110889140A (en) 2019-11-28 2019-11-28 Data processing method and storage medium

Publications (1)

Publication Number Publication Date
CN110889140A true CN110889140A (en) 2020-03-17

Family

ID=69749708

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911209939.8A Pending CN110889140A (en) 2019-11-28 2019-11-28 Data processing method and storage medium

Country Status (1)

Country Link
CN (1) CN110889140A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866010A (en) * 2020-07-29 2020-10-30 中国联合网络通信集团有限公司 Vehicle information updating method and device
CN111866009A (en) * 2020-07-29 2020-10-30 中国联合网络通信集团有限公司 Vehicle information updating method and device
CN112614586A (en) * 2020-12-15 2021-04-06 广东德澳智慧医疗科技有限公司 Remote disease intelligent diagnosis system based on medical images and block chains

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111866010A (en) * 2020-07-29 2020-10-30 中国联合网络通信集团有限公司 Vehicle information updating method and device
CN111866009A (en) * 2020-07-29 2020-10-30 中国联合网络通信集团有限公司 Vehicle information updating method and device
CN112614586A (en) * 2020-12-15 2021-04-06 广东德澳智慧医疗科技有限公司 Remote disease intelligent diagnosis system based on medical images and block chains
CN113870999A (en) * 2020-12-15 2021-12-31 广东德澳智慧医疗科技有限公司 Remote disease intelligent diagnosis system and auxiliary diagnosis method based on algorithm, medical image and block chain
CN112614586B (en) * 2020-12-15 2022-04-22 广东德澳智慧医疗科技有限公司 Remote disease intelligent diagnosis system based on medical images and block chains
CN113870999B (en) * 2020-12-15 2023-06-16 江苏微药信息科技有限责任公司 Remote disease intelligent diagnosis system and auxiliary diagnosis method based on algorithm, medical image and blockchain

Similar Documents

Publication Publication Date Title
Dagher et al. Ancile: Privacy-preserving framework for access control and interoperability of electronic health records using blockchain technology
US10692054B2 (en) Document tracking on distributed ledger
US10572684B2 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
US9619669B2 (en) Systems and methods for anonosizing data
US10037428B2 (en) Data security using request-supplied keys
US20190229927A1 (en) Method and apparatus for processing account information in block chain, storage medium, and electronic apparatus
US11949691B2 (en) Malicious peer identification
US11943237B2 (en) Malicious peer identification for database block sequence
EP3616383A1 (en) Systems and methods for enforcing centralized privacy controls in de-centralized systems
CN109325870A (en) The method and system of shared private data
US20230054446A1 (en) Systems and methods for functionally separating geospatial information for lawful and trustworthy analytics, artificial intelligence and machine learning
WO2020097182A1 (en) Privacy-preserving visual recognition via adversarial learning
US11588804B2 (en) Providing verified claims of user identity
Samkari et al. Protecting medical records against cybercrimes within Hajj period by 3-layer security
US11368285B2 (en) Efficient threshold storage of data object
CN110889140A (en) Data processing method and storage medium
US11755998B2 (en) Smart data annotation in blockchain networks
CN110999200B (en) Method and system for evaluating monitoring function to determine whether triggering condition is met
CN114026823A (en) Computer system for processing anonymous data and method of operation thereof
CA2975441C (en) Systems and methods for contextualized data protection
Quantin et al. Medical record search engines, using pseudonymised patient identity: An alternative to centralised medical records
CN110197707B (en) Block chain-based medical record information processing method, device, medium and electronic equipment
Wheeler et al. Cloud storage security: A practical guide
WO2021074742A1 (en) Chaincode recommendation based on existing chaincode
US10003584B1 (en) Durable key management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination