CN112883115A - Information processing method and device based on block chain - Google Patents

Information processing method and device based on block chain Download PDF

Info

Publication number
CN112883115A
CN112883115A CN202110207477.7A CN202110207477A CN112883115A CN 112883115 A CN112883115 A CN 112883115A CN 202110207477 A CN202110207477 A CN 202110207477A CN 112883115 A CN112883115 A CN 112883115A
Authority
CN
China
Prior art keywords
information
request
block chain
query request
query
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110207477.7A
Other languages
Chinese (zh)
Inventor
岑健明
李狄威
罗强
徐植君
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110207477.7A priority Critical patent/CN112883115A/en
Publication of CN112883115A publication Critical patent/CN112883115A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Probability & Statistics with Applications (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Fuzzy Systems (AREA)
  • Medical Informatics (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The utility model provides an information processing method based on block chain, belonging to the financial technology field, comprising: writing an information query request initiated by a first mechanism into the blockchain so that other at least one second mechanism can execute a first operation based on the blockchain, wherein the first operation comprises: acquiring an information query request from a block chain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and acquiring the query result information written by the at least one second mechanism for the information query request from the blockchain. The present disclosure also provides an information processing apparatus based on a block chain, an electronic device, a computer-readable storage medium, and a computer program product.

Description

Information processing method and device based on block chain
Technical Field
The present disclosure relates to the field of financial technologies, and in particular, to a method and an apparatus for processing information based on a block chain, an electronic device, a computer-readable storage medium, and a computer program product.
Background
The blacklist is a list of agents or legal persons who record negative credit behavior, and when the agents or legal persons in the blacklist cooperate, the cooperation risk may be increased. Therefore, it is important for the partner to know whether the agent or the legal person has been blacklisted before the partner cooperates with the agent or the legal person. In the related art, different financial institutions share blacklist data by sending respective blacklist data to a central storage end (such as a blacklist sharing platform).
However, in carrying out the inventive concepts of the present disclosure, the inventors discovered: the blacklist sharing platform has the possibility of tampering blacklist data, so that the blacklist data acquired by each financial institution through the blacklist sharing platform is possibly not real enough. In addition, the blacklist sharing platform also has the possibility of revealing the blacklist data, and further economic loss or reputation influence caused by the revealing of the blacklist data can be brought to each financial institution.
Disclosure of Invention
In view of the above, the present disclosure provides a block chain based information processing method and apparatus, an electronic device, a computer readable storage medium, and a computer program product.
One aspect of the present disclosure provides an information processing method based on a block chain, including: writing an information query request initiated by a first mechanism into a block chain so that other at least one second mechanism can execute a first operation based on the block chain, wherein the first operation comprises the following steps: acquiring the information query request from the block chain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and acquiring query result information written by the at least one second mechanism aiming at the information query request from the block chain.
Optionally, the information query request includes: a hash value of personal information of the business object.
Optionally, the information query request includes at least one of the following: a blacklist query request, a credit investigation request and a whitelist query request.
Optionally, the writing the information query request initiated by the first mechanism into the block chain includes: writing the information query request into the block chain in a quiz mode or a designated mechanism query mode; wherein: in the quiz mode, the at least one other second mechanism includes: all other enterprises relating to federation chains except said first enterprise, wherein said blockchain comprises said federation chain; and in the designated mechanism inquiry mode, the at least one other second mechanism includes: involving, in addition to the first organization, a designated one or more of all other organizations of the federation chain.
Optionally, the method further comprises: adding a first field and a second field in the information inquiry request under the condition that the information inquiry request is written into the block chain in the quiz mode; wherein: the first field is used for representing the number of request answering mechanisms; and the second field is used to characterize the deadline of the request reply.
Optionally, writing the information query request into the block chain in a specified mechanism query mode, including: selecting one or more other enterprises relating to the federation chain; performing a second operation for each of the one or more other mechanisms; wherein the second operation comprises: acquiring a corresponding public key of an organization; encrypting the information inquiry request by using the acquired public key of the organization to obtain an encrypted information inquiry request; and writing the encrypted information inquiry request into the block chain.
Optionally, the method further comprises: and adding a third field in the information inquiry request under the condition that the information inquiry request is written into the block chain in the specified mechanism inquiry mode, wherein the third field is used for representing the deadline of a request reply.
Optionally, the method further comprises: and notifying the at least one second mechanism to reply to the information query request written in the block chain.
Optionally, in response to failing to obtain a corresponding information query result based on at least one of the following lists provided inside the first mechanism, writing the information query request to the block chain: black list, credit list and white list.
One aspect of the present disclosure provides an information processing method based on a block chain, including: acquiring an information query request written into a block chain by at least one other first mechanism; responding to the information query request, and obtaining query result information; and writing the query result information into the block chain, so that the at least one first mechanism can acquire the query result information written for the information query request from the block chain.
Optionally, writing the query result information into the block chain includes: and encrypting the query result information and then writing the encrypted query result information into the block chain.
Optionally, writing the query result information into the block chain includes: adding a fourth field in the query result information and then writing the block chain, wherein the fourth field is used for representing a reply mechanism providing the query result information.
Optionally, in response to the information query request, obtaining query result information includes: responding to the information inquiry request, and acquiring a hash value of personal information of a business object contained in the information inquiry request; obtaining each business object involved in at least one of the following lists: a black list, a credit investigation list and a white list; obtaining the hash value of the personal information of each business object in the business objects; and matching the hash value of the personal information of the business object contained in the information inquiry request with the hash value of the personal information of each business object in the business objects to obtain the inquiry result information.
Optionally, the method further comprises: and informing the mechanism initiating the information inquiry request to inquire the inquiry result information written aiming at the information inquiry request by the block chain.
Another aspect of the present disclosure provides an information processing apparatus based on a block chain, including: a first writing module, configured to write an information query request initiated by a first mechanism into a block chain, so that at least one other second mechanism can perform a first operation based on the block chain, where the first operation includes: acquiring the information query request from the block chain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and an obtaining module, configured to obtain, from the blockchain, query result information written by the at least one second mechanism for the information query request.
Another aspect of the present disclosure provides an information processing apparatus based on a block chain, including: the request acquisition module is used for acquiring an information query request written into the block chain by at least one first mechanism; the information obtaining module is used for responding to the information inquiry request and obtaining inquiry result information; and an information writing module, configured to write the query result information into the block chain, so that the at least one first mechanism can obtain the query result information written for the information query request from the block chain.
Another aspect of the present disclosure provides an electronic device including: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the methods of embodiments of the present disclosure.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, implement the method of embodiments of the present disclosure.
Another aspect of the disclosure provides a computer program product comprising a computer program which, when executed by a processor, implements the above method according to an embodiment of the disclosure.
By adopting the embodiment of the disclosure, information sharing based on a block chain (including a alliance chain) is adopted to replace information sharing based on a third-party platform, so that any one financial institution can initiate an information query request and broadcast the request into the block chain under the condition that whether a business object is in a specific list (such as a black list, a white list, a credit investigation list and the like) of other financial institutions needs to be determined. Any one or more financial institutions participating in the federation chain, or any one or more financial institutions participating in the federation chain and designated to be capable of accessing and responding to the information query request and feeding back corresponding response results to the blockchain. Therefore, the financial institution initiating the information inquiry request can acquire the inquiry structure fed back by other financial institutions from the blockchain, and thereby, the information sharing based on the blockchain is realized. According to the scheme, each financial institution does not need to upload the specific list of the financial institution to a third-party platform such as a central storage end, so that the blacklist data provided by each financial institution can be prevented from being tampered or leaked by the central storage end. In addition, according to the scheme, the information query request and the query result information are written into the block chain, so that the information query request and the query result information can be prevented from being tampered or leaked, and the reliability and the accuracy of the acquired data can be determined.
Drawings
For a more complete understanding of the present disclosure and the advantages thereof, reference is now made to the following descriptions taken in conjunction with the accompanying drawings, in which:
fig. 1 schematically illustrates a system architecture suitable for a blockchain-based information processing method and apparatus according to an embodiment of the present disclosure;
fig. 2 schematically shows a flow chart of a block chain based information processing method according to an embodiment of the present disclosure;
fig. 3 schematically shows a schematic diagram of a block chain based information processing method according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram for writing an information query request to a blockchain in a specified institutional query mode, in accordance with an embodiment of the present disclosure;
fig. 5 schematically shows a flow chart of another block chain based information processing method according to an embodiment of the present disclosure;
FIG. 6 schematically shows a flow diagram for obtaining query result information according to an embodiment of the disclosure;
fig. 7 schematically shows a block diagram of a block chain based information processing apparatus according to an embodiment of the present disclosure;
fig. 8 schematically shows a block diagram of another block chain based information processing apparatus according to an embodiment of the present disclosure; and
fig. 9 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides an information processing method based on a block chain and a device capable of applying the method. The method comprises the following steps: writing an information query request initiated by a first mechanism into the blockchain so that other at least one second mechanism can execute a first operation based on the blockchain, wherein the first operation comprises: obtaining the information query request from the blockchain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and acquiring the query result information written by the at least one second mechanism for the information query request from the blockchain.
Fig. 1 schematically shows a system architecture suitable for a block chain based information processing method and apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 includes: institution 110 (e.g., a financial institution), blockchain 120, institution 130, and institution 140.
Organization 110 may provide a service application management system 111 and a blacklist management system 112. The user may log in the service application management system 111, select the type of service to be applied, fill in an application form (e.g., fill in personal information such as user name and identification number), and so on. The service application management system 111 may determine whether to perform blacklist check on the user according to the service type selected by the user.
For example, if the service type selected by a user is loan and the loan amount is 1000 ten thousand, the user may be subjected to blacklist check according to a preset check policy. The blacklist management system 112 may first query whether the user is a blacklist user in a blacklist (referred to as a local blacklist) stored in a local server (i.e., a database server deployed by the organization 110 by itself) according to personal information such as a user name and an identity card number filled by the user on the application form. If the user is determined to be a blacklisted user, the blacklist management system 112 returns the query result to the service application management system 111, and the service application management system 111 executes a subsequent loan approval process according to the returned query result, for example, refusing a loan request of the user.
Secondly, if the user is not queried in the local blacklist, whether the user is a blacklist user of other organizations can be further confirmed. In particular, a blacklist query request may be written to blockchain 120 by blacklist management system 112. The blacklist query request may include a hash value of personal information such as a user name and an identification number filled by the user.
Mechanism 130 and mechanism 140 may obtain the blacklist query request from blockchain 120 and respond to the request by invoking a blockchain intelligence contract. For example, after obtaining the blacklist query request from blockchain 120, mechanism 130 may query whether the user is a blacklist user of the mechanism by using blacklist management system 131, and write the query result into blockchain 120. After obtaining the blacklist query request from blockchain 120, mechanism 140 may query whether the user is a blacklist user of the mechanism by using blacklist management system 141, and write the query result into blockchain 120.
Mechanism 110 may retrieve the query result from blockchain 120 by invoking a blockchain intelligent contract and continue to perform subsequent approval processes based on the query result, for example, the user's loan request may be denied if the query result indicates that the user is a blacklisted user. Or in the case where the query result indicates that the user is not a blacklisted user, the user's loan request may be accepted and the credit system notified of the loan or the like.
It should be understood that the number of organizations, blockchains, service application management systems, and blacklist management systems in fig. 1 are merely illustrative. Any number of mechanisms, blockchains, service application management systems, and blacklist management systems may be present, as desired for implementation.
Fig. 2 schematically shows a flowchart of an information processing method based on a block chain according to an embodiment of the present disclosure. As shown in fig. 2, the method may include operations S210 to S220.
In operation S210, an information query request initiated by a first mechanism is written into the blockchain, so that other at least one second mechanism can perform the first operation based on the blockchain.
Wherein the first operation comprises: obtaining an information query request initiated by a first mechanism from the blockchain; responding to the information query request, and obtaining corresponding query result information; and writing the query result information into the block chain.
It should be noted that, in the embodiment of the present disclosure, the blockchain may include a federation chain. The alliance chain is only used by alliance members, and the read authority, the write authority, the charging rule and the like on the alliance chain are designed according to the alliance rule.
According to embodiments of the present disclosure, the first and second enterprises may be federation members in the federation chain. The first mechanism may be a mechanism for initiating an information query request, and the second mechanism may be a mechanism for obtaining a query result for the information query request initiated by the first mechanism.
For example, a user may apply for a business and fill in relevant information through a first organization. The first mechanism may determine whether to perform a list query on the user according to the service information filled by the user, where the list query may include a blacklist query, a whitelist query, and a credit list query. For example, the type of transaction the user applies for is loan, and the loan amount is 100 ten thousand. And according to the checking strategy preset by the first mechanism, in this case, the blacklist query can be performed on the user.
Therefore, the first organization can inquire whether the user is a blacklist user in a local blacklist (namely, a blacklist provided by the first organization) according to personal information (such as a user name, an identity card number and the like) filled by the user. If the user is a local blacklisted user, the user's loan application may be denied, etc. Further, if the user is not a local blacklist user, a cross-organization information query request may be initiated and written to the blockchain. The information query request may include a hash value of personal information such as the name, identification number, etc. of the specified user.
Under the condition that the first mechanism writes the information query request into the block chain, at least one other second mechanism can acquire the information query request from the block chain, and query whether the specified user is in the mechanism blacklist of the specified user according to the hash value of personal information such as the user name, the identity card number and the like contained in the information query request.
For example, the second organization may match the hash value of the name of the specified user in the obtained information query request with the hash value of the name of the user in the blacklist user of the local organization (the blacklist provided by the second organization), and/or match the hash value of the identity number of the specified user in the obtained information query request with the hash value of the identity number of the user in the blacklist user of the local organization. If any one or both of the hash values of the name and the identification number of the designated user are consistent with the hash value of the personal information corresponding to the blacklist user in the mechanism, the designated user can be determined to be the blacklist user in the mechanism.
According to an embodiment of the present disclosure, the second mechanism may write the query result into the blockchain so that the first mechanism may obtain the query result.
In operation S220, query result information written by the at least one second mechanism for the information query request is obtained from the blockchain.
According to the embodiment of the disclosure, the first mechanism acquires the query result information from the blockchain and executes the subsequent approval process according to the query result information. For example, if a plurality of query result information are obtained from the blockchain, and the plurality of query result information all indicate that the specified user is not a blacklist user, the processes such as approval and the like can be performed on the service submitted by the specified user. Or if at least one piece of query result information in the plurality of pieces of query result information indicates that the user is a blacklist user, the service application request of the specified user can be rejected, and the like.
According to the embodiment of the disclosure, the number of information inquiry requests of the present organization (for example, the first organization) responding to other organizations (at least one second organization) can be obtained, and the number of information inquiry requests of other organizations responding to the duplicate organizations can also be obtained, and charging and paid payment can be carried out according to the fees agreed among the organizations.
By adopting the embodiment of the disclosure, information sharing based on a block chain (including a alliance chain) is adopted to replace information sharing based on a third-party platform, so that any one financial institution can initiate an information query request and broadcast the request into the block chain under the condition that whether a business object is in a specific list (such as a black list, a white list, a credit investigation list and the like) of other financial institutions needs to be determined. Any one or more financial institutions participating in the federation chain, or any one or more financial institutions participating in the federation chain and designated to be capable of accessing and responding to the information query request and feeding back corresponding response results to the blockchain. Therefore, the financial institution which initiates the information inquiry request can acquire inquiry results fed back by other financial institutions from the blockchain, and therefore information sharing based on the blockchain is achieved. According to the scheme, each financial institution does not need to upload the specific list of the financial institution to a third-party platform such as a central storage end, so that the central storage end can be prevented from tampering or revealing blacklist data provided by each financial institution. In addition, according to the scheme, the information query request and the query result information are written into the block chain, so that the information query request and the query result information can be prevented from being tampered or leaked, and the reliability and the accuracy of the acquired data can be determined.
With embodiments of the present disclosure, a first mechanism may write a query request to a blockchain and obtain the query request from the blockchain by another mechanism. Other mechanisms can obtain the query result according to the list information of the mechanism and write the query result into the block chain. And then the first mechanism can acquire the query result through the blockchain and continue to execute the subsequent approval process based on the query result. According to the scheme, each financial institution does not need to upload the specific list of the financial institution to a third-party platform such as a central storage end, so that the central storage end can be prevented from tampering or revealing the specific list data provided by each financial institution.
Furthermore, each financial institution keeps the respective list by itself, so that the list information can not be tampered, and the accuracy of the query result obtained based on the list information can be further ensured. In addition, according to the scheme, the information query request and the query result information are written into the block chain, so that the information query request and the query result information can be prevented from being tampered or leaked, and the reliability and the accuracy of the acquired data can be determined.
Fig. 3 schematically shows a block chain-based information processing method according to an embodiment of the present disclosure.
Operation S310 may be performed assuming that institution a needs to determine whether the business object is in a specific list (e.g., black list, white list, credit list, etc.) of other financial institutions. In operation S310, organization a may initiate an information query request through a node in the blockchain, for example, node 1. Node 1 may broadcast the information query request to other nodes in the blockchain, such as node 2, node 3, node 4, node 5, and node 6.
In operation S320, the enterprises B and C participating in the federation chain may obtain the information query request through, for example, the nodes 3 and 4.
In operation S330, in response to the information query request, the agency B and the agency C feed back the corresponding query results to the blockchain, for example, broadcast the query results to other nodes in the blockchain through the nodes 3 and 4.
In operation S340, agency a may obtain query results fed back by other agencies (agency B and agency C) from a node (e.g., node 1) in the blockchain. Thereby, information sharing based on block chains can be realized.
As an optional embodiment, the information query request includes: a hash value of personal information of the business object.
According to the embodiment of the disclosure, the information query request may include a hash value of personal information such as a name, an identification number and the like of a specified user. For example, the information query request may include a hash value of a name of a specified user and a hash value of an identification number of the specified user.
According to the embodiment of the disclosure, the second organization may obtain the information query request initiated by the first organization, and query whether the specified user is a blacklist user of the organization (second organization) by judging whether the hash value representing the name of the specified user in the information query request is consistent with the hash value of the name of the user on the specific list of the organization (second organization), and/or whether the hash value representing the identity number of the specified user in the information query request is consistent with the hash value of the identity number of the user on the specific list of the organization (second organization). And under the condition that the hash value of the name of the appointed user is consistent with the hash value of the name of the user in the mechanism specific list, and the hash value of the identity number of the appointed user is consistent with the hash value of the identity number of the user in the mechanism specific list, determining that the appointed user is the mechanism specific list user.
According to the embodiment of the disclosure, the information query request may further include a hash value of the name and the identification number of the specified user. I.e., the name and identification number of the given user may be characterized by a common hash value. Then under the condition that the hash value of the name and the identification card number of the designated user in the information query request is consistent with the hash value of the name and the identification card number of the representative user in the mechanism specific list, the designated user can be determined to be the mechanism specific list user.
For example, both second organization B and second organization C obtain information query requests initiated by first organization A. The second organization B compares the hash value of the name of the specified user D included in the acquired information query request with the hash value of the name of the user on the specific list of the organization (the second organization B), and compares the hash value of the identification number of the specified user D included in the information query request with the hash value of the identification number of the user on the specific list of the organization. In the case where both are identical, it can be determined that the user D is a user on the specific list of the present organization (second organization B).
The second organization C may also compare the hash value of the name of the designated user D included in the acquired information query request with the hash value of the name of the user on the specific list of the organization (the second organization C), and compare the hash value of the identification number of the designated user D included in the information query request with the hash value of the identification number of the user on the specific list of the organization. In the case where both are identical, it can be determined that the user D is a user on the specific list of the local organization (second organization C).
Through the embodiment of the disclosure, the hash value of the personal information of the business object is written into the information query request instead of directly writing the personal information of the business object into the information query request, so that the leakage of the personal information of the business object can be avoided, and the privacy of the business object can be further protected. And in addition, the storage resource of the block chain can be saved.
As an alternative embodiment, the information query request includes at least one of: a blacklist query request, a credit investigation request and a whitelist query request.
It should be noted that, whether a user applying for a service is a blacklist user can be determined by performing blacklist query, so as to avoid service risk; whether a user applying the service has a credit investigation problem can be determined by inquiring the credit investigation list so as to avoid service risks; whether the user applying the service is a VIP user can be determined by carrying out white list query, so that the service development is facilitated.
As an alternative embodiment, the writing of the information query request initiated by the first mechanism to the blockchain may include: and writing the information query request into the block chain in a quiz mode or a specified mechanism query mode.
Wherein, in the quiz mode, the at least one other second mechanism may include: all other enterprises (i.e., other federation members of the federation chain) involved in the federation chain except the first enterprise (i.e., the enterprise that initiated the information query request). Wherein, in the disclosed embodiment, the block chain includes the federation chain.
Alternatively, in the designated institution query mode, the at least one other second institution may include: except for the first enterprise (i.e., the enterprise that initiated the information query request) to refer to a designated one or more of all other enterprises in the federation chain.
According to an embodiment of the disclosure, in the quiz mode, all but the first organization in a blockchain (e.g., a federation chain) may query the information query request. For example, other mechanisms may query in the blockchain periodically or aperiodically, and in the case of querying the information query request, the information query request may be replied to.
According to the embodiment of the disclosure, in the specified agency inquiry mode, the information inquiry request can only be replied by the agency specified by the first agency. For example, a first organization may specify other second organizations that it trusts to reply to.
By the embodiment of the disclosure, the information query request initiated by the first mechanism can be written into the block chain through two modes, and the corresponding mode can be selected to write the information query request into the block chain according to specific service conditions, so that the efficiency can be improved.
As an optional embodiment, the method further comprises: under the condition that the information inquiry request is written into the block chain in the quiz mode, adding a first field and a second field in the information inquiry request; wherein the first field is used for characterizing the number of request answering mechanisms; and the second field is used to characterize the deadline of the request reply.
According to an embodiment of the present disclosure, in the quiz mode, in order to reduce the payment cost of the present institution, the number of response institutions and the response deadline may be set. For example, only the first two agencies that gave the query result the fastest before the reply deadline are accepted, and the reply may be treated as an invalid reply even though other agencies have provided the reply before the reply deadline. No fees may be agreed upon for an invalid reply.
Through the embodiment of the disclosure, in the answering mode, the payment cost can be reduced by setting the number of the answering mechanisms, and meanwhile, the timeliness of the answering result can be ensured by setting the answering deadline, and the efficiency is improved.
FIG. 4 schematically shows a flow diagram for writing an information query request to a blockchain in a specified institutional query mode, according to an embodiment of the present disclosure. As shown in fig. 4, the method may include operations S410 to S420.
In operation S410, one or more other enterprises relating to the federation chain are selected.
In accordance with embodiments of the present disclosure, a first enterprise may select at least one other enterprise from the federation members in the federation chain as a designated enterprise. For example, a first institution may select a designated institution based on credit or may select a corresponding designated institution based on a trade relationship with other institutions.
In operation S420, for each of the one or more other institutions, performing a second operation; wherein the second operation comprises: acquiring a corresponding public key of an organization; encrypting the information inquiry request by using the acquired public key of the organization to obtain an encrypted information inquiry request; and writing the encrypted information query request into the block chain.
According to an embodiment of the present disclosure, in a case where another institution is selected as the specified institution, the public key of the specified institution is acquired. And encrypts the information query request with the public key of the specified authority. And writing the encrypted information query request into the block chain.
According to an embodiment of the present disclosure, in a case where the first mechanism writes the information query request to the block chain, the specifying mechanism may be notified to reply to the information query request. Or the designated mechanism can query in the block chain regularly or irregularly, and in the case of querying the information query request, the information query request can be replied. Further, only the specified mechanism may obtain the information query request from the blockchain.
According to the embodiment of the disclosure, the public key of the designated organization is used for encrypting the information query request, and the encrypted information query request is written into the block chain. According to the scheme, due to the fact that a technical means of public key encryption is utilized, the information query request is obtained by a specified mechanism, and further the information query request can be guaranteed not to be obtained by other mechanisms. Meanwhile, the appointed mechanism can decrypt the information inquiry request by using the private key of the mechanism, and the Hash value of the personal information of the business object contained in the information inquiry request can be ensured not to be leaked.
As an optional embodiment, the method further comprises: in the case where the information query request is written to the block chain in the specified agency query mode, a third field is added to the information query request, wherein the third field is used to characterize an expiration time of a request reply.
Through the embodiment of the disclosure, under the query mode of the designated mechanism, the timeliness of the response result can be ensured and the efficiency is improved by setting the response deadline.
As an optional embodiment, the method further comprises: the at least one second authority is notified to reply to the information query request written in the block chain.
According to an embodiment of the present disclosure, in a case where the first mechanism writes the information query request to the block chain, the specifying mechanism (second mechanism) may be notified to reply to the information query request. For example, an information query request reply notification may be sent to the specified authority.
Through the embodiment of the disclosure, in the query mode of the designated mechanism, the notification is sent to the designated mechanism for notifying the designated mechanism to reply to the information query request, so that the designated mechanism can be ensured to acquire the information query request, and other mechanisms can be prevented from acquiring the information query request. In addition, the timeliness of the response result can be ensured, and the efficiency is improved.
As an alternative embodiment, in response to failing to obtain a corresponding information query result based on at least one of the following lists provided internally by the first mechanism, writing the information query request to the blockchain: black list, credit list and white list.
According to an embodiment of the present disclosure, in response to a failure to query a specified user in a list of the local mechanism, an information query request may be written to the blockchain. For example, even if no specific user is queried on the black list of the present organization, it is still impossible to determine whether the specific user is a black list user, and therefore, it is further possible to query whether the specific user is on the black list of other organizations. Therefore, in this case, the blacklist information query request may be written to the blockchain, so that other organizations may obtain the blacklist information query request through the blockchain and reply according to the blacklist information query request.
Fig. 5 schematically shows a flowchart of another block chain-based information processing method according to an embodiment of the present disclosure. As shown in fig. 5, the method may include operations S510 to S530.
In operation S510, an information query request for writing to a block chain by at least one other first mechanism is obtained.
According to an embodiment of the present disclosure, the second enterprise, as a member of the federation in, for example, a federation chain, may obtain information query requests written by other enterprises (first enterprises) from the blockchain. Such as a blacklist information query request, a credit list information query request, and a white list information query request.
According to the embodiment of the present disclosure, in the case that the information query request written by the first mechanism is written in the block chain in the quiz mode, all other mechanisms (i.e., other federation members of the federation chain) except the first mechanism writing the information query request can acquire the information query request in the block chain.
According to an embodiment of the present disclosure, in a case where an information query request written by a first organization is written in a block chain in a specified organization query mode, in the block chain, the information query request can be acquired by the specified organization (specified second organization), and other unspecified organizations cannot acquire the information query request.
In operation S520, in response to the information query request, query result information is obtained.
According to the embodiment of the disclosure, when the obtained information query request is written into the block chain in the quiz mode, the second mechanism obtaining the information query request may query in a local list according to the hash value of the personal information of the service object included in the information query request, so as to obtain query result information. For example, in a local white list, whether the hash value of the personal information of the business object included in the information query request exists is queried.
According to the embodiment of the disclosure, when the acquired information query request is written into the block chain in the designated mechanism query mode, since the first mechanism encrypts the information query request by using the public key of the designated mechanism, and thus writes the encrypted information query request into the block chain, the information query request can only be acquired by the designated mechanism, and other non-designated mechanisms cannot acquire the information query request.
Further, according to the embodiment of the present disclosure, in a case where the information query request is acquired by a specifying mechanism, the specifying mechanism may decrypt the information query request by using a private key of the mechanism (the specifying mechanism), thereby obtaining a hash value of personal information of a business object included in the information query request, and obtain query result information by using the hash value.
In operation S530, the query result information is written into the blockchain, so that the at least one first mechanism can obtain the query result information written for the information query request from the blockchain.
According to the embodiment of the disclosure, the second mechanism acquires the information query request, and queries in the list of the mechanism according to the hash value of the personal information contained in the information query request. And then obtaining query result information and writing the query result information into the block chain. According to the scheme, the mechanisms do not need to upload the list information of the mechanisms, the risk of wrong query results caused by falsification of the list information can be avoided, and meanwhile, the loss of the mechanisms due to leakage of the list information can be avoided. In addition, by writing the information query request and the query result information into the block chain, the risk that the information query request and the query result information are tampered or leaked by people in the process can be avoided.
As an alternative embodiment, writing the query result information to the blockchain includes: and encrypting the query result information and then writing the encrypted query result information into the block chain.
According to the embodiment of the disclosure, the second organization acquires the public key of the first organization written in the information query request, and encrypts the query result information by using the public key. And writing the encrypted query result information into the block chain.
According to the embodiment of the disclosure, the first mechanism obtains the query result information, and decrypts the query result information by using a private key stored locally, so as to obtain the query result.
According to the embodiment of the disclosure, the technical means that the public key of the first organization which writes the information query request is used for encrypting the query result information, and the encrypted query result information is written into the block chain is adopted. The method and the system can ensure that other mechanisms except the first mechanism cannot obtain the query result information and can ensure the safety of the query result.
As an alternative embodiment, writing the query result information to the blockchain includes: and adding a fourth field in the query result information and then writing the block chain, wherein the fourth field is used for representing a reply mechanism for providing the query result information.
Through the embodiment of the disclosure, as the technical means of adding the response mechanism providing the query result information to the query result information is adopted, the source of the query result information can be proved, and the reliability and the authenticity of the query result information are further ensured.
FIG. 6 schematically shows a flow diagram for obtaining query result information according to an embodiment of the disclosure. As shown in fig. 6, the method may include operations S610 to S640.
In operation S610, in response to the information query request, a hash value of personal information of a business object included in the information query request is acquired.
According to the embodiment of the disclosure, from the acquired information query request, the hash value of the personal information of the business object contained in the information query request is acquired. For example, when the obtained information query request is written into the block chain in the specified mechanism query mode, the specified mechanism obtains the information query request, and the specified mechanism can decrypt the information query request by using the stored private key, thereby obtaining the hash value of the personal information of the business object included in the information query request.
In operation S620, business objects related to at least one of the following lists are obtained: black list, credit list and white list.
According to the embodiment of the disclosure, the acquired information query request may be a blacklist information query request, a credit investigation list information query request and a white list information query request.
In operation S630, a hash value of the personal information of each of the business objects is obtained.
According to the embodiment of the disclosure, the second mechanism acquires the list information of the mechanism (second mechanism) according to the service object related to the acquired information query request. The list information contains the hash value of the personal information of the business object.
For example, if the obtained information query request relates to user information of a white list, white list information in the local organization (second organization) may be obtained. The white list information contains the hash value of the personal information of the object related to the white list service in the mechanism. Or the obtained information query request relates to the user information of the blacklist. The blacklist information in the present organization can be acquired. The blacklist information contains the hash value of the personal information of the object related to the blacklist service in the mechanism.
In operation S640, the hash value of the personal information of the business object included in the information query request is matched with the hash value of the personal information of each business object in the business objects to obtain the query result information.
According to the embodiment of the disclosure, in the case that the hash value of the personal information of the business object included in the acquired information query request is consistent with the hash value of the personal information of the business object included in the list of the local organization, it may be determined that the business object is in the list of the local organization.
According to the embodiment of the disclosure, a technical means of determining whether the business object is in the list of the second organization by using the hash value of the personal information of the business object contained in the information query request is adopted. The business object can be inquired without directly utilizing the personal information of the business object, such as the hidden information of name, ID card number and the like, so that the personal information of the user can be ensured not to be leaked, and the privacy of the user can be protected.
As an optional embodiment, the method further comprises: and informing the mechanism which initiates the information inquiry request to inquire the inquiry result information which is written aiming at the information inquiry request by the block chain.
According to the embodiment of the disclosure, in the case that the query result information is written into the blockchain, a notification may be sent to the first mechanism to which the query result information is directed, so as to notify the first mechanism to acquire the query result information in time.
According to the embodiment of the disclosure, a first mechanism for notifying the query result information is adopted, so that the technical means for acquiring the query result information from the block chain is adopted. The first mechanism can be ensured to acquire the query result information in time.
Fig. 7 schematically shows a block diagram of an information processing apparatus based on a block chain according to an embodiment of the present disclosure.
As shown in fig. 7, an information processing apparatus 700 based on a block chain includes a first writing module 710 and an obtaining module 720. The processing device may perform the method described above with reference to the method embodiment, which is not described in detail herein.
Specifically, the first writing module 710 is configured to write an information query request initiated by a first mechanism into the blockchain, so that other at least one second mechanism can perform a first operation based on the blockchain, where the first operation includes: acquiring the information query request from the block chain; responding to the information query request, and obtaining query result information; and writing the query result information into the block chain. And an obtaining module 720, configured to obtain, from the blockchain, query result information written by the at least one second mechanism for the information query request.
According to an embodiment of the present disclosure, the information query request includes: a hash value of personal information of the business object.
According to an embodiment of the present disclosure, the information query request includes at least one of the following: a blacklist query request, a credit investigation request and a whitelist query request.
According to an embodiment of the present disclosure, the first writing module includes: a write-in submodule for writing the information inquiry request into the block chain in a quiz mode or a designated mechanism inquiry mode; wherein: in the quiz mode, the at least one other second mechanism includes: all other enterprises relating to federation chains except said first enterprise, wherein said blockchain comprises said federation chain; and in the designated mechanism inquiry mode, the at least one other second mechanism includes: involving, in addition to the first organization, a designated one or more of all other organizations of the federation chain.
According to an embodiment of the present disclosure, the processing apparatus further includes: a first adding module, configured to add a first field and a second field to the information query request when the information query request is written into the block chain in the quiz mode; wherein: the first field is used for representing the number of request answering mechanisms; and the second field is used to characterize the deadline of the request reply.
According to an embodiment of the present disclosure, the write submodule includes: a selection unit for selecting one or more other enterprises relating to the federation chain; and the execution unit is used for executing the second operation aiming at each mechanism in the one or more other mechanisms. Wherein the second operation comprises: acquiring a corresponding public key of an organization; encrypting the information inquiry request by using the acquired public key of the organization to obtain an encrypted information inquiry request; and writing the encrypted information inquiry request into the block chain.
According to an embodiment of the present disclosure, the processing apparatus further includes: and a second adding module, configured to add a third field to the information query request when the information query request is written into the block chain in the specified mechanism query mode, where the third field is used to represent an expiration time of a request reply.
According to an embodiment of the present disclosure, the processing apparatus further includes: and a notification module, configured to notify the at least one second mechanism to reply to the information query request written in the block chain.
According to an embodiment of the present disclosure, the processing apparatus further includes: a second writing module, configured to write the information query request into the block chain in response to a corresponding information query result being unavailable based on at least one of the following lists provided inside the first mechanism: black list, credit list and white list.
Fig. 8 schematically shows a block diagram of another block chain-based information processing apparatus according to an embodiment of the present disclosure.
As shown in fig. 8, another block chain-based information processing apparatus 800 includes a request acquisition module 810, an information acquisition module 820, and an information writing module 830. The processing device may perform the method described above with reference to the method embodiment, which is not described in detail herein.
Specifically, the request obtaining module 810 is configured to obtain an information query request for writing to a block chain by at least one other first mechanism; an information obtaining module 820, configured to obtain query result information in response to the information query request; and an information writing module 830, configured to write the query result information into the block chain, so that the at least one first mechanism can obtain the query result information written for the information query request from the block chain.
According to an embodiment of the present disclosure, the information writing module includes: and the first information writing sub-module is used for encrypting the query result information and then writing the encrypted query result information into the block chain.
According to an embodiment of the present disclosure, the information writing module includes: the information adding submodule is used for adding a fourth field in the query result information; a second information writing sub-module, configured to write the query result information obtained by adding a fourth field by the information adding sub-module into the block chain, where the fourth field is used to represent a reply mechanism providing the query result information.
According to an embodiment of the present disclosure, the information obtaining module includes: a first obtaining sub-module, configured to respond to the information query request, and obtain a hash value of personal information of a business object included in the information query request; a second obtaining sub-module, configured to obtain each service object related to at least one of the following lists: a black list, a credit investigation list and a white list; a third obtaining submodule, configured to obtain a hash value of the personal information of each service object in the service objects; and a matching sub-module, configured to match a hash value of the personal information of the business object included in the information query request with a hash value of the personal information of each business object in the business objects, so as to obtain the query result information.
According to an embodiment of the present disclosure, the processing apparatus further includes: and an information notification module, configured to notify a mechanism that initiates the information query request to query the block chain for the query result information written in response to the information query request.
It should be noted that the embodiments of the apparatus portion and the method portion are similar to each other, and the achieved technical effects are also similar to each other, which are not described herein again.
Any of the modules, units, or at least part of the functionality of any of them according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules and units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, units according to the embodiments of the present disclosure may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by any other reasonable means of hardware or firmware by integrating or packaging the circuits, or in any one of three implementations of software, hardware and firmware, or in any suitable combination of any of them. Alternatively, one or more of the modules, units according to embodiments of the present disclosure may be implemented at least partly as computer program modules, which, when executed, may perform the respective functions.
For example, any number of the first writing module 710 and the obtaining module 720 (or the request obtaining module 810, the information obtaining module 820, and the information writing module 830) may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the first writing module 710 and the obtaining module 720 (or the request obtaining module 810, the information obtaining module 820 and the information writing module 830) may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementations of software, hardware and firmware, or an appropriate combination of any several of them. Alternatively, at least one of the first writing module 710 and the obtaining module 720 (or the request obtaining module 810, the information obtaining module 820 and the information writing module 830) may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 9 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure. The electronic device shown in fig. 9 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 9, the electronic device 900 includes a processor 910, a computer-readable storage medium 920. The electronic device 900 may perform a method according to an embodiment of the disclosure.
In particular, processor 910 may include, for example, a general purpose microprocessor, an instruction set processor and/or related chip set and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), and/or the like. The processor 910 may also include onboard memory for caching purposes. The processor 910 may be a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
Computer-readable storage media 920, for example, may be non-volatile computer-readable storage media, specific examples including, but not limited to: magnetic storage devices, such as magnetic tape or Hard Disk Drives (HDDs); optical storage devices, such as compact disks (CD-ROMs); a memory, such as a Random Access Memory (RAM) or a flash memory; and so on.
The computer-readable storage medium 920 may include a computer program 921, which computer program 921 may include code/computer-executable instructions that, when executed by the processor 910, cause the processor 910 to perform a method according to an embodiment of the present disclosure, or any variation thereof.
The computer program 921 may be configured with, for example, computer program code comprising computer program modules. For example, in an example embodiment, code in computer program 921 may include one or more program modules, including 921A, modules 921B, … …, for example. It should be noted that the division and number of the modules are not fixed, and those skilled in the art may use suitable program modules or program module combinations according to actual situations, so that the processor 910 may execute the method according to the embodiment of the present disclosure or any variation thereof when the program modules are executed by the processor 910.
According to an embodiment of the present disclosure, at least one of the first writing module 710 and the obtaining module 720 (or the request obtaining module 810, the information obtaining module 820, and the information writing module 830) may be implemented as a computer program module described with reference to fig. 9, which, when executed by the processor 910, may implement the corresponding operations described above.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
It will be understood by those skilled in the art that while the present disclosure has been shown and described with reference to certain exemplary embodiments thereof, it will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present disclosure as defined by the appended claims and their equivalents. Accordingly, the scope of the present disclosure should not be limited to the above-described embodiments, but should be defined not only by the appended claims, but also by equivalents thereof.

Claims (19)

1. An information processing method based on a block chain comprises the following steps:
writing an information query request initiated by a first mechanism into a blockchain so that other at least one second mechanism can execute a first operation based on the blockchain, wherein the first operation comprises: acquiring the information query request from the block chain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and
and acquiring the query result information written by the at least one second mechanism for the information query request from the blockchain.
2. The method of claim 1, wherein the information query request comprises: a hash value of personal information of the business object.
3. The method of claim 1 or 2, wherein the information query request comprises at least one of:
a blacklist query request, a credit investigation request and a whitelist query request.
4. The method of claim 1, wherein the writing of the first-mechanism-initiated information query request to the blockchain comprises:
writing the information query request into the block chain in a quiz mode or a designated mechanism query mode;
wherein:
in the quiz mode, the at least one other second mechanism comprises: all other enterprises except the first enterprise that are involved in a federation chain, wherein the blockchain comprises the federation chain; and
in the designated institution query mode, the at least one other second institution comprises: involving a designated one or more of all other enterprises of the federation chain, except the first enterprise.
5. The method of claim 4, further comprising: in case the information query request is written to the block chain in the quiz mode,
adding a first field and a second field in the information query request;
wherein:
the first field is used for characterizing the number of request answering mechanisms; and
the second field is used to characterize the deadline of the request reply.
6. The method of claim 4, wherein writing the information query request to the blockchain in a specified institutional query mode comprises:
selecting one or more other enterprises relating to the federation chain;
performing a second operation for each of the one or more other facilities;
wherein the second operation comprises:
acquiring a corresponding public key of an organization;
encrypting the information inquiry request by using the acquired public key of the organization to obtain an encrypted information inquiry request; and
and writing the encrypted information query request into the block chain.
7. The method of claim 4, further comprising: in the case where the information query request is written to the block chain in the specified institutional query mode,
adding a third field in the information inquiry request, wherein the third field is used for representing the deadline of a request reply.
8. The method of claim 1, further comprising:
notifying the at least one second authority to reply to the information query request written into the block chain.
9. The method of claim 1, wherein:
in response to failing to obtain a corresponding information query result based on at least one of the following lists provided internally by the first mechanism, writing the information query request to the blockchain: black list, credit list and white list.
10. An information processing method based on a block chain comprises the following steps:
acquiring an information query request written into a block chain by at least one other first mechanism;
responding to the information query request, and obtaining query result information; and
and writing the query result information into the block chain so that the at least one first mechanism can acquire the query result information written for the information query request from the block chain.
11. The method of claim 10, wherein writing the query result information to the blockchain comprises:
and encrypting the query result information and then writing the encrypted query result information into the block chain.
12. The method of claim 10, wherein writing the query result information to the blockchain comprises:
and adding a fourth field in the query result information and then writing the block chain, wherein the fourth field is used for representing a reply mechanism for providing the query result information.
13. The method of claim 10, wherein obtaining query result information in response to the information query request comprises: in response to the information query request, the server sends a response message,
obtaining the hash value of the personal information of the business object contained in the information query request;
obtaining each business object involved in at least one of the following lists: a black list, a credit investigation list and a white list;
obtaining the hash value of the personal information of each business object in each business object; and
and matching the hash value of the personal information of the business object contained in the information query request with the hash value of the personal information of each business object in each business object to obtain the query result information.
14. The method of claim 10, further comprising:
and informing a mechanism which initiates the information inquiry request to inquire the inquiry result information which is written aiming at the information inquiry request by the block chain.
15. An information processing apparatus based on a block chain, comprising:
a first writing module, configured to write an information query request initiated by a first mechanism into a blockchain, so that other at least one second mechanism can perform a first operation based on the blockchain, where the first operation includes: acquiring the information query request from the block chain; responding to the information query request, and obtaining query result information; writing the query result information into the block chain; and
and the acquisition module is used for acquiring the query result information written by the at least one second mechanism aiming at the information query request from the blockchain.
16. An information processing apparatus based on a block chain, comprising:
the request acquisition module is used for acquiring an information query request written into the block chain by at least one first mechanism;
the information obtaining module is used for responding to the information inquiry request and obtaining inquiry result information; and
and the information writing module is used for writing the query result information into the block chain so that the at least one first mechanism can acquire the query result information written aiming at the information query request from the block chain.
17. An electronic device, comprising:
one or more processors;
a memory for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1-14.
18. A computer-readable storage medium storing computer-executable instructions for implementing the method of any one of claims 1 to 14 when executed.
19. A computer program product comprising a computer program which, when executed by a processor, implements the method according to any one of claims 1 to 14.
CN202110207477.7A 2021-02-24 2021-02-24 Information processing method and device based on block chain Pending CN112883115A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110207477.7A CN112883115A (en) 2021-02-24 2021-02-24 Information processing method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110207477.7A CN112883115A (en) 2021-02-24 2021-02-24 Information processing method and device based on block chain

Publications (1)

Publication Number Publication Date
CN112883115A true CN112883115A (en) 2021-06-01

Family

ID=76054337

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110207477.7A Pending CN112883115A (en) 2021-02-24 2021-02-24 Information processing method and device based on block chain

Country Status (1)

Country Link
CN (1) CN112883115A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain
CN109583215A (en) * 2018-09-28 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN109658236A (en) * 2019-01-31 2019-04-19 北京京东尚科信息技术有限公司 Information interacting method, block chain node and credit investigation system based on block chain
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain
CN110245187A (en) * 2019-05-20 2019-09-17 深圳壹账通智能科技有限公司 A kind of list type queries method and node based on block chain
CN111639108A (en) * 2020-05-27 2020-09-08 中国建设银行股份有限公司 Data query method and device, electronic equipment and computer readable storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109189857A (en) * 2018-09-17 2019-01-11 北京京东尚科信息技术有限公司 Data-sharing systems, method and apparatus based on block chain
CN109583215A (en) * 2018-09-28 2019-04-05 阿里巴巴集团控股有限公司 It is a kind of to handle the method and device of collage-credit data, block chain data-sharing systems
CN109669986A (en) * 2018-12-12 2019-04-23 深圳乐信软件技术有限公司 Blacklist sharing method, device, equipment and storage medium based on block chain
CN109658236A (en) * 2019-01-31 2019-04-19 北京京东尚科信息技术有限公司 Information interacting method, block chain node and credit investigation system based on block chain
CN110245187A (en) * 2019-05-20 2019-09-17 深圳壹账通智能科技有限公司 A kind of list type queries method and node based on block chain
CN111639108A (en) * 2020-05-27 2020-09-08 中国建设银行股份有限公司 Data query method and device, electronic equipment and computer readable storage medium

Similar Documents

Publication Publication Date Title
US11810079B2 (en) Systems and methods for tracking subdivided ownership of connected devices using block-chain ledgers
US10834062B2 (en) Unlinking ownership of successive asset transfers on a blockchain
US20240289785A1 (en) Blockchain-based method and system for specifying the recipient of an electronic communication
US11321783B2 (en) Method and device for data processing based on blockchain
US9762553B2 (en) Systems and methods of secure data exchange
Navadkar et al. Overview of blockchain technology in government/public sectors
WO2020182005A1 (en) Method for information processing in digital asset certificate inheritance transfer, and related device
KR20180108566A (en) SYSTEM AND METHOD FOR MANAGING DIGITAL IDENTITY
EP3961457A1 (en) Data check methods, apparatuses, and devices
US11405396B2 (en) Secure management and provisioning of interaction data using permissioned distributed ledgers
CN110246039B (en) Transaction monitoring method and device based on alliance chain and electronic equipment
US11663595B1 (en) Blockchain transactional identity verification
CA2948230A1 (en) Systems and method for tracking subdivided ownership of connected devices using block-chain ledgers
Wheeler et al. Cloud storage security: A practical guide
CN111292174A (en) Tax payment information processing method and device and computer readable storage medium
US20230142659A1 (en) System and method for registering share of asset of which owner cannot be specified or ownership does not exist
CN113221191B (en) Block chain-based data evidence storage method, device, equipment and storage medium
CN112861102B (en) Method and system for processing electronic file based on block chain
CN112966309A (en) Service implementation method and device based on block chain
CN112287311A (en) Service implementation method and device based on block chain
CN110033367A (en) Based on the contract record method and device of block chain, electronic equipment
CN114301675A (en) Private data transaction method, system, computer device and storage medium
CN115641133A (en) Real-name NFT transaction method, device, equipment and storage medium
CN112883115A (en) Information processing method and device based on block chain
US8498976B1 (en) Pre-audit system, apparatus, and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination