CN113765875B - Feedback method and device for data verification information - Google Patents

Feedback method and device for data verification information Download PDF

Info

Publication number
CN113765875B
CN113765875B CN202011285006.XA CN202011285006A CN113765875B CN 113765875 B CN113765875 B CN 113765875B CN 202011285006 A CN202011285006 A CN 202011285006A CN 113765875 B CN113765875 B CN 113765875B
Authority
CN
China
Prior art keywords
information
data
intelligent contract
basic data
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011285006.XA
Other languages
Chinese (zh)
Other versions
CN113765875A (en
Inventor
马奔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Qianshi Technology Co Ltd
Beijing Jingdong Zhenshi Information Technology Co Ltd
Original Assignee
Beijing Jingdong Qianshi Technology Co Ltd
Beijing Jingdong Zhenshi Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Qianshi Technology Co Ltd, Beijing Jingdong Zhenshi Information Technology Co Ltd filed Critical Beijing Jingdong Qianshi Technology Co Ltd
Priority to CN202011285006.XA priority Critical patent/CN113765875B/en
Publication of CN113765875A publication Critical patent/CN113765875A/en
Application granted granted Critical
Publication of CN113765875B publication Critical patent/CN113765875B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Abstract

The application discloses a feedback method and a device of data verification information, which are applied to a alliance chain server and comprise the following steps: receiving an information verification request; determining a data verification target; acquiring corresponding intelligent contract attribute information, basic data set and basic data abstract attribute information from a block chain network; the intelligent contract attribute information comprises an intelligent contract and a attribution party electronic signature value of the intelligent contract; the intelligent sum is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises homomorphic encrypted basic data abstract and corresponding attribution electronic signature value; generating data analysis result information based on the intelligent contract and the basic data set; and feeding back data analysis result information, a home electronic signature value of the intelligent contract and basic data abstract information. The application can ensure the safety of the data analysis code information and the basic data while providing the data verification information of the intelligent information.

Description

Feedback method and device for data verification information
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for feeding back data verification information.
Background
Currently, when a business intelligence information merchant sells business intelligence information, the authenticity of the business intelligence information needs to be self-verified to acquire information from consumers.
The inventors found in the course of implementing the present application that: the existing method for verifying the authenticity of the business intelligent information has information safety hidden trouble. The specific cause analysis is as follows:
in the existing method for verifying the authenticity of the business intelligence information, code information and basic data of a data analysis algorithm for generating the business intelligence information need to be provided for a user, the user generates corresponding business intelligence information based on the code information and the basic data, and then the user compares the business intelligence information with purchased business intelligence information in consistency, so that the authenticity of the purchased business intelligence information can be known. In the above verification method, the code information and the basic data of the data analysis algorithm need to be provided to the user, so that the user may sell the basic data and the code information of the data analysis algorithm to other merchants or users for a second time, thereby causing the risk that the code information and the basic data of the data analysis algorithm are revealed to competitors.
Disclosure of Invention
Therefore, the main purpose of the present application is to provide a method and a device for feeding back data verification information, which can provide data verification information of intelligent information and simultaneously ensure the security of code information and basic data of a corresponding data analysis algorithm.
In order to achieve the above purpose, the technical solution provided by the embodiment of the present application is as follows:
a feedback method of data verification information is applied to a alliance chain server, and comprises the following steps:
receiving an information verification request;
determining a data verification target based on the information verification request;
acquiring intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from a blockchain network; wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
generating data analysis result information based on the intelligent contract and the basic data set;
and feeding back the data analysis result information, the attribution side electronic signature value of the intelligent contract and the basic data abstract information.
In one embodiment, the method further comprises:
acquiring and feeding back a key point attribute value and a value range attribute value of a key point of the data verification target from a block chain network; the key point attribute value is encrypted using a zero knowledge proof technique.
In one embodiment, the information verification request includes an intelligent contract identification of the data to be verified.
In one embodiment, the determining the data verification target includes:
and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
The embodiment of the application provides a feedback device of data verification information, which is applied to a alliance chain server and comprises the following components:
the request receiving module is used for receiving the information verification request;
the target determining module is used for determining a data verification target based on the information verification request;
the information acquisition module is used for acquiring intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from a blockchain network; wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
the data analysis module is used for generating data analysis result information based on the intelligent contract and the basic data set;
and the information feedback module is used for feeding back the data analysis result information, the attribution side electronic signature value of the intelligent contract and the basic data abstract information.
In one embodiment, the information obtaining module is further configured to obtain, from a blockchain network, a key point attribute value of the data verification target and a value range attribute value of a key point, where the key point attribute value is encrypted using a zero knowledge proof technology;
and the information feedback module is further used for feeding back the attribute value of the key point and the attribute value of the value range of the key point.
In one embodiment, the information verification request includes an intelligent contract identification of the data to be verified.
In one embodiment, the target determining module is specifically configured to determine a data verification target, including: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
The embodiment of the application discloses a feedback device of data verification information, which comprises a processor and a memory;
the memory stores therein an application executable by the processor for causing the processor to perform the feedback method of the data authentication information as described above.
The embodiment of the application discloses a computer readable storage medium, wherein computer readable instructions are stored, and the computer readable instructions are used for executing the feedback method of data verification information.
According to the feedback scheme of the data verification information, the code information for data analysis is stored in the blockchain network through the intelligent contract by utilizing the blockchain technology, the basic data for data analysis is stored in the blockchain network after homomorphic encryption processing, and the abstract and signature value of the basic data after homomorphic encryption processing and the signature value of the intelligent contract are stored in the blockchain network. When the alliance link receives the information verification request of the client, the information of the data verification target is obtained from the blockchain network, the data analysis result information is regenerated based on the obtained intelligent contract and the basic data, and the data analysis result information, the abstract and the signature value of the basic data and the signature value of the intelligent contract are fed back to the user as verification information. In this way, the user can judge the authenticity of the held corresponding intelligent information based on the verification information acquired by the client. Meanwhile, all basic data and data analysis algorithms are not required to be sent to a user, and verification information in the blockchain network is subjected to homomorphic encryption processing, so that the original information of the verification information can be ensured not to be leaked. Therefore, the embodiment of the application can ensure the safety of the corresponding data analysis code information and the basic data while providing the data verification information of the intelligent information.
Drawings
FIG. 1 is a schematic flow chart of a method according to an embodiment of the application;
fig. 2 is a schematic diagram of a device structure according to an embodiment of the present application.
Detailed Description
The present application will be described in further detail with reference to the drawings and the embodiments, in order to make the objects, technical solutions and advantages of the present application more apparent.
Fig. 1 is a schematic flow chart of a method of an embodiment of the present application, and a feedback method of data verification information implemented in the embodiment is applied to a federated chain server, as shown in fig. 1, and mainly includes:
step 101, receiving an information verification request.
In one embodiment, the federated chain server may receive a user's information verification request from a federated chain client.
In one embodiment, to improve the efficiency of determining the data verification target by the federated chain server, the information verification request may carry an intelligent contract identifier of the data to be verified, so that the federated chain server may determine the data verification target.
The data to be verified is data analysis result information (such as business intelligence information purchased by a user) for verifying authenticity of the user.
In practical application, the data verification target may be indicated by carrying other information in the information verification request, for example, the number information of the data analysis result information purchased by the user, and the mapping relationship between the number information and the intelligent contract may be pre-stored in the blockchain network for the alliance chain server to query.
It should be noted that: a federation chain is co-organized for intelligent information providers, which in conjunction with a trusted authentication center (ca) issues certificates to designate the identity of the individual information providers (i.e., merchants that supply the intelligent information). The user may autonomously download the client of the federation chain to request verification of data in the regional chain network of the federation chain and identity information (i.e., electronic signature values) of the corresponding information provider from the federation chain server.
Step 102, determining a data verification target based on the information verification request.
In one embodiment, the smart contract indicated by the smart contract identification may be determined as the data verification target.
And step 103, acquiring intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from a blockchain network.
Wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and a attribution party electronic signature value of the basic data abstract.
In this step, the federated chain server needs to obtain the intelligent contract attribute information, the basic data set, and the basic data summary attribute information of the data verification target from the blockchain network.
The code information for data analysis is stored in the blockchain network in the form of intelligent contracts, and meanwhile, the basic data is stored in the blockchain network after homomorphic encryption, so that the alliance chain server can calculate and obtain data analysis result information based on the information and provide the data analysis result information for a user for verification on the premise of not revealing the original information.
In order to ensure that the original information is not revealed after the basic data and the basic data abstract are provided for users, homomorphic encryption is needed to process the data so as to ensure the safety of the data.
In addition, the step of acquiring the attribution electronic signature value of the basic data abstract and the attribution electronic signature value of the intelligent contract is to provide the electronic signature values for the user, so that the user can acquire the authenticity of the intelligent contract for generating the data analysis result information by the alliance chain server and the authenticity of the basic data abstract fed back by the alliance chain server based on the electronic signature values, and further the authenticity of the data to be verified can be acquired by utilizing the data analysis result information and the basic data abstract fed back by the alliance chain server.
In one embodiment, the homomorphically encrypted base data may be all or part of the base data used by the data analysis algorithm.
For the purpose of clearly illustrating the technical effects of the present application, the following details of the blockchain, homomorphic encryption techniques and smart contracts used in the present application are as follows:
blockchain: essentially, a decentralised database is a series of data blocks generated by association using cryptography, each data block containing information of service data for verifying validity of the information.
Homomorphic encryption: a function of processing encrypted data is provided. That is, other people can process the encrypted data, but the process does not reveal any original content. Meanwhile, after the user with the secret key decrypts the processed data, the processed result is obtained. We take an example of real life. A user called Alice purchased a large piece of gold that she wanted to make a necklace from the worker. However, the worker may steal the gold during the process of making, after all, …, which is a gram of gold and a lot of money, cannot be a method for the worker to process the gold block (delegate processing of your data), but cannot obtain any gold (without giving away access to it)? There is of course a way Alice can do this: alice locks the gold in a closed box that holds a glove. The worker can carry the glove and process the gold seeds inside the box. However, the box is locked, so that workers cannot take the gold blocks, and any gold falling in the processing process cannot be taken. After the processing is completed. Alice takes back the box and opens the lock to obtain the gold.
Intelligent contract: a piece of code running on top of the blockchain, a computer protocol that aims to propagate, verify or execute contracts in an informative manner. Smart contracts allow trusted transactions to be made without third parties, which transactions are traceable and irreversible.
And 104, generating data analysis result information based on the intelligent contract and the basic data set.
And step 105, feeding back the data analysis result information, the attribution side electronic signature value of the intelligent contract and the basic data abstract information.
Furthermore, the alliance chain server can provide basic data key point data and the value range of the key points for the user according to the information verification request so as to further verify the authenticity of the purchased data analysis result information. Specifically, in one implementation manner, the method embodiment may further include:
acquiring and feeding back a key point attribute value and a value range attribute value of a key point of the data verification target from a block chain network; the key point attribute value is encrypted using a zero knowledge proof technique.
It should be noted that: zero knowledge proof refers to the ability of a prover to trust that a certain assertion is correct without providing the verifier with any useful information. If a were to prove to B that it had a key for a room that could only be unlocked with the key, but not in any other way. B determines that there is an object in the room, A opens the door of the room with its own key, and then takes the object out to show it to B, thereby proving that it really has its own key. This is a zero knowledge proof. The key has the advantages that in the whole proving process, B can not see the key all the time, so that the leakage of the key is avoided.
In the method, the key points encrypted by the zero knowledge proof technology and the value range of each key point are obtained, so that a user does not need to see all basic data, and whether the key points in the analysis result information of the data to be verified are in the corresponding value range fed back by the alliance chain server is judged based on the value range of the key points, and the authenticity of the analysis result information of the data to be verified can be obtained.
According to the embodiment, all basic data and data analysis algorithms are not required to be provided for a user in the scheme, but the alliance chain server acquires intelligent contract attribute information, basic data set and basic data abstract attribute information of a data verification target stored in advance from the blockchain network, generates data analysis result information based on the information, and feeds back the data analysis result information, the attribution electronic signature value of the intelligent contract and the basic data abstract information to the user together, so that the safety of the verification information can be ensured, and the user can acquire the authenticity of the held data analysis result information based on the verification information on the premise that the data analysis algorithm and all basic data are not acquired.
Corresponding to the above method embodiment, the embodiment of the present application provides a feedback device for data verification information, which is applied to a federated chain server, and includes:
a request receiving module 201, configured to receive an information verification request;
a target determination module 202 for determining a data verification target based on the information verification request;
an information obtaining module 203, configured to obtain, from a blockchain network, intelligent contract attribute information, a basic data set, and basic data summary attribute information of the data verification target; wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
a data analysis module 204 for generating data analysis result information based on the smart contract and the underlying data set;
and the information feedback module 205 is configured to feed back the data analysis result information, the home electronic signature value of the intelligent contract, and the basic data summary information.
In one embodiment, the information obtaining module 203 is further configured to obtain, from a blockchain network, a key point attribute value of the data verification target and a value range attribute value of a key point, where the key point attribute value is encrypted using a zero knowledge proof technology;
the information feedback module 205 is further configured to feed back the attribute value of the key point and the attribute value of the value range of the key point.
In one embodiment, the information verification request includes an intelligent contract identification of the data to be verified.
In one embodiment, the objective determining module 201 is specifically configured to determine a data verification objective, including: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
Based on the method embodiment, the embodiment of the application also discloses a feedback device of the data verification information, which comprises a processor and a memory;
the memory stores therein an application executable by the processor for causing the processor to perform the feedback method of the data authentication information as described above.
Based on the above-described method embodiments, the embodiments of the present application disclose a computer-readable storage medium having stored therein computer-readable instructions for performing the feedback method of data verification information as described above.
In the above embodiments, the memory may be embodied as various storage media such as an electrically erasable programmable read-only memory (EEPROM), a Flash memory (Flash memory), a programmable read-only memory (PROM), and the like. A processor may be implemented to include one or more central processors or one or more field programmable gate arrays, where the field programmable gate arrays integrate one or more central processor cores. In particular, the central processor or central processor core may be implemented as a CPU or MCU.
It should be noted that not all the steps and modules in the above processes and the structure diagrams are necessary, and some steps or modules may be omitted according to actual needs. The execution sequence of the steps is not fixed and can be adjusted as required. The division of the modules is merely for convenience of description and the division of functions adopted in the embodiments, and in actual implementation, one module may be implemented by a plurality of modules, and functions of a plurality of modules may be implemented by the same module, and the modules may be located in the same device or different devices.
The hardware modules in the various embodiments may be implemented mechanically or electronically. For example, a hardware module may include specially designed permanent circuits or logic devices (e.g., special purpose processors such as FPGAs or asics) for performing a particular operation. A hardware module may also include programmable logic devices or circuits (e.g., including a general purpose processor or other programmable processor) temporarily configured by software for performing particular operations. As regards implementation of the hardware modules in a mechanical manner, either by dedicated permanent circuits or by circuits that are temporarily configured (e.g. by software), this may be determined by cost and time considerations.
Storage medium implementations for providing program code include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs, DVD+RWs), magnetic tapes, non-volatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or cloud by a communications network.
In this document, "schematic" means "serving as an example, instance, or illustration," and any illustrations, embodiments described herein as "schematic" should not be construed as a more preferred or advantageous solution. For simplicity of the drawing, the parts relevant to the present application are shown only schematically in the drawings, and do not represent the actual structure thereof as a product. Additionally, in order to simplify the drawing for ease of understanding, components having the same structure or function in some of the drawings are shown schematically with only one of them, or only one of them is labeled. In this document, "a" does not mean to limit the number of relevant portions of the present application to "only one thereof", and "an" does not mean to exclude the case where the number of relevant portions of the present application is "more than one". In this document, "upper", "lower", "front", "rear", "left", "right", "inner", "outer", and the like are used merely to indicate relative positional relationships between the relevant portions, and do not limit the absolute positions of the relevant portions.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.
In summary, the above embodiments are only preferred embodiments of the present application, and are not intended to limit the scope of the present application. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.

Claims (10)

1. The feedback method of the data verification information is characterized by being applied to a alliance chain server and comprising the following steps of:
the alliance chain server receives an information verification request; the information verification request carries related information of data to be verified, which is used for indicating a data verification target, wherein the data to be verified is data analysis result information of a user needing to verify authenticity;
the alliance chain server determines a data verification target based on the information verification request;
the alliance chain server acquires intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from a blockchain network;
wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
the alliance chain server generates data analysis result information based on the intelligent contract and the basic data set;
the alliance chain server feeds back the data analysis result information, the attribution side electronic signature value of the intelligent contract and the basic data abstract attribute information, so that a corresponding user can know the authenticity of the intelligent contract used for generating the data analysis result information by the alliance chain server, the authenticity of the basic data abstract fed back by the alliance chain server and the authenticity of the data to be verified.
2. The method according to claim 1, wherein the method further comprises:
acquiring and feeding back a key point attribute value and a value range attribute value of a key point of the data verification target from a block chain network; the key point attribute value is encrypted using a zero knowledge proof technique.
3. The method of claim 1, wherein the step of determining the position of the substrate comprises,
the information verification request includes an intelligent contract identification of the data to be verified.
4. A method according to claim 3, wherein said determining a data verification target comprises:
and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
5. A feedback device for data verification information, which is applied to a coalition chain server, and comprises:
the request receiving module is used for receiving the information verification request; the information verification request carries related information of data to be verified, which is used for indicating a data verification target, wherein the data to be verified is data analysis result information of a user needing to verify authenticity;
the target determining module is used for determining a data verification target based on the information verification request;
the information acquisition module is used for acquiring intelligent contract attribute information, basic data set and basic data abstract attribute information of the data verification target from a blockchain network; wherein the intelligent contract attribute information comprises an intelligent contract and a home electronic signature value of the intelligent contract; the intelligent combination is about code information for data analysis; the basic data set comprises homomorphic encrypted basic data; the basic data abstract attribute information comprises a homomorphic encrypted basic data abstract and an attribution party electronic signature value of the basic data abstract;
the data analysis module is used for generating data analysis result information based on the intelligent contract and the basic data set;
and the information feedback module is used for feeding back the data analysis result information, the attribution side electronic signature value of the intelligent contract and the basic data abstract attribute information so that a corresponding user can know the authenticity of the intelligent contract for generating the data analysis result information, the authenticity of the basic data abstract fed back by the alliance chain server and the authenticity of the data to be verified.
6. The apparatus of claim 5, wherein the information obtaining module is further configured to obtain, from a blockchain network, a key point attribute value of the data verification target and a value range attribute value of a key point, the key point attribute value being encrypted using a zero knowledge proof technique;
and the information feedback module is further used for feeding back the attribute value of the key point and the attribute value of the value range of the key point.
7. The apparatus of claim 5, wherein the device comprises a plurality of sensors,
the information verification request includes an intelligent contract identification of the data to be verified.
8. The apparatus according to claim 7, wherein the objective determination module, in particular for determining a data verification objective, comprises: and determining the intelligent contract indicated by the intelligent contract identification as the data verification target.
9. A feedback device for data verification information, comprising a processor and a memory;
the memory has stored therein an application executable by the processor for causing the processor to perform the feedback method of data verification information as claimed in any one of claims 1 to 4.
10. A computer-readable storage medium having stored therein computer-readable instructions for performing the feedback method of data verification information as claimed in any one of claims 1 to 4.
CN202011285006.XA 2020-11-17 2020-11-17 Feedback method and device for data verification information Active CN113765875B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011285006.XA CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011285006.XA CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Publications (2)

Publication Number Publication Date
CN113765875A CN113765875A (en) 2021-12-07
CN113765875B true CN113765875B (en) 2023-09-26

Family

ID=78786109

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011285006.XA Active CN113765875B (en) 2020-11-17 2020-11-17 Feedback method and device for data verification information

Country Status (1)

Country Link
CN (1) CN113765875B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN111770112A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Information sharing method, device and equipment
CN111800252A (en) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 Information auditing method and device based on block chain and computer equipment

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108848058A (en) * 2018-05-07 2018-11-20 众安信息技术服务有限公司 Intelligent contract processing method and block catenary system
CN110210961A (en) * 2019-05-21 2019-09-06 平安普惠企业管理有限公司 Data capture method, server and computer storage medium based on alliance's chain
CN110782347B (en) * 2019-10-22 2023-02-03 全链通有限公司 Intelligent contract signing method, device and medium based on block chain
CN111931196A (en) * 2020-06-02 2020-11-13 山东浪潮质量链科技有限公司 Method, equipment and medium for realizing zero knowledge proof based on block chain intelligent contract
CN113468602A (en) * 2020-08-31 2021-10-01 支付宝(杭州)信息技术有限公司 Data inspection method, device and equipment

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109255210A (en) * 2018-09-27 2019-01-22 上海点融信息科技有限责任公司 The method, apparatus and storage medium of intelligent contract are provided in block chain network
CN111800252A (en) * 2020-07-22 2020-10-20 深圳壹账通智能科技有限公司 Information auditing method and device based on block chain and computer equipment
CN111770112A (en) * 2020-08-31 2020-10-13 支付宝(杭州)信息技术有限公司 Information sharing method, device and equipment

Also Published As

Publication number Publication date
CN113765875A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
CN110473105B (en) Block chain transaction settlement method, system and related equipment
US11477032B2 (en) System and method for decentralized-identifier creation
CN110377239B (en) Data signature method, device, server, system and storage medium
US11888974B1 (en) Secret sharing information management and security system
US20200097950A1 (en) Privileged entity consensus for digital asset creation
CN107832632B (en) Asset certification authorization query method, system, electronic device and computer readable storage medium
CN109768983B (en) Block chain-based multi-dimensional dynamic identity recognition method, device and system
CN111178894B (en) Asset type registration and transaction record verification method and system
US11711205B2 (en) Unified secure device provisioning
US11621844B2 (en) Secure data transfer system and method
CN109861996B (en) Block chain-based relationship proving method, device, equipment and storage medium
CN106161470B (en) A kind of authorization method, client, server and system
CN110290134A (en) A kind of identity identifying method, device, storage medium and processor
CN113010861B (en) Identity verification method and system in financing transaction based on block chain
CN112291062B (en) Voting method and device based on block chain
CN114881757A (en) Letter method, system and electronic equipment
CN104125230A (en) Short message authentication service system and authentication method
CN113326535B (en) Information verification method and device
Islam et al. Remote configuration of integrated circuit features and firmware management via smart contract
CN113765875B (en) Feedback method and device for data verification information
CN116527330A (en) System login method and device, storage medium and electronic equipment
CN104518880A (en) Big data reliability validation method and system based on random sampling detection
CN116776393B (en) Industry enabling contract signing method, device, computer equipment and storage medium
CN117155553A (en) Certificate storing method, device, medium and equipment
US20240046258A1 (en) Group payment accounts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20221220

Address after: 6 / F, 76 Zhichun Road, Haidian District, Beijing 100086

Applicant after: Beijing Jingdong Zhenshi Information Technology Co.,Ltd.

Applicant after: Beijing Jingdong Qianshi Technology Co.,Ltd.

Address before: Room a1905, 19th floor, building 2, No.18, Kechuang 11th Street, Beijing Economic and Technological Development Zone, 100176

Applicant before: Beijing Jingdong Qianshi Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant