這裡將詳細地對示例性實施例進行說明,其示例表示在圖式中。下面的描述涉及圖式時,除非另有表示,不同圖式中的相同數字表示相同或相似的要素。以下示例性實施例中所描述的實施方式並不代表與本說明書一個或多個實施例相一致的所有實施方式。相反地,它們僅是與如所附申請專利範圍中所詳述的、本說明書一個或多個實施例的一些態樣相一致的裝置和方法的例子。
需要說明的是:在其他實施例中並不一定按照本說明書示出和描述的順序來執行相應方法的步驟。在一些其他實施例中,其方法所包括的步驟可以比本說明書所描述的更多或更少。此外,本說明書中所描述的單個步驟,在其他實施例中可能被分解為多個步驟進行描述;而本說明書中所描述的多個步驟,在其他實施例中也可能被合併為單個步驟進行描述。
本說明書所述的用戶特徵值是指表徵用戶個體在某指定的業務領域方面的所體現出的能力或程度值,例如用戶信用值是用戶在金融相關業務領域所體現出的個人守信程度值。隨著社會各機構對針對用戶個體的信用特徵值(表現為各種信用積分、信用分數等)的參考及應用的範疇逐漸擴展,用戶個體在除信用以外的其他方面所體現出的個體特徵值也逐漸受到新型商業模式的青睞。例如,用以體現用戶身體健康狀態程度的健康特徵值,可被以用戶身體健康作為考量因素的業務機構所應用;用以體現用戶智力狀態的智商特徵值,可被以用戶智力高低作為考量因素的業務機構所應用;還有用以體現用戶情商或心理健康狀態的情商值、心理健康值等用戶特徵值。
上述用戶特徵值的獲取通常由一個或幾個評定機構進行用戶特徵值打分評定,其評定規則及評定過程通常均不公開,難以確保用戶特徵值的計算規則的合理性,更難以確保計算過程的公平公正性。
鑒於以上提出的技術現狀和問題,圖1是本說明書所提供的一實施例所示的基於區塊鏈的用戶特徵值獲取方法的流程示意圖,所述區塊鏈包括多個業務行為資料提供方節點設備。
本實施例所述的業務行為資料提供方用於提供用戶產生的業務行為資料,從而為計算用戶特徵值提供計算基礎。例如,當用戶特徵值為用戶信用值時,上述業務行為資料提供方可以包括提供用戶借貸還貸行為資料的銀行或金融機構、提供用戶繳費行為資料的業務繳費平台、提供用戶消費行為資料的消費平台等等,從而為用戶信用值提供計算所基於的業務行為基礎;當用戶特徵值為用戶健康積分時,上述業務行為資料提供方可以包括提供用戶就醫或體檢記錄的醫療健康機構、提供用戶參保的醫療健康相關保險業務行為資料的保險機構、或提供用戶理賠行為資料的理賠機構等,甚至還可包括可監測用戶健康行為參數如每日步數、跑步公里數的採集設備。
本實施例所述的區塊鏈,具體可指一個各節點透過共識機制達成的、具有分散式資料儲存結構的P2P網路系統,該區塊鏈內的資料分布在時間上相連的一個個“區塊(block)”之內,後一個區塊包含前一個區塊的資料摘要,且根據具體的共識機制(如POW、POS、DPOS或PBFT等)的不同,達成全部或部分節點的資料全備份。本領域的技術人員熟知,由於區塊鏈系統在相應共識機制下運行,已收錄至區塊鏈資料庫內的資料很難被任意的節點篡改,例如採用Pow共識的區塊鏈,至少需要全網51%算力的攻擊才有可能篡改已有資料,因此區塊鏈系統有著其他中心化資料庫系統所無法比擬地確保資料安全、防攻擊篡改的特性。由此可知,在本說明書所提供的實施例中,被收錄至區塊鏈的分散式資料庫中的資料不會被攻擊或篡改,從而確保了上述業務行為資料提供方提供的業務行為資料不會在提供至區塊鏈的分散式資料庫後遭到篡改,進而確保計算用戶特徵值的公正性。
本實施例所述的業務行為資料提供方節點設備,可透過遵循相應節點協定、運行節點協定程式的安裝來加入該區塊鏈,作為該區塊鏈的節點。本領域的技術人員通常將具有區塊鏈分散式資料庫的資料全備份的節點設備稱為全節點,將具有區塊鏈分散式資料庫的部分備份資料(如僅有區塊頭的資料)的節點設備稱為輕節點或客戶端等;在本實施例中所述的業務行為資料提供方節點設備可包括上述的全節點、輕節點或客戶端,只要直接或間接連入上述區塊鏈、且可發送或獲取區塊鏈的分散式資料庫的資料的任何設備均可稱為本實施例所述的節點設備。
如圖1所示,上述基於區塊鏈的用戶特徵值獲取方法應用於上述區塊鏈中的節點設備,包括:
步驟102,獲取業務行為資料提供方節點設備發送的目標交易,所述目標交易包括目標用戶產生的業務行為資料。
在本說明書中所描述的交易(transaction),是指各方用戶透過區塊鏈的節點設備端創建,並需要最終發布至區塊鏈的分散式資料庫中的一筆資料。其中,區塊鏈中的交易,存在狹義的交易以及廣義的交易之分。狹義的交易是指用戶向區塊鏈發布的一筆價值轉移;例如,在傳統的比特幣區塊鏈網路中,交易可以是用戶在區塊鏈中發起的一筆轉帳。而廣義的交易是指用戶向區塊鏈發布的一筆具有業務意圖的業務資料;例如,交易可以是用戶在區塊鏈中發布的一筆與價值轉移無關的、具有業務意圖的業務(比如,租房業務、車輛調度業務、保險理賠業務、信用服務、醫療服務等)訊息或者業務請求。本實施例所述的目標交易,是指包括目標用戶的業務行為資料的一筆業務資料,該筆業務資料可呼叫相應的智慧型合約以基於上述目標用戶的業務行為資料執行對目標用戶的特徵值的計算。
上述目標用戶的業務行為資料,和用以呼叫計算用戶特徵值的智慧型合約的呼叫資訊資料,可依據預設的交易格式而被封裝成目標交易,然後上傳至區塊鏈。
由於上述目標用戶的業務行為資料通常包括目標用戶的隱私資訊,如健康資訊、或財務資訊等,為防止目標用戶的隱私資訊發生意外的洩露或誤用,上述預設的交易格式中,可規定將上述目標交易所包含的目標用戶的業務行為資料進行加密處理,從而降低了在區塊鏈的分散式資料庫上備份的用戶業務行為資料的洩露隱患。
在又一示出的實施方式中,為確保上述目標用戶產生的業務行為資料是由相應的業務行為資料提供方所提供的,而非其他節點設備惡意偽造或仿冒,在上述預設的交易格式中,上述目標交易還包括所述業務行為資料提供方節點設備至少基於所述目標用戶產生的業務行為資料所作的電子簽章。基於對上述電子簽章的驗簽,即可驗證上述目標交易的發起方是否為合法的業務行為資料提供方節點設備。
上述實施例所述的將所述目標交易上傳到所述區塊鏈的分散式資料庫中的詳細過程,可依據所述區塊鏈的共識機制及交易規則而具體設定。在一示出的實施例中,將所述目標交易上傳到所述區塊鏈的分散式資料庫中,包括:
所述區塊鏈中具有記帳權限的節點設備將所述目標交易加入到候選區塊;
從所述具有記帳權限的節點設備中確定滿足所述區塊鏈共識機制的共識記帳節點設備;
所述共識記帳節點向所述區塊鏈的節點設備廣播所述候選區塊;
在所述候選區塊通過所述區塊鏈符合預設數量的節點設備的驗證認可後,所述候選區塊被視為最新區塊,加入到所述區塊鏈的分散式資料庫中。
在上述的實施例中,具有記帳權限的節點設備是指具有產生候選區塊權限的節點設備。根據所述區塊鏈的共識機制,可從所述候選區塊具有記帳權限的節點設備中確定共識記帳節點設備,上述共識機制可以包括工作量證明機制(PoW)、或權利證明機制(PoS)、或股份授權證明機制(DPoS)等。
PoS或DPoS共識機制與PoW類似,均屬於公有區塊鏈中確認共識記帳節點設備所常選用的共識演算法。在又一示出的實施例中,為降低交易或資料的確認時間、提高交易輸送量、滿足對安全和性能的需求,本說明書所提供的實施例還可選用聯盟鏈架構來建構該區塊鏈。上述業務行為資料提供方節點設備及業務相關的監督機構可作為該聯盟鏈的預選的節點設備,參與區塊的記帳。聯盟鏈的共識過程也由該預選的節點設備控制,當網路上有超過設定比例(如2/3)的節點設備確認一個區塊,該區塊記錄的交易或資料將得到全網確認。
聯盟鏈通常多採用權益證明或PBFT、RAFT等共識演算法。在實現時,在區塊鏈的每一輪共識開始之前,可以在區塊鏈中的各節點設備中選舉出一台主節點設備,即上述實施例所述的共識記帳節點(比如,每一輪共識都重新選舉出一主節點設備,其它節點設備作為從節點設備),由主節點設備進一步向發起交易的驗證和共識,並負責基於共識通過的交易資料(或目標資料)為區塊鏈創建最新的區塊。
PBFT演算法作為本說明書所提供的聯盟鏈的共識演算法的一種較佳的實施方式,是由於採用該種演算法共識的效率高,可滿足高頻交易量的需求,例如在本實施例中業務行為資料提供方節點設備基於頻繁受理或產生的不同用戶的業務行為資料而產生相應的目標交易;且共識的時延很低,基本達到即時處理的要求,能快速即時地在區塊鏈的新生區塊中收錄上述目標交易;而且,將聯盟鏈網路中可信節點作為預選的記帳節點,兼顧了安全性與穩定性;另外,採用PBFT演算法不會消耗過多的電腦算力資源,也不一定需要代幣流通,因此具有良好的可使用性。
步驟104,呼叫第一智慧型合約,執行所述第一智慧型合約聲明的對用戶特徵值的計算邏輯,基於所述目標用戶產生的業務行為資料計算獲得所述目標用戶的特徵值。
智慧型合約通常是經編譯後被部署在區塊鏈上的電腦可執行程式。智慧型合約在被部署上區塊鏈前需經過區塊鏈節點的共識驗證。在本實施例中,聲明有對所述用戶特徵值的計算邏輯的第一智慧型合約,經過區塊鏈節點的共識驗證方可被收錄至區塊鏈的分散式資料庫,由區塊鏈上的共識節點共同監督驗證上述用戶特徵值的計算獲取過程。
區塊鏈的節點設備在獲取上述目標交易後,呼叫目標交易所指向的第一智慧型合約(基於第一交易包含的智慧型合約地址及函數介面進行呼叫),區塊鏈中的節點設備可基於上述目標交易對該第一智慧型合約的呼叫,執行對用戶特徵值的計算,並產生呼叫執行的結果,即基於上述目標交易所包含的目標用戶的業務行為資料所計算出的目標用戶的特徵值。本領域的技術人員應知,當上述對第一智慧型合約呼叫及執行的結果(即上述目標用戶的特徵值)經過區塊鏈節點的共識驗證後,其執行的結果被收錄至區塊鏈的分散式資料庫中,以供存證。
本說明書並不限定上述第一智慧型合約所聲明的對用戶特徵值的具體的計算邏輯,既可以是在獲取了目標用戶的預設個數或種類的用戶業務行為資料(或目標交易)後,再執行對目標用戶的特徵值的計算;也可以是隨著業務行為資料提供方節點設備不斷地上傳目標交易,不斷地獲取到的符合預設格式的用戶業務行為資料(或目標交易),從而不斷地更新上述目標用戶的特徵值,即基於STORM的流式計算邏輯;還可以包括其他類型的計算邏輯。
本領域的技術人員可知,上述基於STORM的流式計算邏輯可以準確快速地處理資料資訊流,從而為用戶特徵值的計算提供了高效地解決方式。區塊鏈中任一節點設備可基於上述區塊鏈的共識機制所決定的新區塊產生頻率,同步新區塊而獲得上述目標交易。由以上實施例可知,基於聯盟鏈而架構的區塊鏈,通常具有高的交易處理輸送量和幾乎即時的資料上鏈時效,進一步提高了基於上述目標交易而計算用戶特徵值的效率。
在又一示出的實施方式中,當目標交易中所包括的目標用戶的業務行為資料被加密時,上述第一智慧型合約還應聲明有對所述業務行為資料的解密邏輯,用以解密所述被加密的業務行為資料,從而基於所述業務行為資料的明文計算所述目標用戶的特徵值。第一智慧型合約的部署方和相關的業務行為資料提供方可提前約定加密及解密方式,使得業務行為資料提供方節點設備在發送目標交易之前,即可根據約定的加密方式將上述目標用戶的業務行為資料加密。
透過區塊鏈的節點設備基於上述目標交易對第一智慧型合約的呼叫及執行,即可完成基於上述目標用戶的業務行為資料計算獲得上述目標用戶的特徵值。智慧型合約可在任何時候相應用戶的呼叫請求(無需在傳統模式中等候、預約用戶特徵值評定打分機構的工作時間),大大提升了用戶特徵值計算處理的效率。而且,由於智慧型合約的邏輯條款是經過區塊鏈節點的共識驗證、不可篡改的,其執行結果公正可視,避免了傳統模式中可能出現的用戶特徵值計算結果不公正、不準確等弊端,且無需中心化權威監督或仲裁理賠結果的公正性。進一步地,由目標交易對第一智慧型合約呼叫而自動執行對用戶特徵值的計算,大大減少了傳統模式下收集目標用戶的業務行為資料所需耗費的人力和時間成本,具有非常好的經濟性。
相應地,在利用如上述一個或多個實施例所述的獲得方法獲得到目標用戶的特徵值後,可基於區塊鏈的分散式資料庫上存證的用戶特徵值展開對該用戶特徵值的應用。
圖2示意了本說明書一實施例提供的基於區塊鏈的用戶特徵值應用方法的流程示意圖,應用於上述基於區塊鏈的用戶特徵值獲取方法實施例所述的區塊鏈系統中,該區塊鏈包括對上述用戶特徵值的應用方節點設備,用以獲取到上述用戶特徵值後執行對用戶特徵值的應用邏輯。
類似地,本實施例所述的應用方節點設備,可透過遵循相應節點協定、運行節點協定程式的安裝來加入該區塊鏈,作為該區塊鏈的節點。本領域的技術人員通常將具有區塊鏈分散式資料庫的資料全備份的節點設備稱為全節點,將具有區塊鏈分散式資料庫的部分備份資料(如僅有區塊頭的資料)的節點設備稱為輕節點或客戶端等;在本實施例中所述的應用方節點設備可包括上述的全節點、輕節點或客戶端,只要直接或間接連入上述區塊鏈、且可發送或獲取區塊鏈的分散式資料庫的資料的任何設備均可稱為本實施例所述的節點設備。
本領域的技術人員可知,基於具體的業務開展需求,應用方節點設備與上述業務行為資料提供方節點設備可以是相同的節點設備,也可以是不同的節點設備。
步驟202,所述應用方節點設備從所述區塊鏈的分散式資料庫上獲取所述第一智慧型合約計算所得的所述目標用戶的特徵值。
本領域的技術人員應知,上述第一智慧型合約經上述目標交易的呼叫後的執行結果——即目標用戶的特徵值,會經區塊鏈節點設備的共識驗證後被收錄於區塊鏈的分散式資料庫中。具體的收錄過程與上述目標交易被收錄於區塊鏈的分散式資料庫的過程類似,在對該目標用戶的特徵值的驗證步驟中包括該區塊鏈節點設備對該第一智慧型合約的呼叫執行,以驗證上述目標用戶的特徵值是否正確並達成共識,具體過程在此不再贅述。
步驟204,基於所述目標用戶的特徵值,執行對所述目標用戶的特徵值的應用處理邏輯。
在獲取到上述目標用戶的特徵值後,應用方節點設備可執行對該目標用戶的特徵值的應用處理邏輯。上述應用處理邏輯可以是部署於應用方節點設備自身的應用處理邏輯程式,也可以是部署在上述區塊鏈的又一智慧型合約——第二智慧型合約內的應用處理邏輯程式,在本說明書中不作限定。
值得注意的是,當上述應用處理邏輯時由上述第二智慧型合約所聲明的應用處理邏輯時,上述第一智慧型合約的邏輯碼中還應包括基於計算所得的用戶特徵值而呼叫上述第二智慧型合約的邏輯碼(如包括第二智慧型合約的介面和相關函數)。利用第一智慧型合約的執行結果聯動呼叫第二智慧型合約,充分利用了智慧型合約的優勢,更加增加了對用戶特徵值應用的處理效率和公平公正性。
如上所述可知,上述應用處理邏輯是基於多個業務行為資料提供方節點設備提供的用戶的業務行為資料而產生的用戶特徵值而開展的,有效避免了某些業務機構僅僅依靠自身記錄的業務行為資料而對用戶在該業務行為方面的表現作出評定偏差,有效避免了業務壁壘的產生。上述應用處理邏輯可以包括利用用戶信用特徵值審批貸款額度或貸款利率、或利用用戶信用特徵值決策具體業務押金額度、或利用用戶健康特徵值設計用戶投保保費額度或其他投保方案,等等,隨著用戶特徵值範疇的逐漸擴展,對用戶特徵值的應用的模式和內容也會越來越廣泛,在本說明書中不作限定。
以下,以表徵用戶的身體健康狀態的用戶健康積分為例,闡述本說明書提供的對用戶特徵值的獲取及應用方法。上述用戶特徵值可具體的表現為用戶健康積分或用戶健康信用值等等。
如圖3所示,本實施例所述的業務行為資料提供方節點設備包括:醫療健康服務方設備--如醫院或健康服務機構的設備終端,保險服務方設備--如保險服務平台或保險公司的設備終端,理賠服務方設備--如保險公司的設備終端,和用戶健康行為參數採集設備--如用以監測用戶步行或跑步行程或速度的可穿戴裝置設備中的一種或多種;所述對用戶特徵值的應用方節點設備可包括保險服務方設備--如保險公司的設備終端。
相應地,上述各業務行為資料提供方節點設備可提供的業務行為資料可以包括:目標用戶的就醫或健康諮詢記錄、身體檢查報告,目標用戶所投保的保單記錄,目標用戶的保險理賠記錄,目標用戶的每日運動資料等。上述各業務行為資料提供方節點設備將目標用戶在本機構產生的業務行為資料發送至區塊鏈上進行存證且呼叫部署在上述區塊鏈上的健康服務智慧型合約,以執行所述健康服務智慧型合約聲明的對用戶健康積分的計算邏輯。
具體地,上述各個業務行為資料提供方節點設備可與上述健康服務智慧型合約的部署方預先約定上述健康服務智慧型合約處理的業務行為資料的資料內容格式及執行的API函數,以方便對智慧型合約的呼叫。
上述健康服務智慧型合約可被上述各個業務行為資料提供方節點設備發送的目標交易呼叫執行,且經過符合該區塊鏈的共識機制的共識和符合該區塊鏈對智慧型合約執行結果的驗證規則的驗證後,上述目標用戶的健康積分即可被備份於該區塊鏈的分散式資料庫中。
由於目標用戶的業務行為資料可以連續地或間或性的產生,例如目標用戶可以間或性產生就醫記錄、理賠記錄,也可以週期性的產生每日運動資訊,因此上述健康服務智慧型合約中所部署的對用戶健康積分的計算邏輯可以被部署為基於STROM的流式計算邏輯,從而可快捷地處理流式的業務行為資料,並在區塊鏈的分散式資料庫中不斷地產生目標用戶的新的健康積分。
本實施例所述的對用戶特徵值的應用方節點設備可包括保險服務方設備--如保險公司的設備終端;應用方節點設備所執行的對用戶特徵值的應用處理邏輯可包括對目標用戶的健康積分的獲取查詢,或基於目標用戶的健康積分進行目標用戶的保險方案的制定(包括保險保費的定制化)、等等。
目前保險行業各個公司維護自己的保單,導致客戶的保單在每家保險公司形成資訊孤島,保險公司在評估客戶風險以及健康情況時,存在很大的保障風險。本說明書提供的技術方案,透過利用區塊鏈的可信性、不可篡改性、公開性可以極大的解決了保險公司之間的資訊壁壘問題,透過計算用戶的健康積分為保險行業提供一個客戶的保障健康徵信體系,在保障客戶隱私的前提下實現保障資訊的公開透明。
與上述流程實現對應,本說明書的實施例還提供了基於區塊鏈的用戶特徵值獲得裝置40和基於區塊鏈的用戶特徵值應用裝置50。該裝置40或50可以透過軟體來實現,也可以透過硬體或者軟硬體結合的方式來實現。以軟體實現為例,作為邏輯意義上的裝置,是透過所在設備的CPU (Central Process Unit,中央處理器)將對應的電腦程式指令讀取到隨機存取記憶體中運行形成的。從硬體層面而言,除了圖6所示的CPU、隨機存取記憶體以及記憶體之外,網路風險業務的實現裝置所在的設備通常還包括用於進行無線信號收發的晶片等其他硬體,和/或用於實現網路通訊功能的板卡等其他硬體。
圖4所示為一種基於區塊鏈的用戶特徵值獲得裝置40,所述區塊鏈包括多個業務行為資料提供方節點設備,所述裝置40包括:
獲取單元402,用於獲取業務行為資料提供方節點設備發送的目標交易,所述目標交易包括目標用戶產生的業務行為資料;
執行單元404,用於呼叫第一智慧型合約,執行所述第一智慧型合約聲明的對用戶特徵值的計算邏輯,基於所述目標用戶產生的業務行為資料計算獲得所述目標用戶的特徵值。
在又一示出的實施方式中,所述第一智慧型合約聲明的對用戶特徵值的計算邏輯是基於STORM的流式計算邏輯。
在又一示出的實施方式中,所述目標交易中包括的目標用戶產生的業務行為資料被加密;
所述第一智慧型合約還聲明有對所述業務行為資料的解密邏輯,用以解密所述被加密的業務行為資料,從而基於所述業務行為資料計算所述目標用戶的特徵值。
在又一示出的實施方式中,所述目標交易還包括所述業務行為資料提供方節點設備至少基於所述目標用戶產生的業務行為資料所作的電子簽章。
在又一示出的實施方式中,所述用戶特徵值為用戶健康積分,用以表徵用戶的身體健康狀態;所述業務行為資料提供方節點設備包括:醫療健康服務方設備、或保險服務方設備、或理賠服務方設備、或用戶健康行為參數採集設備中的一種或多種。
在又一示出的實施方式中,所述區塊鏈為聯盟鏈。
圖5所示為一種基於區塊鏈的用戶特徵值應用裝置50,應用於如請求項1所述的區塊鏈所包括的應用方節點設備,所述裝置50包括:
獲取單元502,用於從所述區塊鏈的分散式資料庫上獲取所述第一智慧型合約計算所得的所述目標用戶的特徵值;
執行單元504,用於基於所述目標用戶的特徵值,執行對所述目標用戶的特徵值的應用處理邏輯。
在又一示出的實施方式中,所述執行單元進一步用於:
呼叫用於應用處理所述用戶特徵值的第二智慧型合約,執行所述第二智慧型合約聲明的對所述目標用戶的特徵值的應用處理邏輯。
在又一示出的實施方式中,所述用戶特徵值為用戶健康積分,用以表徵用戶的身體健康狀態;所述業務行為資料提供方節點設備包括:醫療健康服務方設備、或保險服務方設備、或理賠服務方設備、或用戶健康行為參數採集設備中的一種或多種;所述對用戶特徵值的應用方節點設備包括保險服務方設備;
所述執行單元進一步用於:基於所述目標用戶的用戶健康積分,執行針對所述目標用戶的保險方案制定。
上述裝置40及50中各個單元的功能和作用的實現過程具體詳見上述方法中對應步驟的實現過程,相關之處參見方法實施例的部分說明即可,在此不再贅述。
以上所描述的裝置實施例僅僅是示意性的,其中所述作為分離部件說明的單元可以是或者也可以不是物理上分開的,作為單元顯示的部件可以是或者也可以不是物理模組,即可以位於一個地方,或者也可以分布到多個網路模組上。可以根據實際的需要選擇其中的部分或者全部單元或模組來實現本說明書方案的目的。本領域普通技術人員在不付出創造性勞動的情況下,即可以理解並實施。
上述實施例闡明的裝置、單元、模組,具體可以由電腦晶片或實體實現,或者由具有某種功能的產品來實現。一種典型的實現設備為電腦,電腦的具體形式可以是個人電腦、膝上型電腦、蜂巢式電話、相機電話、智慧型電話、個人數位助理、媒體播放機、導航設備、電子郵件收發設備、遊戲控制台、平板電腦、可穿戴設備或者這些設備中的任意幾種設備的組合。
與上述方法實施例相對應,本說明書的實施例還提供了一種電腦設備,如圖6所示,該電腦設備包括記憶體和處理器。其中,記憶體上儲存有能夠由處理器運行的電腦程式;處理器在運行儲存的電腦程式時,執行本說明書實施例中基於區塊鏈的用戶特徵值獲得方法的各個步驟。對基於區塊鏈的用戶特徵值獲得方法的各個步驟的詳細描述請參見之前的內容,不再重複。
與上述方法實施例相對應,本說明書的實施例還提供了一種電腦設備,如圖6所示,該電腦設備包括記憶體和處理器。其中,記憶體上儲存有能夠由處理器運行的電腦程式;處理器在運行儲存的電腦程式時,執行本說明書實施例中基於區塊鏈的用戶特徵值應用方法的各個步驟。對基於區塊鏈的用戶特徵值應用方法的各個步驟的詳細描述請參見之前的內容,不再重複。
以上所述僅為本說明書的較佳實施例而已,並不用來限制本說明書,凡在本說明書的精神和原則之內,所做的任何修改、等同替換、改進等,均應包含在本說明書保護的範圍之內。
在一個典型的配置中,計算設備包括一個或多個處理器(CPU)、輸入/輸出介面、網路介面和記憶體。
記憶體可能包括電腦可讀媒體中的非永久性記憶體,隨機存取記憶體(RAM)和/或非易失性記憶體等形式,如唯讀記憶體(ROM)或快閃記憶體(flash RAM)。記憶體是電腦可讀媒體的示例。
電腦可讀媒體包括永久性和非永久性、可移動和非可移動式媒體可以由任何方法或技術來實現資訊儲存。資訊可以是電腦可讀指令、資料結構、程式的模組或其他資料。
電腦的儲存媒體的例子包括,但不限於相變記憶體(PRAM)、靜態隨機存取記憶體(SRAM)、動態隨機存取記憶體(DRAM)、其他類型的隨機存取記憶體(RAM)、唯讀記憶體(ROM)、電可擦除可編程唯讀記憶體(EEPROM)、快閃記憶體或其他記憶體技術、唯讀光碟唯讀記憶體(CD-ROM)、數位多功能光碟(DVD)或其他光學儲存器、磁盒式磁帶,磁帶磁磁碟儲存器或其他磁性儲存設備或任何其他非傳輸媒體,可用於儲存可以被計算設備存取的資訊。按照本文中的界定,電腦可讀媒體不包括暫態性電腦可讀媒體(transitory media),如調變的資料信號和載波。
還需要說明的是,術語“包括”、“包含”或者其任何其他變體意在涵蓋非排他性的包含,從而使得包括一系列要素的過程、方法、商品或者設備不僅包括那些要素,而且還包括沒有明確列出的其他要素,或者是還包括為這種過程、方法、商品或者設備所固有的要素。在沒有更多限制的情況下,由語句“包括一個……”限定的要素,並不排除在包括所述要素的過程、方法、商品或者設備中還存在另外的相同要素。
本領域技術人員應明白,本說明書的實施例可提供為方法、系統或電腦程式產品。因此,本說明書的實施例可採用完全硬體實施例、完全軟體實施例或結合軟體和硬體態樣的實施例的形式。而且,本說明書的實施例可採用在一個或多個其中包含有電腦可用程式碼的電腦可用儲存媒體(包括但不限於磁碟記憶體、CD-ROM、光學記憶體等)上實施的電腦程式產品的形式。The exemplary embodiments will be described in detail here, and examples thereof are shown in the drawings. When the following description refers to the drawings, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements. The implementation manners described in the following exemplary embodiments do not represent all implementation manners consistent with one or more embodiments of this specification. On the contrary, they are only examples of devices and methods consistent with some aspects of one or more embodiments of this specification as detailed in the scope of the appended application.
It should be noted that in other embodiments, the steps of the corresponding method may not be executed in the order shown and described in this specification. In some other embodiments, the method includes more or fewer steps than described in this specification. In addition, a single step described in this specification may be decomposed into multiple steps for description in other embodiments; and multiple steps described in this specification may also be combined into a single step in other embodiments. description.
The user characteristic value described in this specification refers to the ability or degree value of an individual user in a specified business field. For example, the user credit value is the personal trustworthiness value of the user in a financial-related business field. With the gradual expansion of the reference and application scope of individual credit characteristic values (in the form of various credit scores, credit scores, etc.) by various institutions in society, the individual characteristic values of individual users in aspects other than credit have also Gradually favored by new business models. For example, the health feature value used to reflect the user's physical health status can be used by a business organization that takes the user's physical health as a consideration factor; the IQ feature value used to reflect the user's intelligence status can be used as the consideration factor Used by business organizations; there are also user characteristic values such as emotional quotient value and mental health value that reflect the user’s emotional quotient or mental health status.
The acquisition of the above-mentioned user characteristic values is usually performed by one or several evaluation agencies to score and evaluate the user characteristic values. The evaluation rules and evaluation process are usually not public. It is difficult to ensure the rationality of the calculation rules of user characteristic values, and it is even more difficult to ensure the calculation process. Fairness and justice.
In view of the technical status and problems raised above, FIG. 1 is a schematic flow diagram of a method for obtaining user characteristic values based on a blockchain according to an embodiment provided in this specification. The blockchain includes multiple business behavior data providers Node device.
The business behavior data provider described in this embodiment is used to provide business behavior data generated by users, so as to provide a calculation basis for calculating user characteristic values. For example, when the user characteristic value is the user’s credit value, the above-mentioned business behavior data providers may include banks or financial institutions that provide user loan repayment behavior data, business payment platforms that provide user payment behavior data, and consumption behavior data that provide user consumption behavior data. Platforms, etc., to provide the basis of business behavior for the user’s credit value calculation; when the user’s characteristic value is the user’s health points, the above-mentioned business behavior data providers may include medical and health institutions that provide the user’s medical or physical examination records, and provide user participation Insurance institutions that provide information on medical and health-related insurance business behaviors, or claims agencies that provide user claims behavior data, may even include collection devices that can monitor user health behavior parameters such as daily steps and kilometers run.
The blockchain described in this embodiment can specifically refer to a P2P network system with a distributed data storage structure that is reached by each node through a consensus mechanism. The data in the blockchain is distributed in time and connected one by one. Within "block", the next block contains the data summary of the previous block, and according to the specific consensus mechanism (such as POW, POS, DPOS or PBFT, etc.), the data of all or part of the nodes are complete Backup. Those skilled in the art are well aware that because the blockchain system operates under the corresponding consensus mechanism, it is difficult for the data included in the blockchain database to be tampered with by any node. For example, a blockchain using Pow consensus requires at least full It is possible to tamper with existing data with 51% of the network’s computing power. Therefore, the blockchain system has the characteristics of ensuring data security and preventing attack and tampering that other centralized database systems cannot match. It can be seen that in the embodiments provided in this specification, the data included in the distributed database of the blockchain will not be attacked or tampered with, thus ensuring that the business behavior data provided by the above-mentioned business behavior data provider is not It will be tampered with after being provided to the distributed database of the blockchain, thereby ensuring the fairness of calculating user characteristic values.
The business behavior data provider node device described in this embodiment can join the blockchain by following the corresponding node agreement and running the installation of the node agreement program as a node of the blockchain. Those skilled in the art usually refer to a node device with full backup of the data of the blockchain distributed database as a full node, and will have partial backup data of the blockchain distributed database (such as data with only the block header) The node device is called a light node or a client; in this embodiment, the business behavior data provider node device may include the above-mentioned full node, light node or client, as long as it is directly or indirectly connected to the above-mentioned blockchain, And any device that can send or obtain data in the distributed database of the blockchain can be referred to as the node device described in this embodiment.
As shown in Figure 1, the above block chain-based user characteristic value acquisition method is applied to the node device in the block chain, including:
Step 102: Obtain a target transaction sent by a business behavior data provider node device, where the target transaction includes business behavior data generated by a target user.
The transaction described in this manual refers to a piece of data created by all users through the node device side of the blockchain and need to be finally released to the distributed database of the blockchain. Among them, transactions in the blockchain are divided into narrow transactions and broad transactions. A narrowly defined transaction refers to a transfer of value issued by a user to the blockchain; for example, in a traditional Bitcoin blockchain network, a transaction can be a transfer initiated by the user in the blockchain. In a broad sense, a transaction refers to a piece of business data with business intentions released by a user to the blockchain; for example, a transaction can be a piece of business with business intentions that is not related to value transfer and is released by a user on the blockchain (for example, renting a house). Business, vehicle dispatch business, insurance claims business, credit service, medical service, etc.) message or business request. The target transaction described in this embodiment refers to a piece of business data that includes the business behavior data of the target user. The business data can call the corresponding smart contract to execute the characteristic value of the target user based on the business behavior data of the target user. Calculation.
The business behavior data of the target user and the call information data used to call the smart contract for calculating the user characteristic value can be packaged into a target transaction according to a preset transaction format, and then uploaded to the blockchain.
Since the above-mentioned target user’s business behavior data usually includes the target user’s private information, such as health information, or financial information, etc., in order to prevent accidental disclosure or misuse of the target user’s private information, the above-mentioned preset transaction format may require The business behavior data of the target users contained in the above-mentioned target exchange is encrypted, thereby reducing the potential leakage of the user business behavior data backed up on the distributed database of the blockchain.
In another embodiment shown, in order to ensure that the business behavior data generated by the target user is provided by the corresponding business behavior data provider, and not maliciously forged or counterfeited by other node devices, the preset transaction format Wherein, the above-mentioned target transaction further includes an electronic signature made by the business behavior data provider node device based at least on the business behavior data generated by the target user. Based on the verification of the above electronic signature, it can be verified whether the initiator of the above target transaction is a legitimate business behavior data provider node device.
The detailed process of uploading the target transaction to the distributed database of the blockchain described in the above embodiment can be specifically set according to the consensus mechanism and transaction rules of the blockchain. In an illustrated embodiment, uploading the target transaction to the distributed database of the blockchain includes:
Adding the target transaction to the candidate block by a node device with accounting authority in the blockchain;
Determine a consensus accounting node device that satisfies the blockchain consensus mechanism from the node devices with accounting authority;
The consensus accounting node broadcasts the candidate block to the node device of the blockchain;
After the candidate block is verified and approved by the blockchain in accordance with the preset number of node devices, the candidate block is regarded as the latest block and added to the distributed database of the blockchain.
In the foregoing embodiment, the node device with the accounting authority refers to the node device with the authority to generate candidate blocks. According to the consensus mechanism of the blockchain, the consensus accounting node device can be determined from the node devices with accounting authority in the candidate block. The above-mentioned consensus mechanism may include a proof of work mechanism (PoW) or a proof of right mechanism (PoS) , Or Share Authorization Proof Mechanism (DPoS), etc.
The PoS or DPoS consensus mechanism is similar to PoW, and both belong to the consensus algorithm commonly used by the public blockchain to confirm the consensus accounting node equipment. In another illustrated embodiment, in order to reduce the confirmation time of transactions or data, increase transaction throughput, and meet the requirements for security and performance, the embodiments provided in this specification can also use the alliance chain architecture to construct the block chain. The above-mentioned business behavior data provider node equipment and business-related supervision agencies can be used as the pre-selected node equipment of the alliance chain to participate in block accounting. The consensus process of the alliance chain is also controlled by the pre-selected node device. When there are more than a set ratio (such as 2/3) of node devices on the network to confirm a block, the transaction or data recorded in the block will be confirmed by the entire network.
Consortium chains usually use proof of rights or consensus algorithms such as PBFT and RAFT. In implementation, before each round of consensus in the blockchain starts, a master node device can be elected from each node device in the blockchain, that is, the consensus accounting node described in the above embodiment (for example, each round of consensus A master node device is re-elected, and other node devices are used as slave node devices. The master node device further initiates transaction verification and consensus, and is responsible for creating the latest blockchain based on the transaction data (or target data) passed by the consensus. Block.
The PBFT algorithm, as a preferred implementation of the consensus algorithm of the alliance chain provided in this specification, is due to the high efficiency of the consensus algorithm adopted and can meet the needs of high-frequency trading volume. For example, in this embodiment The business behavior data provider node device generates corresponding target transactions based on frequently accepted or generated business behavior data of different users; and the consensus delay is very low, which basically meets the requirements of real-time processing, and can be quickly and instantly on the blockchain. The above-mentioned target transaction is included in the new block; moreover, the trusted node in the alliance chain network is used as the pre-selected accounting node, which takes into account security and stability; in addition, the PBFT algorithm will not consume too much computer computing resources. It does not necessarily require token circulation, so it has good usability.
Step 104: Call the first smart contract, execute the calculation logic of the user characteristic value declared by the first smart contract, and calculate the characteristic value of the target user based on the business behavior data generated by the target user.
Smart contracts are usually computer executable programs that are compiled and deployed on the blockchain. Before being deployed on the blockchain, smart contracts need to pass the consensus verification of the blockchain nodes. In this embodiment, it is stated that the first smart contract that has the calculation logic for the user characteristic value can be included in the distributed database of the blockchain after the consensus verification of the blockchain node. The consensus nodes on the above jointly supervise and verify the calculation and acquisition process of the above-mentioned user characteristic values.
After obtaining the above-mentioned target transaction, the node device of the blockchain calls the first smart contract pointed to by the target exchange (based on the smart contract address and function interface included in the first transaction), the node device in the blockchain can Based on the call to the first smart contract by the target transaction, the calculation of the user characteristic value is performed, and the result of the call execution is generated, that is, the target user’s business behavior data calculated based on the target user’s business behavior data included in the target transaction Eigenvalues. Those skilled in the art should know that when the result of the above call and execution of the first smart contract (that is, the characteristic value of the target user) is verified by the consensus of the blockchain nodes, the execution result is included in the blockchain In the distributed database for evidence.
This manual does not limit the specific calculation logic of the user characteristic value stated in the first smart contract. It can be after obtaining the preset number or type of user business behavior data (or target transaction) of the target user , And then perform the calculation of the characteristic value of the target user; it can also be that as the business behavior data provider node device continuously uploads the target transaction, the user business behavior data (or target transaction) that meets the preset format is continuously obtained, In this way, the feature value of the target user mentioned above is constantly updated, that is, the STORM-based streaming calculation logic; it may also include other types of calculation logic.
Those skilled in the art can know that the above-mentioned STORM-based streaming calculation logic can accurately and quickly process the data information flow, thereby providing an efficient solution for the calculation of user characteristic values. Any node device in the blockchain can synchronize the new block to obtain the above-mentioned target transaction based on the new block generation frequency determined by the consensus mechanism of the above-mentioned blockchain. It can be seen from the above embodiments that the blockchain based on the alliance chain usually has a high transaction processing throughput and almost instant data on-chain timeliness, which further improves the efficiency of calculating user characteristic values based on the aforementioned target transactions.
In another illustrated embodiment, when the target user’s business behavior data included in the target transaction is encrypted, the first smart contract should also declare that there is a decryption logic for the business behavior data for decryption The encrypted business behavior data is used to calculate the characteristic value of the target user based on the plain text of the business behavior data. The deployer of the first smart contract and the related business activity data provider can agree on encryption and decryption methods in advance, so that the business activity data provider’s node device can send the target user’s data according to the agreed encryption method before sending the target transaction. Business behavior data encryption.
By calling and executing the first smart contract based on the target transaction by the node device of the blockchain, the characteristic value of the target user can be calculated based on the business behavior data of the target user. The smart contract can respond to the user's call request at any time (no need to wait in the traditional mode and reserve the working time of the user characteristic value evaluation and scoring agency), which greatly improves the efficiency of user characteristic value calculation and processing. Moreover, because the logical terms of the smart contract are verified by the consensus of the blockchain nodes and cannot be tampered with, the execution results are fair and visible, which avoids the unfair and inaccurate calculation results of user characteristic values that may appear in the traditional model. And there is no need for centralized authority oversight or arbitration for the fairness of claims results. Further, the calculation of user characteristic values is automatically performed by the target transaction calling the first smart contract, which greatly reduces the labor and time costs required to collect the target user’s business behavior data in the traditional mode, and has a very good economy. Sex.
Correspondingly, after obtaining the characteristic value of the target user by using the obtaining method as described in one or more of the above embodiments, the characteristic value of the user can be expanded based on the characteristic value of the user stored in the distributed database of the blockchain Applications.
Figure 2 illustrates a schematic flow chart of a blockchain-based user characteristic value application method provided by an embodiment of this specification, which is applied to the blockchain system described in the above-mentioned blockchain-based user characteristic value acquisition method embodiment. The blockchain includes an application side node device for the user characteristic value, which is used to obtain the user characteristic value and execute the application logic for the user characteristic value.
Similarly, the application-side node device described in this embodiment can join the blockchain by following the corresponding node agreement and running the installation of the node agreement program as a node of the blockchain. Those skilled in the art usually refer to a node device with full backup of the data of the blockchain distributed database as a full node, and will have partial backup data of the blockchain distributed database (such as data with only the block header) The node device is called a light node or client, etc.; in this embodiment, the application side node device may include the above-mentioned full node, light node or client, as long as it is directly or indirectly connected to the above-mentioned blockchain and can send Or any device that obtains data from the distributed database of the blockchain can be referred to as the node device described in this embodiment.
Those skilled in the art can know that, based on specific business development requirements, the application-side node device and the aforementioned service behavior data provider node device may be the same node device or different node devices.
Step 202: The application side node device obtains the characteristic value of the target user calculated by the first smart contract from the distributed database of the blockchain.
Those skilled in the art should know that the execution result of the first smart contract after the call of the target transaction, that is, the characteristic value of the target user, will be included in the blockchain after being verified by the consensus of the blockchain node device. In the distributed database. The specific inclusion process is similar to the above process that the target transaction is included in the distributed database of the blockchain. The verification step of the target user’s characteristic value includes the blockchain node device’s verification of the first smart contract. Call execution to verify whether the characteristic value of the target user is correct and reach a consensus. The specific process is not repeated here.
Step 204, based on the characteristic value of the target user, execute application processing logic for the characteristic value of the target user.
After acquiring the feature value of the target user, the application node device can execute application processing logic for the feature value of the target user. The above application processing logic can be an application processing logic program deployed on the application node device itself, or it can be another smart contract deployed on the above blockchain-the application processing logic program in the second smart contract. There is no limitation in the manual.
It is worth noting that when the application processing logic is the application processing logic declared by the second smart contract, the logic code of the first smart contract should also include the call to the first smart contract based on the calculated user characteristic value. Second, the logical code of the smart contract (for example, including the interface and related functions of the second smart contract). Using the execution result of the first smart contract to link the second smart contract to make full use of the advantages of the smart contract, and to increase the processing efficiency and fairness of the application of user characteristic values.
As mentioned above, the above application processing logic is developed based on the user characteristic values generated by the user's business behavior data provided by multiple business behavior data provider node devices, which effectively avoids some business organizations relying solely on their own business records. Behavioral data is used to assess the user’s performance in the business behavior, effectively avoiding business barriers. The above application processing logic may include using user credit feature values to approve loan limits or loan interest rates, or using user credit feature values to determine specific business deposit limits, or using user health feature values to design user insurance premium limits or other insurance plans, etc. With the gradual expansion of the user characteristic value category, the application mode and content of the user characteristic value will become more and more extensive, which is not limited in this specification.
In the following, taking the user health points that characterize the user's physical health status as an example, the method for obtaining and applying user characteristic values provided in this specification is described. The above-mentioned user characteristic value can be specifically expressed as user health points or user health credit values and so on.
As shown in Figure 3, the business behavior data provider node equipment described in this embodiment includes: medical and health service provider equipment-such as equipment terminals of hospitals or health service institutions, and insurance service provider equipment-such as insurance service platforms or insurance The company’s equipment terminals, claims service provider equipment-such as insurance company equipment terminals, and user health behavior parameter collection equipment-such as one or more of the wearable devices used to monitor the user's walking or running journey or speed; The application side node equipment of the user characteristic value may include insurance service side equipment-such as equipment terminals of insurance companies.
Correspondingly, the business behavior data that can be provided by the above-mentioned business behavior data provider node devices may include: the target user’s medical or health consultation records, physical examination reports, the target user’s insurance policy record, the target user’s insurance claim record, and the target user’s User’s daily exercise data, etc. The above-mentioned business behavior data provider node devices send the target user’s business behavior data generated by the institution to the blockchain for storage and call the health service smart contract deployed on the above-mentioned blockchain to execute the health The calculation logic of user health points stated in the service smart contract.
Specifically, each of the aforementioned business behavior data provider node devices can pre-appoint the data content format and executed API functions of the business behavior data processed by the aforementioned health service smart contract with the deployer of the aforementioned health service smart contract, so as to facilitate the smart Type contract.
The above-mentioned health service smart contract can be executed by the target transaction call sent by the node device of the above-mentioned various business behavior data providers, and it has passed the consensus of the consensus mechanism of the blockchain and the verification of the execution result of the smart contract by the blockchain After the rules are verified, the health points of the target users mentioned above can be backed up in the distributed database of the blockchain.
Since the target user’s business behavior data can be generated continuously or occasionally, for example, the target user can occasionally generate medical treatment records, claims records, and can also periodically generate daily exercise information. Therefore, the above-mentioned health service smart contract The deployed calculation logic for user health points can be deployed as STROM-based streaming calculation logic, which can quickly process streaming business behavior data and continuously generate target users in the distributed database of the blockchain New health points.
The application-side node device for user characteristic values described in this embodiment may include insurance service-side equipment-such as equipment terminals of insurance companies; the application-side node device for application processing logic of user characteristic values executed by the application-side node device may include target users Inquiries about the acquisition of health points, or the formulation of the target user’s insurance plan (including the customization of insurance premiums) based on the target user’s health points, etc.
At present, various companies in the insurance industry maintain their own insurance policies, leading to the formation of information islands for customers’ insurance policies in each insurance company. When insurance companies assess customer risks and health conditions, there is a great protection risk. The technical solutions provided in this manual can greatly solve the problem of information barriers between insurance companies by using the credibility, immutability, and openness of the blockchain, and provide the insurance industry with a customer’s information by calculating the user’s health points. Guarantee the health credit information system, and realize the openness and transparency of guarantee information under the premise of protecting customer privacy.
Corresponding to the implementation of the above process, the embodiment of the present specification also provides a block chain-based user characteristic value obtaining device 40 and a block chain-based user characteristic value application device 50. The device 40 or 50 can be implemented through software, or through hardware or a combination of software and hardware. Take software implementation as an example. As a logical device, it is formed by reading the corresponding computer program instructions into the random access memory through the CPU (Central Process Unit) of the device where it is located. From the perspective of hardware, in addition to the CPU, random access memory, and memory shown in Figure 6, the equipment where the network risk business is implemented usually includes chips for wireless signal transmission and reception, and other hardware. Hardware, and/or other hardware such as boards used to implement network communication functions.
Fig. 4 shows a block chain-based user characteristic value obtaining device 40. The block chain includes multiple business behavior data provider node devices. The device 40 includes:
The obtaining unit 402 is configured to obtain a target transaction sent by a business behavior data provider node device, where the target transaction includes business behavior data generated by a target user;
The execution unit 404 is configured to call the first smart contract, execute the calculation logic of the user characteristic value declared by the first smart contract, and calculate the characteristic value of the target user based on the business behavior data generated by the target user .
In another illustrated embodiment, the calculation logic for the user characteristic value declared by the first smart contract is a streaming calculation logic based on STORM.
In another embodiment shown, the business behavior data generated by the target user included in the target transaction is encrypted;
The first smart contract also declares that there is a decryption logic for the business behavior data to decrypt the encrypted business behavior data, thereby calculating the characteristic value of the target user based on the business behavior data.
In another illustrated embodiment, the target transaction further includes an electronic signature made by the business behavior data provider node device based at least on the business behavior data generated by the target user.
In another embodiment shown, the user characteristic value is the user's health score, which is used to characterize the user's physical health status; the business behavior data provider node device includes: a medical health service provider device or an insurance service provider One or more of equipment, or claims service provider equipment, or user health behavior parameter collection equipment.
In another illustrated embodiment, the blockchain is a consortium chain.
FIG. 5 shows a block chain-based user characteristic value application device 50, which is applied to the application side node equipment included in the block chain as described in claim 1, and the device 50 includes:
The obtaining unit 502 is configured to obtain the characteristic value of the target user calculated by the first smart contract from the distributed database of the blockchain;
The execution unit 504 is configured to execute application processing logic on the characteristic value of the target user based on the characteristic value of the target user.
In another embodiment shown, the execution unit is further configured to:
Call a second smart contract for processing the characteristic value of the user, and execute the application processing logic of the characteristic value of the target user declared by the second smart contract.
In another embodiment shown, the user characteristic value is the user's health score, which is used to characterize the user's physical health status; the business behavior data provider node device includes: a medical health service provider device or an insurance service provider One or more of equipment, or claims service provider equipment, or user health behavior parameter collection equipment; said application side node equipment for user characteristic values includes insurance service provider equipment;
The execution unit is further configured to execute the formulation of an insurance plan for the target user based on the user health points of the target user.
For the implementation process of the functions and roles of each unit in the foregoing devices 40 and 50, please refer to the implementation process of the corresponding steps in the foregoing method.
The device embodiments described above are merely illustrative. The units described as separate components may or may not be physically separate, and the components displayed as units may or may not be physical modules, that is, Located in one place, or it can be distributed to multiple network modules. Some or all of the units or modules can be selected according to actual needs to achieve the purpose of the solution in this specification. Those of ordinary skill in the art can understand and implement it without creative work.
The devices, units, and modules described in the above embodiments may be implemented by computer chips or entities, or implemented by products with certain functions. A typical implementation device is a computer. The specific form of the computer can be a personal computer, a laptop computer, a cellular phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email receiving and sending device, and a game. A console, a tablet, a wearable device, or a combination of any of these devices.
Corresponding to the foregoing method embodiment, the embodiment of this specification also provides a computer device. As shown in FIG. 6, the computer device includes a memory and a processor. Wherein, the memory stores a computer program that can be run by the processor; when the processor runs the stored computer program, each step of the method for obtaining user characteristic values based on the blockchain in the embodiment of this specification is executed. Please refer to the previous content for a detailed description of each step of the method for obtaining user characteristic values based on the blockchain, and will not be repeated.
Corresponding to the foregoing method embodiment, the embodiment of this specification also provides a computer device. As shown in FIG. 6, the computer device includes a memory and a processor. Among them, the memory stores a computer program that can be run by the processor; when the processor runs the stored computer program, each step of the blockchain-based user characteristic value application method in the embodiment of this specification is executed. Please refer to the previous content for a detailed description of each step of the blockchain-based user characteristic value application method, and will not be repeated.
The above descriptions are only the preferred embodiments of this specification and are not used to limit this specification. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of this specification shall be included in this specification. Within the scope of protection.
In a typical configuration, the computing device includes one or more processors (CPU), input/output interfaces, network interfaces, and memory.
Memory may include non-permanent memory in computer-readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory ( flash RAM). Memory is an example of computer-readable media.
Computer-readable media includes permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology. Information can be computer-readable instructions, data structures, program modules, or other data.
Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), and other types of random access memory (RAM) , Read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital multi-function disc (DVD) or other optical storage, magnetic cassettes, magnetic tape storage or other magnetic storage devices or any other non-transmission media that can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transient computer-readable media (transitory media), such as modulated data signals and carrier waves.
It should also be noted that the terms "including", "including" or any other variants thereof are intended to cover non-exclusive inclusion, so that a process, method, commodity or equipment including a series of elements not only includes those elements, but also includes Other elements that are not explicitly listed, or also include elements inherent to such processes, methods, commodities, or equipment. If there are no more restrictions, the element defined by the sentence "including a..." does not exclude the existence of other identical elements in the process, method, commodity, or equipment that includes the element.
Those skilled in the art should understand that the embodiments of this specification can be provided as methods, systems or computer program products. Therefore, the embodiments in this specification may adopt the form of a completely hardware embodiment, a completely software embodiment, or an embodiment combining software and hardware aspects. Moreover, the embodiments of the present specification may adopt computer programs implemented on one or more computer-usable storage media (including but not limited to disk memory, CD-ROM, optical memory, etc.) containing computer-usable program codes. The form of the product.