WO2021027505A1 - Procédé de traitement de données basé sur un contrat intelligent et dispositif associé - Google Patents

Procédé de traitement de données basé sur un contrat intelligent et dispositif associé Download PDF

Info

Publication number
WO2021027505A1
WO2021027505A1 PCT/CN2020/103258 CN2020103258W WO2021027505A1 WO 2021027505 A1 WO2021027505 A1 WO 2021027505A1 CN 2020103258 W CN2020103258 W CN 2020103258W WO 2021027505 A1 WO2021027505 A1 WO 2021027505A1
Authority
WO
WIPO (PCT)
Prior art keywords
data
processed
intercepted
business
smart contract
Prior art date
Application number
PCT/CN2020/103258
Other languages
English (en)
Chinese (zh)
Inventor
冯承勇
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021027505A1 publication Critical patent/WO2021027505A1/fr

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Definitions

  • This application relates to the field of blockchain technology, and in particular to a data processing method and related devices based on smart contracts.
  • business parties can establish smart contracts on the basis of mutual trust, so that business data can be processed automatically according to the content of the smart contract Take the appropriate action.
  • the bank and the customer trust each other and sign a credit card automatic repayment contract.
  • the bank can deduct the corresponding amount from the associated savings card, without the customer’s manual operation, thereby improving efficiency.
  • the embodiments of the application provide a data processing method and related devices based on smart contracts, which can intercept received business data to be processed and processed business data based on smart contracts, improve data processing capabilities, and have high applicability.
  • an embodiment of the present application provides a data processing method based on a smart contract, and the method includes.
  • the service data to be processed includes the data to be intercepted.
  • the business data to be processed includes the data to be intercepted, the business data to be processed is intercepted based on the first smart contract. If the business data to be processed does not include the data to be intercepted, the business data to be processed is processed based on the first smart contract. Business data is processed for business data.
  • the processed business data contains the data to be intercepted, the processed business data is intercepted, and if the processed business data does not contain the data to be intercepted, the processed business data is sent to the data recipient.
  • an embodiment of the present application provides a data processing device based on a smart contract, and the data processing device includes.
  • the receiving unit is used to receive the service data to be processed sent by the data sender.
  • the determining unit is configured to determine whether the service data to be processed includes the data to be intercepted based on the first smart contract.
  • the processing unit is configured to intercept the business data to be processed based on the first smart contract when the business data to be processed contains the data to be intercepted, and to intercept the business data to be processed based on the first smart contract when the business data to be processed does not contain the data to be intercepted
  • the contract performs business data processing on the above pending business data.
  • the above determining unit is used to determine whether the processed business data contains the above data to be intercepted.
  • the processing unit is configured to intercept the processed business data when the processed business data contains the data to be intercepted, and when the processed business data does not contain the data to be intercepted, the processed business data The data is sent to the data recipient.
  • an embodiment of the present application provides a terminal device.
  • the terminal device includes a memory and a processor, and the processor and the memory are connected to each other, wherein the memory is used to store a computer program, and the computer
  • the program includes program instructions, and the processor is used to execute the program instructions of the memory, wherein.
  • the to-be-processed business data includes the to-be-intercepted data
  • the to-be-processed business data is intercepted based on the first smart contract, and if the to-be-processed business data does not include the to-be-intercepted data, then based on the first smart contract
  • a smart contract performs business data processing on the business data to be processed.
  • the processed business data contains the data to be intercepted, then the processed business data is intercepted, and if the processed business data does not contain the data to be intercepted, then the processed business data is Send to the data recipient.
  • an embodiment of the present application provides a computer-readable storage medium, the computer-readable storage medium stores a computer program, and the computer program includes program instructions that are used when executed by a processor Implement the following steps.
  • the to-be-processed business data includes the to-be-intercepted data
  • the to-be-processed business data is intercepted based on the first smart contract, and if the to-be-processed business data does not include the to-be-intercepted data, then based on the first smart contract
  • a smart contract performs business data processing on the business data to be processed.
  • the processed business data contains the data to be intercepted, then the processed business data is intercepted, and if the processed business data does not contain the data to be intercepted, then the processed business data is Send to the data recipient.
  • the business data to be processed containing the data to be intercepted can be intercepted, which improves the intelligence Data processing capabilities of the contract.
  • the ability to intercept data based on smart contracts can be further improved, with higher adaptability.
  • Fig. 1 is a schematic flowchart of a data processing method based on a smart contract provided by an embodiment of the present application.
  • Fig. 2 is a schematic flowchart of a method for intercepting pending business data based on a smart contract provided by an embodiment of the present application.
  • Fig. 3 is a schematic structural diagram of a data processing device based on a smart contract provided by an embodiment of the present application.
  • Fig. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the data processing method based on the smart contract provided in the embodiment of the present application (for convenience of description, the method provided in the embodiment of the present application may be referred to as the method).
  • the method provided in the embodiments of the present application can be applied to any blockchain node server, and can also be applied to other node servers or related network nodes, and is not limited here. Taking a certain blockchain node server as an example, the method provided by the embodiment of the present application will be described with reference to FIGS. 1 to 4.
  • Fig. 1 is a schematic flowchart of a data processing method based on a smart contract provided by an embodiment of the present application.
  • the method provided in the embodiment of the present application may include the following steps 101-105.
  • a blockchain node can deploy designated data content that meets the conditions for invoking the smart contract in any storage area connected to it.
  • the service data to be processed When receiving the service data to be processed from the data sender, it can be determined whether the specified data content in any of the above storage areas contains the data identifier of the service data to be processed. If it contains the data identifier of the service data to be processed, the data is determined
  • the sender is the contract participant.
  • the smart contract can be called and executed to perform business data processing on the above-mentioned pending business data.
  • the above-mentioned data senders include but are not limited to transaction initiators, identity verification initiators, and product supply chain providers, etc., which are not limited here. It should be noted that the above specified data content and the above data identifier are only used to determine whether the business data to be processed meets the conditions for invoking the smart contract.
  • the specific data expression form can be one or more combinations of numbers, letters, and symbols. There is no restriction.
  • any of the above-mentioned storage areas includes, but is not limited to, storage devices in the blockchain network, or cloud storage and hard disks connected to blockchain nodes, and there is no restriction here.
  • the general smart contract exists in the form of computer-readable code, and the smart contract itself does not have the ability to intercept data, before determining whether the above-mentioned service data to be processed includes the above-mentioned data to be intercepted,
  • the first smart contract with the ability to intercept data needs to be generated.
  • the second smart contract for processing the above-mentioned service data to be processed may be determined according to the service data to be processed sent by the data sender, and the contract code of the above-mentioned second smart contract may be obtained.
  • the interception code is generated according to the data to be intercepted, and generated in combination with the contract code of the second smart contract.
  • the above-mentioned first smart contract has the same business data processing capabilities as the above-mentioned second smart contract, and at the same time, it can intercept the pending business data that meets the interception conditions.
  • the to-be-processed data can be verified before executing the first smart contract. Whether the service data includes the above-mentioned data to be intercepted, so as to determine whether to intercept the above-mentioned service data to be processed based on the above-mentioned first smart contract.
  • the business data to be processed can be matched with the data to be intercepted to determine whether the business data to be processed includes the data to be intercepted.
  • the business data to be processed will not be sent by the data sender in a fixed data format. Therefore, for the two different formats of data, it is impossible to determine Whether data in one format contains data in another format. Based on the foregoing reasons, before matching the foregoing business data to be processed and the foregoing data to be intercepted, the data format of the foregoing data to be intercepted and the data format of the foregoing business data to be processed may be acquired first. At this time, it can be determined whether the data format of the data to be intercepted is consistent with the data format of the business data to be processed.
  • the data to be intercepted can be directly matched with the business to be processed, and when the business to be processed is When there is a data segment consistent with the data to be intercepted, it can be determined that the business data to be processed includes the data to be intercepted.
  • the above-mentioned pending data is The business data contains the data segment "0111" that is consistent with the data to be intercepted, so it can be determined that the business data to be processed contains the data to be intercepted.
  • the data format of the data to be intercepted is inconsistent with the data format of the business data to be processed
  • the data format of the data to be intercepted and/or the data format of the business data to be processed can be modified to make the data format of the data to be intercepted and
  • the data format of the business data to be processed is the same.
  • the data to be intercepted is binary data and the amateur data to be processed is decimal data
  • the data to be intercepted can be processed to modify the data to be intercepted into decimal data. It is also possible to perform data processing on the service data to be processed to modify the service data to be processed into binary data.
  • the to-be-processed data cannot be determined. Whether the business data contains data that has the same semantics as the above-mentioned data to be intercepted but has a different data presentation form.
  • the first smart contract can be used to intercept the business data to be processed containing "paper invoices"
  • the business data to be processed contains "non-electronic "Invoice”
  • the above-mentioned first smart contract will determine that the above-mentioned pending business data does not contain the to-be-intercepted data, which in turn leads to the intelligent interception of pending business data containing "paper invoices” based on the above-mentioned first smart contract, and cannot be intercepted.
  • "Non-electronic invoice” pending business data is data representing "paper invoices”
  • At least one target data that is semantically consistent with the data to be intercepted and whose data expression format is different from the data to be intercepted can be determined from the preset database.
  • the data in the above-mentioned preset database can be common intercepted data obtained from the Internet, big data platforms or other storage spaces, or can be intercepted data pre-designated by the data sender, data receiver, and smart contract manager ,
  • the specific source is not restricted.
  • it can be determined whether there is a data segment consistent with any one of the at least one target data in the service data to be processed, so as to expand the first intelligence.
  • the scope of the contract's identification of the above-mentioned pending business data When there is a data segment consistent with any one of the at least one target data in the above-mentioned service data to be processed, it can be determined that the above-mentioned service data to be processed includes the above-mentioned data to be intercepted.
  • the data format of any data in the preset database is consistent with the data format of the data to be intercepted, and in the process of matching the business data to be processed with the at least one target data, the data format of the business data to be processed is The data format needs to be consistent with the data format of the data to be intercepted above, and will not be repeated here.
  • the service data to be processed sent by the data sender is data that has been processed through encryption, compression, etc., it is necessary to decrypt and decompress the service data to be processed to obtain the complete service data to be processed. , And then obtain the data format of the service data to be processed, which will not be repeated here.
  • the service data to be processed includes the data to be intercepted, the service data to be processed is intercepted based on the first smart contract. If the service data to be processed does not include the data to be intercepted, the data to be intercepted is processed based on the first smart contract.
  • the business data to be processed is processed for business data.
  • the service data to be processed does not include the data to be intercepted
  • business data processing is performed on the service data to be processed based on the first smart contract.
  • the company, institution, product and other information in the data provided by the supply chain provider can be verified based on the corresponding smart contract, so that the supply chain data remains accurate and effective at every link.
  • the transaction request can be verified based on the corresponding smart contract, which further simplifies the transaction process and reduces data errors.
  • the service data to be processed can be intercepted at this time.
  • the aforementioned pending business data can be deleted to prevent the aforementioned first smart contract from performing business data processing on the aforementioned pending business data, or while the aforementioned pending business data is deleted, a deletion notification can be generated and based on the aforementioned pending data. Send the deletion notice to the data sender, so that the data sender modifies the pending service data and resends the revised pending service information after receiving the deletion notice.
  • the method for intercepting service data to be processed based on a smart contract may include the following steps 201-203.
  • the number of data segments between the to-be-processed business data and the data to be intercepted or any target data can be determined, and then the risk level of the to-be-processed business data can be determined according to the number of data segments.
  • the larger the number of data segments the higher the risk of the business data to be processed, and the smaller the number of data segments, the lower the risk of the business data to be processed.
  • the data sender can take different influence measures according to the risk level of the service data to be processed.
  • the above-mentioned risk level may reflect the severity of the security risk of the data sender itself and the service data to be processed.
  • the above-mentioned risk level can reflect the degree of data management norms of the data sender and the data to be processed, which can be combined with specific The application scenarios and the types of data to be intercepted determine different response measures.
  • alarm information may be generated based on the intercepted service data to be processed and sent to the data sender.
  • the alarm information generated based on the intercepted service data to be processed may include the data to be intercepted, so that the data sender can respond to the alarm to be intercepted after receiving the alarm information.
  • different alarming methods can be determined according to different risk levels, so that different alarming methods are used to send the alarm information to the data sender.
  • a faster warning method instant alarm, telephone notification, etc.
  • the alarm method email, SMS, etc.
  • a slower alarm speed can be used to send the alarm information to the data sender so that the data sender can take countermeasures according to the actual situation.
  • the implementation of the specific alarm method is not limited here.
  • the sending method of the alarm information can be determined based on the risk level of the business data to be processed, so that the alarm information corresponding to different risk levels has different alarm methods, making the alarm of the business risk data more targeted and flexible , High applicability.
  • the process of executing the smart contract is a process of data verification and processing
  • data changes in the process of performing business data processing on the business data to be processed based on the first smart contract cause
  • the processed business data may contain the aforementioned data to be intercepted. That is to say, after performing business data processing on the business data to be processed through the first smart contract, business data to be processed that does not originally need to be intercepted needs to be intercepted because the data to be intercepted is generated. Therefore, after the processed business data is obtained, it is necessary to determine again whether the processed business data includes the data to be intercepted.
  • the specific determination method is as shown in step 102, which will not be repeated here.
  • the data type of the processed business data can also be obtained, and the data processing tool that processes the corresponding data type is used to determine the processed business data according to different data types. Does your business data contain the aforementioned data to be intercepted? For example, when the processed business data is image data, an image processing tool can be used to determine whether the image data contains the data to be intercepted. For another example, when the processed service data is audio data, an audio processing tool can be used to determine whether the audio data contains the data to be intercepted.
  • the above-mentioned processed service data includes multiple types of data (for example, both image data and audio data)
  • multiple data processing tools may be used at the same time to determine whether the processed service data contains data to be intercepted .
  • the above-mentioned first smart contract can directly call the relevant interface of the third-party processing platform to enable third-party data processing
  • the platform can receive and determine whether the processed business data contains the aforementioned data to be intercepted, and the specific implementation method is not limited here.
  • the above-mentioned processed business data contains the above-mentioned data to be intercepted, intercept the above-mentioned processed business data, and if the above-mentioned processed business data does not contain the above-mentioned data to be intercepted, then send the above-mentioned processed business data to the data receiver square.
  • the processed business data when the processed business data includes the intercepted data, the processed business data can be intercepted.
  • the specific interception method is as shown in step 103, which will not be repeated here.
  • the processed service data needs to be sent to the data receiver.
  • the above-mentioned data receivers include but are not limited to transaction accounting platforms, product distribution systems, and data distribution platforms, etc., which are not limited here.
  • the above-mentioned processed business data can be intercepted and sent to the data receiver at the same time.
  • Interception notification information may also be generated to inform the data receiver that the above-mentioned processed business data has been intercepted, so as to avoid unnecessary losses.
  • the smart contract with data interception function is generated based on the data to be intercepted, so that when the service to be processed is processed based on the smart contract, the data to be intercepted can be intercepted.
  • Processing business data improves the data processing capabilities of smart contracts.
  • the ability to intercept data based on smart contracts can be further improved, with higher adaptability.
  • it can provide the data sender and data receiver with corresponding alarm methods. Not only can the data sender and data receiver take timely response measures, but also further eliminate the data Security risks.
  • FIG. 3 is a schematic structural diagram of a data processing device based on a smart contract provided by an embodiment of the present application.
  • the data processing device provided by the embodiment of the present application includes.
  • the receiving unit 31 is configured to receive service data to be processed sent by the data sender.
  • the determining unit 32 is configured to determine whether the service data to be processed includes the data to be intercepted based on the first smart contract.
  • the processing unit 33 is configured to, when the service data to be processed includes the data to be intercepted, intercept the service data to be processed based on the first smart contract, and when the service data to be processed does not include the data to be intercepted, based on the first
  • the smart contract performs business data processing on the above pending business data.
  • the above determining unit 32 is configured to determine whether the processed service data includes the above data to be intercepted.
  • the processing unit 33 is configured to intercept the processed business data when the processed business data contains the data to be intercepted, and when the processed business data does not contain the data to be intercepted, the processed business data The data is sent to the data recipient.
  • the aforementioned determining unit 32 is also used for.
  • the above-mentioned data processing device also includes.
  • the generating unit 34 is further configured to generate a first smart contract for business data processing and capable of intercepting business data based on the data to be intercepted and the second smart contract.
  • the above-mentioned data processing device further includes.
  • the obtaining unit 35 is also used to obtain the data format of the data to be intercepted and the data format of the service data to be processed.
  • the processing unit 33 is further configured to modify the data format of the data to be intercepted and/or the data format of the business data to be processed when the data format of the data to be intercepted is inconsistent with the data format of the business data to be processed to Based on the data to be intercepted and the business data to be processed in the same data format, it is determined whether the business data to be processed includes the data to be intercepted.
  • the above-mentioned data processing device includes.
  • the matching unit 36 is configured to match the data to be intercepted with the service data to be processed.
  • the determining unit 32 is configured to determine that the service data to be processed includes the data to be intercepted when the service data to be processed includes a data segment that is consistent with the data to be intercepted.
  • the aforementioned determining unit 32 is used.
  • the data format of any data in the above-mentioned preset database is the same as that of the above-mentioned data to be intercepted.
  • the data format is consistent.
  • the matching unit 36 is configured to match the at least one target data with the service data to be processed.
  • the determining unit 32 is configured to determine that the service data to be processed includes the data to be intercepted when the service data to be processed includes a data segment that is consistent with any target data in the at least one target data.
  • the aforementioned determining unit 32 is also used for.
  • the alarm mode and alarm information corresponding to the service data to be processed are determined based on the risk level.
  • the processing unit 33 is further configured to send the alarm information and the service data to be processed to the data sender based on the alarm mode.
  • the above-mentioned smart contract-based data processing device can execute the implementation manners provided in the steps in Figures 1 to 2 through various built-in modules and/units.
  • the foregoing receiving unit 31 may be configured to receive implementation manners such as to-be-processed service data sent by the data sender.
  • the determination unit 32 may be configured to determine whether the service data to be processed includes the data to be intercepted and other implementation methods based on the first smart contract. For details, please refer to the implementation methods provided in each step above, which will not be repeated here.
  • the processing unit 33 can be used to implement the method for intercepting the business data to be processed based on the first smart contract when the business data to be processed includes the data to be intercepted.
  • the generating unit 34 can be used to generate a first smart contract for business data processing and capable of intercepting business data according to the data to be intercepted and the second smart contract.
  • the acquisition unit 35 may be used to acquire the data format of the data to be intercepted and the data format of the business data to be processed.
  • the matching unit 36 can be used to match the data to be intercepted with the service data to be processed and other implementation methods. For details, please refer to the implementation methods provided in the above steps, which will not be repeated here.
  • the business data to be processed containing the data to be intercepted can be intercepted, which improves the intelligence Data processing capabilities of the contract.
  • the ability to intercept data based on smart contracts can be further improved, with higher adaptability.
  • FIG. 4 is a schematic structural diagram of a terminal device provided by an embodiment of the present application.
  • the terminal device in this embodiment may include.
  • One or more processors 41 and memory 42 are connected by a bus 43.
  • the memory 42 is used to store a computer program, and the computer program includes program instructions.
  • the processor 41 is used to execute the program instructions stored in the memory 42 to perform the following operations.
  • the service data to be processed includes the data to be intercepted.
  • the business data to be processed includes the data to be intercepted, the business data to be processed is intercepted based on the first smart contract. If the business data to be processed does not include the data to be intercepted, the business data to be processed is processed based on the first smart contract. Business data is processed for business data.
  • the processed business data contains the data to be intercepted, the processed business data is intercepted, and if the processed business data does not contain the data to be intercepted, the processed business data is sent to the data recipient.
  • the aforementioned processor 41 is also used for.
  • a first smart contract used for business data processing and capable of intercepting business data is generated.
  • the aforementioned processor 41 is also used for.
  • the data format of the data to be intercepted is inconsistent with the data format of the business data to be processed
  • the data format of the data to be intercepted and/or the data format of the business data to be processed is modified to be based on the data to be intercepted in the same data format
  • the above-mentioned service data to be processed to determine whether the above-mentioned service data to be processed includes the above-mentioned data to be intercepted.
  • the aforementioned processor 41 is used.
  • the service data to be processed has a data segment consistent with the data to be intercepted, it is determined that the service data to be processed includes the data to be intercepted.
  • the aforementioned processor 41 is used.
  • the data format of any data in the above-mentioned preset database is the same as that of the above-mentioned data to be intercepted.
  • the data format is consistent.
  • the service data to be processed has a data segment that is consistent with any target data in the at least one target data, it is determined that the service data to be processed includes the data to be intercepted.
  • the aforementioned processor 41 is used.
  • the alarm mode and alarm information corresponding to the service data to be processed are determined based on the risk level.
  • the above warning information and the above pending service data are sent to the data sender.
  • the aforementioned processor 41 may be a central processing unit (CPU), and the processor 41 may also be other general-purpose processors, digital signal processors (digital signal processors) processor, DSP), application specific integrated circuit (application specific integrated circuit, ASIC), ready-made programmable gate array (field-programmable gate array, FPGA) or other programmable logic devices, discrete gates or transistor logic devices, discrete hardware components, etc.
  • the general-purpose processor may be a microprocessor or the processor may also be any conventional processor or the like.
  • the memory 41 may include a read-only memory and a random access memory, and provides instructions and data to the processor 41.
  • a part of the memory 42 may also include a non-volatile random access memory.
  • the memory can also store device type data.
  • the above-mentioned terminal device can execute the implementation manners provided in the steps in Figures 1 to 2 through its built-in functional modules.
  • the implementation manners provided in the above-mentioned steps which will not be repeated here.
  • the business data to be processed containing the data to be intercepted can be intercepted, which improves the intelligence Data processing capabilities of the contract.
  • the ability to intercept data based on smart contracts can be further improved, with higher adaptability.
  • the embodiments of the present application also provide a computer-readable storage medium, which stores a computer program and is executed by a processor to implement the method provided in each step in FIG. 1 to FIG. 2. For details, see each step above The implementation method provided will not be repeated here.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the foregoing computer-readable storage medium may be the task processing apparatus provided in any of the foregoing embodiments or the internal storage unit of the foregoing terminal device, such as a hard disk or memory of an electronic device.
  • the computer-readable storage medium may also be an external storage device of the electronic device, such as a plug-in hard disk, a smart media card (SMC), and a secure digital (secure digital, SD) card, flash card, etc.
  • the above-mentioned computer-readable storage medium may also include a magnetic disk, an optical disk, a read-only memory (read-only memory, ROM) or a random access memory (random access memory, RAM), etc.
  • the computer-readable storage medium may also include both an internal storage unit of the electronic device and an external storage device.
  • the computer-readable storage medium is used to store the computer program and other programs and data required by the electronic device.
  • the computer-readable storage medium can also be used to temporarily store data that has been output or will be output.

Abstract

L'invention concerne un procédé de traitement de données basé sur un contrat intelligent et un dispositif associé. Le procédé peut être mise en œuvre dans un contrat intelligent à chaîne de blocs. Le procédé consiste : à recevoir des données de service à traiter qui sont envoyées par une partie d'envoi de données (101) ; à déterminer, sur la base d'un premier contrat intelligent, si les données de service comprennent des données à intercepter (102) ; si tel est le cas, à intercepter les données de service sur la base du premier contrat intelligent, et si ce n'est pas le cas, à effectuer un traitement de données de service sur les données de service sur la base du premier contrat intelligent (103) ; à déterminer si les données de service traitées comprennent les données à intercepter (104) ; et si tel est le cas, à intercepter les données de service traitées, et si tel n'est pas le cas, à envoyer les données de service traitées à une partie de réception de données (105). Le procédé permet d'intercepter des données spécifiées sur la base d'un contrat intelligent, améliore la capacité de traitement de données pour des contrats intelligents, et présente une large applicabilité.
PCT/CN2020/103258 2019-08-15 2020-07-21 Procédé de traitement de données basé sur un contrat intelligent et dispositif associé WO2021027505A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910751683.7 2019-08-15
CN201910751683.7A CN110647757A (zh) 2019-08-15 2019-08-15 基于智能合约的数据处理方法及相关装置

Publications (1)

Publication Number Publication Date
WO2021027505A1 true WO2021027505A1 (fr) 2021-02-18

Family

ID=68990455

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/103258 WO2021027505A1 (fr) 2019-08-15 2020-07-21 Procédé de traitement de données basé sur un contrat intelligent et dispositif associé

Country Status (2)

Country Link
CN (1) CN110647757A (fr)
WO (1) WO2021027505A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110647757A (zh) * 2019-08-15 2020-01-03 深圳壹账通智能科技有限公司 基于智能合约的数据处理方法及相关装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108537668A (zh) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 基于智能合约的数字货币交易方法及装置、计算设备
US20180316492A1 (en) * 2017-05-01 2018-11-01 Qbrics, Inc. Distributed System and Method for Encryption of Blockchain Payloads
CN108769173A (zh) * 2018-05-21 2018-11-06 阿里体育有限公司 运行智能合约的区块链实现方法及设备
CN110647757A (zh) * 2019-08-15 2020-01-03 深圳壹账通智能科技有限公司 基于智能合约的数据处理方法及相关装置

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180316492A1 (en) * 2017-05-01 2018-11-01 Qbrics, Inc. Distributed System and Method for Encryption of Blockchain Payloads
CN108537668A (zh) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 基于智能合约的数字货币交易方法及装置、计算设备
CN108769173A (zh) * 2018-05-21 2018-11-06 阿里体育有限公司 运行智能合约的区块链实现方法及设备
CN110647757A (zh) * 2019-08-15 2020-01-03 深圳壹账通智能科技有限公司 基于智能合约的数据处理方法及相关装置

Also Published As

Publication number Publication date
CN110647757A (zh) 2020-01-03

Similar Documents

Publication Publication Date Title
US10623388B2 (en) Account association systems and methods
CN108932426B (zh) 越权漏洞检测方法和装置
JP6880055B2 (ja) メッセージ偽造防止実施方法及びデバイス
US10790973B2 (en) Blockchain authorization information generation
CN110597839A (zh) 交易数据处理方法、装置、设备以及存储介质
US20180089465A1 (en) Method for rate-limiting interactions based on dynamically calculated values by supplying problems of varying difficulty to be solved
CN111314172B (zh) 基于区块链的数据处理方法、装置、设备及存储介质
US11290256B2 (en) Blockchain-based advertisement monitoring method and apparatus, and electronic device
CN110400217B (zh) 智能合约的规则变更处理方法及装置
US11677618B2 (en) Systems and methods for real-time processing and transmitting of high-priority notifications
CN105635044B (zh) 一种信息同步方法和设备
TW202018645A (zh) 基於區塊鏈的資料處理方法、裝置和伺服器
US20210334809A1 (en) Transaction method and apparatus based on blind signature
US10044735B2 (en) System and method for authentication of electronic communications
US11349868B2 (en) Detection of spoofed internally-addressed email using trusted third party's SPF records
CN114245323B (zh) 消息处理方法及其装置、计算机设备、存储介质
WO2021027505A1 (fr) Procédé de traitement de données basé sur un contrat intelligent et dispositif associé
CN110602051B (zh) 基于共识协议的信息处理方法及相关装置
CN110381114B (zh) 接口请求参数的处理方法、装置、终端设备及介质
KR20180028246A (ko) 스미싱 메시지 검출 방법 및 이를 수행하는 단말과 검증 서버
US10911434B2 (en) Phone number protection system
WO2020000753A1 (fr) Procédé et appareil de surveillance de sécurité de dispositif
CN112866265B (zh) 一种csrf攻击防护方法及装置
US20210243036A1 (en) Blockchain network communication management
US20210264430A1 (en) Message Processing Platform for Automated Phish Detection

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20853222

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20853222

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 01/08/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20853222

Country of ref document: EP

Kind code of ref document: A1