Unlock instant, AI-driven research and patent intelligence for your innovation.

Block chain-based blacklist sharing method, device and equipment and storage medium

A blacklist and blockchain technology, applied in the fields of instruments, digital data protection, finance, etc., can solve the problems of blacklist data leakage of financial companies, economic losses of financial companies, etc., to avoid tampering and leakage, and improve security.

Inactive Publication Date: 2019-04-23
SHENZHEN LEXIN SOFTWARE TECH CO LTD
View PDF5 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the blacklist sharing platform may have the possibility of tampering or abusing blacklist data, which will lead to the leakage of blacklist data of financial companies and bring economic losses to financial companies

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based blacklist sharing method, device and equipment and storage medium
  • Block chain-based blacklist sharing method, device and equipment and storage medium
  • Block chain-based blacklist sharing method, device and equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0026] figure 2 It is a flowchart of a blockchain-based blacklist sharing method provided by Embodiment 1 of the present invention. This embodiment can be applied to the situation where blacklist data is shared based on blockchain technology, for example, multiple different financial The company shares the list of blacklisted customers of each company based on blockchain technology. The method can be executed by the block chain-based blacklist sharing device configured on the block chain node provided by the embodiment of the present invention, for example, the method can be executed by the block generation node configured on the block chain provided by the embodiment of the present invention Execute with a blockchain-based blacklist sharing device. The device can be implemented in hardware and / or software. Such as figure 2 As shown, it specifically includes the following steps:

[0027] S201. Receive an uplink transaction request including blacklist data. The uplink tra...

Embodiment 2

[0037] image 3 A flow chart of a blockchain-based blacklist sharing method provided in Embodiment 2 of the present invention; Figure 4 It is a schematic diagram of the blacklist sharing blockchain network architecture provided by Embodiment 2 of the present invention. This embodiment is further optimized on the basis of the foregoing embodiments. Specifically, it gives an introduction to processing the on-chain transaction request and writing the blacklist data into the blockchain as transaction data.

[0038] Such as Figure 4 As shown, the block chain network in the embodiment of the present invention is a block chain network composed of A financial company 40, B financial company 41 and C financial company 42. For each financial company, it includes the company's business system, Fabric_API interface, and client node. Each financial company can enter the client node of the blockchain based on the Fabric_API interface through the company's business system, and then compl...

Embodiment 3

[0061] Figure 5 It is a flowchart of a block chain-based blacklist sharing method provided by Embodiment 3 of the present invention. This embodiment is further optimized on the basis of the above-mentioned embodiments, and specifically provides the process of each client node in the blockchain network uploading and storing blacklist data to the blockchain, and querying the blacklist data, namely Realize the sharing process of blacklist data among client nodes. see Figure 5 , the method specifically includes:

[0062] S501. Receive an uplink transaction request including blacklist data. The uplink transaction request is generated by the client node according to the blacklist data to be stored.

[0063] S502, process the chain transaction request, and write the blacklist data into the blockchain as transaction data.

[0064] S503. According to the incentive strategy in the smart contract, update the current incentive token of the client node account.

[0065] S504, receiv...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain-based blacklist sharing method, device and equipment and a storage medium. The method comprises the steps of receiving an uplink transaction request comprising blacklist data, and generating the uplink transaction request by a client node according to the blacklist data to be stored; and processing the online transaction request, and writing the blacklist dataas transaction data into a block chain. According to the blacklist sharing method and device, the blacklist data can be effectively prevented from being tampered and leaked while blacklist sharing isachieved, and the safety of the data is improved.

Description

technical field [0001] Embodiments of the present invention relate to computer data storage technology, in particular to a block chain-based blacklist sharing method, device, device and storage medium. Background technique [0002] In the field of consumer finance, each financial company basically has its own blacklist database, but the blacklist database of each financial company is independent and non-shared. Also the situation. [0003] In order to prevent this from happening, some financial companies have reached the sharing of blacklist data of each financial company by sending their blacklist data to the central storage terminal, such as figure 1 As mentioned above, cooperative institutions 1 to N, which are composed of several financial companies, each cooperative institution uploads the blacklist data in its local blacklist database to the blacklist sharing platform through the upload interface of the blacklist sharing platform, and can Share all blacklist data in ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F16/27G06F21/64G06Q40/04
CPCG06F21/64G06Q40/04
Inventor 王晓明颜亮
Owner SHENZHEN LEXIN SOFTWARE TECH CO LTD