Blacklist sharing method and device, computer device and storage medium

A blacklist and query terminal technology, which is applied in computing, secure communication devices, instruments, etc., can solve problems such as complex cooperative relations and the inability to effectively realize the safe circulation of blacklist data

Active Publication Date: 2019-10-22
ONE CONNECT SMART TECH CO LTD SHENZHEN
View PDF5 Cites 21 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0003] The traditional blacklist sharing method in the industry usually involves two parties, the data sender and the data receiver. The sender sends the blacklist data to the receiver, and usually adopts data encryption to protect the transmitted data during the transmission process; however, when more than two parties are involved When sharing blacklists between enterprises, due to the complex cooperation between enterprises, the traditional method of blacklist sharing cannot effectively realize the safe circulation of blacklist data among multiple enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist sharing method and device, computer device and storage medium
  • Blacklist sharing method and device, computer device and storage medium
  • Blacklist sharing method and device, computer device and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0051] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0052] The blacklist sharing method provided by the embodiment of this application can be applied to such as figure 1 shown in the application environment. Wherein, the terminal 102 communicates with the server 104 connected to the block chain through the network. When the inquiring party needs to query the blacklist data shared by cooperative enterprises stored on the blockchain, the terminal 102 sends a blacklist acquisition request to the server 104 connected to the blockchain, and the server 104 verifies the access rights of the terminal 102. , if the blacklist data ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the field of block storage areas, in particular to a blacklist sharing method and device, a computer device and a storage medium. The method comprises: obtaining a blacklist obtaining request sent by a query terminal, the blacklist obtaining request carrying a query identifier, and verifying the access permission of the query terminal according to the query identifier; obtaining a first encrypted blacklist corresponding to the blacklist obtaining request from a block chain storing the blacklist when the access permission of the query terminal passes verification; identifying uploading party information corresponding to the first encryption blacklist, generating an authorization verification request according to the uploading party information, and sending the authorization verification request to a query terminal; receiving an authorization certificate returned by the query terminal according to the authorization verification request, and decrypting the obtained first encryption blacklist according to the authorization certificate to obtain a query blacklist; and sending the query blacklist to a query terminal. By adopting the method, safe circulation of blacklist data among multiple enterprises can be effectively realized.

Description

technical field [0001] The present application relates to the technical field of blacklist sharing, in particular to a blacklist sharing method, device, computer equipment and storage medium. Background technique [0002] The user blacklist generated in the transaction business of financial enterprises is very important data, which can help enterprises to predict and avoid risks when dealing with business. Some enterprises will also share their own user blacklist with other partners during the cooperation process. [0003] The traditional blacklist sharing method in the industry usually involves two parties, the data sender and the data receiver. The sender sends the blacklist data to the receiver, and usually adopts data encryption to protect the transmitted data during the transmission process; however, when more than two parties are involved When blacklists are shared among enterprises, due to the complex cooperation between enterprises, the traditional method of blacklis...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06F16/2455G06F16/23H04L9/32
CPCH04L63/0876H04L63/0428G06F16/2455G06F16/2379H04L63/123H04L9/3236H04L9/50
Inventor 赖骏刘恩科王梦寒高建欣
Owner ONE CONNECT SMART TECH CO LTD SHENZHEN
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products