Block chain blacklist sharing method adopting hash desensitization processing
A blacklist and blockchain technology, applied in the Internet field, can solve problems such as poor data timeliness, high cost, and poor security, and achieve the effects of meeting timeliness and scale, ensuring invariance and security, and protecting security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0063] The present invention will be described in further detail below in conjunction with the accompanying drawings, but it is not intended to limit the present invention.
[0064] refer to figure 1 , figure 2 As shown, the embodiment of the present invention discloses a block chain blacklist sharing method using hash desensitization processing. The method is implemented based on the built business platform and block chain platform. The method includes the following:
[0065] Step S1: Each operating institution builds its own business platform and network nodes, and connects the network nodes of each institution to the blockchain network.
[0066] Step S2: Each institution sends a service request to its respective network node through the service platform, wherein the service request includes the upload request, deletion request and query request of blacklist data, and desensitizes and encrypts at least part of the data fields of the upload request Processing; ensure the s...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com