Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain blacklist sharing method adopting hash desensitization processing

A blacklist and blockchain technology, applied in the Internet field, can solve problems such as poor data timeliness, high cost, and poor security, and achieve the effects of meeting timeliness and scale, ensuring invariance and security, and protecting security

Pending Publication Date: 2019-12-03
深圳崀途科技有限公司
View PDF6 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The purpose of the present invention is to provide a block chain blacklist sharing method using hash desensitization processing to solve the problems of high cost, poor timeliness and poor security of the original blacklist data sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain blacklist sharing method adopting hash desensitization processing
  • Block chain blacklist sharing method adopting hash desensitization processing
  • Block chain blacklist sharing method adopting hash desensitization processing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0063] The present invention will be described in further detail below in conjunction with the accompanying drawings, but it is not intended to limit the present invention.

[0064] refer to figure 1 , figure 2 As shown, the embodiment of the present invention discloses a block chain blacklist sharing method using hash desensitization processing. The method is implemented based on the built business platform and block chain platform. The method includes the following:

[0065] Step S1: Each operating institution builds its own business platform and network nodes, and connects the network nodes of each institution to the blockchain network.

[0066] Step S2: Each institution sends a service request to its respective network node through the service platform, wherein the service request includes the upload request, deletion request and query request of blacklist data, and desensitizes and encrypts at least part of the data fields of the upload request Processing; ensure the s...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a block chain blacklist sharing method adopting hash desensitization processing, and the method comprises: enabling each operation mechanism to build a business platform and anetwork node of the operation mechanism, and enabling the network node to which each mechanism belongs to be connected to a block chain network; sending service requests to respective network nodes through a service platform, the service requests including an uploading request, a deleting request and a query request of blacklist data, and at least performing desensitization and encryption processing on part of data fields of the uploading requests; monitoring blacklist data exchange requests and responses between the sub-nodes; allocating corresponding responsibilities to each sub-node according to the monitoring result; notifying the sub-nodes which do not participate in the exchange of serving as supervisors, and verifying exchange conditions of the two exchange parties; and notifying the sub-nodes passing the exchange condition verification of performing one-to-one data exchange. The method and device solve the problems that original sensitive data sharing is high in cost and poor in data timeliness and safety.

Description

technical field [0001] The invention relates to the technical field of the Internet, and more specifically, to a method for sharing a block chain blacklist using hash desensitization processing. Background technique [0002] With the rise of big data and the Internet, data-driven technology has become one of the mainstream technologies for the development of various industries. Building data of sufficient scale is the basis of data-driven technology, but data accumulation usually consumes a lot of manpower and material resources. In response to this problem, it is undoubtedly a better solution to allow multiple institutions to share data by integrating existing data from different institutions. However, the exchange and sharing of data between different institutions has certain requirements for data security, timeliness and authenticity. Especially in the face of some sensitive data involving privacy and business secrets, such as user data such as blacklists, credit report...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62H04L29/06H04L9/06H04L9/30H04L9/32
CPCG06F21/604G06F21/602G06F21/6218H04L63/0428H04L63/12H04L9/0643H04L9/3239H04L9/3066
Inventor 张燕
Owner 深圳崀途科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products