Data processing method and device and computer readable storage medium

A data processing and certificate technology, applied in the field of data processing, can solve the problems of difficulty in ensuring the privacy of business data and the security of transmission of business data and information.

Active Publication Date: 2020-01-17
TENCENT TECH (SHENZHEN) CO LTD
View PDF12 Cites 37 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Since a block can contain the business data information of multiple enterprises (for example, enterprise A, enterprise B, ..., enterprise C), when the lightweight node of enterprise A is pulled to a certain block , while obtaining the business data associated with the enterprise A, you can also obtain the business data associated with other enterprises, so that it is difficult to ensure the privacy of the business data of other enterprises in the same block
[0003] In addition, in the process of returning the above block to the light node corresponding to the enterprise A by the full node, the light node can directly get all the business data information from the acquired block, so that the light node is When an illegal node attacks, all the business data information in the process of business data transmission can be obtained, and it is difficult to ensure the transmission security of the business data information of these enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device and computer readable storage medium
  • Data processing method and device and computer readable storage medium
  • Data processing method and device and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0080] The technical solutions in this application will be clearly and completely described below in conjunction with the drawings in this application. Apparently, the described embodiments are only some of the embodiments of this application, not all of them. Based on the embodiments in this application, all other embodiments obtained by persons of ordinary skill in the art without creative efforts fall within the protection scope of this application.

[0081] See figure 1 , is a schematic diagram of a blockchain network structure provided by the embodiment of this application. Such as figure 1 The blockchain network structure shown can be applied to a blockchain system, which can be formed by connecting multiple types of nodes (for example, lightweight nodes, gateway nodes, full nodes, etc.) through network communication distributed system.

[0082] Such as figure 1 The illustrated blockchain network architecture may include a gateway node 30a, a first node cluster and a...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a data processing method and device and a computer readable storage medium. The method comprises the steps of a gateway node acquiring an encrypted communication request sent by a first node; wherein the first node is a node associated with the target terminal in the blockchain network; obtaining to-be-verified certificate information associated with a target user corresponding to the target terminal according to the encrypted communication request; when the to-be-verified certificate information has legality, obtaining identity identification information associated with the target user from the to-be-verified certificate information, and performing identity authentication on the target user based on the identity identification information; and when the identity authentication state is a successful state and a handshake task associated with the encrypted communication request is completed, establishing a session with the first node, and returning encrypted datainformation associated with the identity identification information to the first node according to an encryption key corresponding to the session. By adopting the method and the device, the privacy ofdata pulling can be enhanced, and the security of data transmission can be improved.

Description

technical field [0001] The present application relates to the technical field of data processing, and in particular to a data processing method, device, and computer-readable storage medium. Background technique [0002] In the existing technology, the lightweight node (i.e. the first node) corresponding to each entity object (such as an enterprise) can directly pull the entire node containing the respective business data from the full amount of nodes in the consensus network through the hash value. blocks. Since a block can contain the business data information of multiple enterprises (for example, enterprise A, enterprise B, ..., enterprise C), when the lightweight node of enterprise A is pulled to a certain block , while obtaining the business data associated with the enterprise A, the business data associated with other enterprises can also be obtained together, so that it is difficult to ensure the privacy of the business data of other enterprises in the same block. ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L29/06H04L12/66H04L29/08
CPCH04L9/3265H04L9/3236H04L63/0428H04L63/0823H04L12/66H04L67/141H04L67/10H04L9/50
Inventor 黄焕坤王宗友时一防蓝虎
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products