Data processing method and device based on block chain

A data processing and blockchain technology, applied in the blockchain field, can solve problems such as complex network environment, security risks, malicious attacks or tampering of user data

Pending Publication Date: 2020-06-23
TENCENT TECH (SHENZHEN) CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the network has brought great convenience to people's life, but at the same time, due to the complexity of the network environment, it also leaves a lot of security risks.
For example, when conducting online business processing, criminals may pretend to be users to apply for business processing, or criminals may maliciously attack or tamper with saved user data, or users themselves may provide false information for business processing, etc.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Data processing method and device based on block chain
  • Data processing method and device based on block chain
  • Data processing method and device based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] See figure 2 , figure 2 It is a schematic flowchart of the blockchain-based data processing method provided by the embodiment of this application. The method provided in the embodiment of this application may include the following steps S201 to S203:

[0057] S201. Receive an information verification request sent by a first user.

[0058] In some feasible implementations, the verification node can obtain the first signature information of the information verification request carried by the first user carried in the information verification request by receiving the information verification request sent / submitted by the first user through the user terminal, as well as the information verification request. The request includes the asset-related event, the event type of the asset-related event, the first user ID corresponding to the first user, and the first user's household registration ID. Wherein, the first user identification corresponding to the first user may be ...

Embodiment 2

[0071] See image 3 , image 3 It is another schematic flowchart of the blockchain-based data processing method provided by the embodiment of this application. The method provided in the embodiment of the present application can be described by implementing the following steps S301 to S304:

[0072] S301. Receive an information verification request sent by a first user.

[0073] S302. Verify the legitimacy of the information verification request according to the first signature information, and send the information verification request to the consensus nodes in the blockchain system if it is determined that the information verification request is legal.

[0074] S303. Receive the first verification result sent by each consensus node in the blockchain system, and determine the consensus result on the asset-related event according to the received first verification results. When it is determined that a consensus is reached on the asset-related event, it will include The first...

Embodiment 3

[0080] Further, for ease of understanding, the embodiment of the present application is described by taking the verification node as a tax bureau node, and the information verification request as an individual tax deduction declaration request of the first user as an example.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention discloses a data processing method and device based on a block chain. The method comprises the steps that an information verification request sent by a first user is received, and if it is determined that the information verification request is a legal request, the information verification request is sent to consensus nodes in a block chain system, so that the consensus nodes determine a first verification result of an asset association event according to the information verification request. Receiving a first verification result sent by each consensus node, determining a consensus result of the asset association event according to each received first verification result, and when it is determined that the asset association event reaches a consensus, addingan asset association event storage block comprising a first user identity identifier corresponding to the first user and the asset association event to the block chain, and sending information verification confirmation pass information to the first user. By adopting the embodiment of the invention, the authenticity and the tamper resistance of the user information can be improved.

Description

technical field [0001] The present application relates to the technical field of blockchain, in particular to a data processing method and device based on blockchain. Background technique [0002] In recent years, with the rapid development and popularization of the Internet, online business handling has gradually become a trend. Although the network has brought great convenience to people's life, at the same time, due to the complexity of the network environment, it also leaves a lot of security risks. For example, when conducting online business processing, criminals may impersonate users to apply for business processing, or criminals maliciously attack or tamper with saved user data, or users themselves may provide false information for business processing, etc. Therefore, how to determine the authenticity of user information and improve the non-tamperability of verified user information has become one of the current problems to be solved urgently. Contents of the inve...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/27G06F21/60G06F21/64
CPCG06F16/27G06F21/602G06F21/64
Inventor 张懿方卢洋戴传兵
Owner TENCENT TECH (SHENZHEN) CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products