Blacklist data sharing method and system based on block chain
A blacklist and blockchain technology, applied in the blockchain field, can solve the problems of inability to guarantee the integrity, validity and opacity of blacklist data, and achieve the effects of low operating costs, privacy protection, and increased sharing scale
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] see figure 1 , this embodiment provides a block chain-based blacklist data sharing method, including:
[0067] The member institutions set up their own network nodes, and sequentially network the network nodes of each member institution to build a blockchain. The network nodes include business nodes and credit nodes; initiate a blacklist data upload request through any business node, and use the generated symmetric secret While encrypting the blacklist data with the random public key, the symmetric key is encrypted with the random public key. By packaging the encrypted blacklist data and the encrypted symmetric key on the chain, and when the account is settled on the chain, the associated point node requests to send The point address is transferred to the point; or, through any business node to initiate a blacklist data query request, when the target blacklist data is not uploaded by the query organization, then through the associated point node to the point address of ...
Embodiment 2
[0088] see figure 1 and Figure 6 , the present embodiment provides a block chain-based blacklist data sharing system, including:
[0089] Block chain construction unit 1 is used for member institutions to build their own network nodes, and sequentially connect the network nodes of each member institution to build a block chain. The network nodes include business nodes and points nodes;
[0090] The blacklist data upload unit 2 is used for initiating a blacklist data upload request via any service node, using the generated symmetric key to encrypt the blacklist data and at the same time encrypting the symmetric key with a random public key, by uploading the encrypted blacklist data Packaged with the encrypted symmetric secret key on the chain, and the associated points node requests to transfer the points to the specified point address when the account is settled on the chain;
[0091] The blacklist data query unit 3 is used for initiating a blacklist data query request via ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


