Unlock instant, AI-driven research and patent intelligence for your innovation.

Blacklist data sharing method and system based on block chain

A blacklist and blockchain technology, applied in the blockchain field, can solve the problems of inability to guarantee the integrity, validity and opacity of blacklist data, and achieve the effects of low operating costs, privacy protection, and increased sharing scale

Active Publication Date: 2020-09-29
南京星云数字技术有限公司
View PDF3 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The blacklist is a list of actors or legal persons with serious negative credit records. Once included in the blacklist, it means that the actor’s credit has problems. Cooperating with actors or legal persons appearing in the blacklist will increase the risk of cooperation. There are many sources of existing blacklist data, such as financial institutions, credit card issuing institutions, courts, and telecommunications companies. Since the sources of blacklist data include government agencies and large and medium-sized enterprises, due to the characteristics of scattered sources, in the In the process of operation, it is difficult to effectively integrate and share the blacklist data of the above-mentioned units, so many non-governmental organizations that specialize in collecting the blacklist data of each unit and then selling them for profit have been derived, so that enterprises can purchase by paying To obtain the required blacklist data, even so, because the blacklist data is open, scattered and open and opaque, there are differences in the quantity and quality of the blacklist data obtained by different non-governmental organizations. List data, the integrity and validity of blacklist data cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist data sharing method and system based on block chain
  • Blacklist data sharing method and system based on block chain
  • Blacklist data sharing method and system based on block chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] see figure 1 , this embodiment provides a block chain-based blacklist data sharing method, including:

[0067] The member institutions set up their own network nodes, and sequentially network the network nodes of each member institution to build a blockchain. The network nodes include business nodes and credit nodes; initiate a blacklist data upload request through any business node, and use the generated symmetric secret While encrypting the blacklist data with the random public key, the symmetric key is encrypted with the random public key. By packaging the encrypted blacklist data and the encrypted symmetric key on the chain, and when the account is settled on the chain, the associated point node requests to send The point address is transferred to the point; or, through any business node to initiate a blacklist data query request, when the target blacklist data is not uploaded by the query organization, then through the associated point node to the point address of ...

Embodiment 2

[0088] see figure 1 and Figure 6 , the present embodiment provides a block chain-based blacklist data sharing system, including:

[0089] Block chain construction unit 1 is used for member institutions to build their own network nodes, and sequentially connect the network nodes of each member institution to build a block chain. The network nodes include business nodes and points nodes;

[0090] The blacklist data upload unit 2 is used for initiating a blacklist data upload request via any service node, using the generated symmetric key to encrypt the blacklist data and at the same time encrypting the symmetric key with a random public key, by uploading the encrypted blacklist data Packaged with the encrypted symmetric secret key on the chain, and the associated points node requests to transfer the points to the specified point address when the account is settled on the chain;

[0091] The blacklist data query unit 3 is used for initiating a blacklist data query request via ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blacklist data sharing method and system based on a blockchain, relates to the technical field of blockchains, and aims to ensure the convenience and effectiveness of blacklist data acquisition and improve the sharing value of blacklist data by introducing a blockchain technology into an application scenario of blacklist data. The method comprises the steps of: enabling member mechanisms to build respective network nodes, networking the network nodes to which the member mechanisms belong in sequence to build a block chain, wherein the network nodes comprise service nodes and integral nodes; initiating a blacklist data uploading request through any service node; and encrypting the blacklist data by using the generated symmetric secret key, encrypting the symmetricsecret key by using a random public key, packaging the encrypted blacklist data and the encrypted symmetric secret key for uplink, and requesting to transfer an integral to a specified integral address by an associated integral node during uplink account drop. The system comprises the method provided by the scheme.

Description

technical field [0001] The present invention relates to the technical field of block chains, in particular to a method and system for sharing blacklist data based on block chains. Background technique [0002] The blacklist is a list of actors or legal persons with serious negative credit records. Once included in the blacklist, it means that the actor’s credit has problems. Cooperating with actors or legal persons appearing in the blacklist will increase the risk of cooperation. There are many sources of existing blacklist data, such as financial institutions, credit card issuing institutions, courts, and telecommunications companies. Since the sources of blacklist data include government agencies and large and medium-sized enterprises, due to the characteristics of scattered sources, in the In the process of operation, it is difficult to effectively integrate and share the blacklist data of the above-mentioned units, so many non-governmental organizations that specialize i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/176G06F16/14G06F16/16G06F21/60G06F21/62G06F21/64
CPCG06F16/176G06F16/148G06F16/162G06F21/602G06F21/6245G06F21/64G06F2221/2107G06F16/16G06F16/14G06F21/62G06F21/60
Inventor 盛伟郑志探
Owner 南京星云数字技术有限公司