Blacklist data sharing method and acquisition method
A data sharing and blacklist technology, applied in the field of information security, can solve the problems of inability to guarantee privacy security and blacklist data, and achieve the effects of protecting privacy security, improving utilization efficiency, and efficient sharing
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0028] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.
[0029] This application provides a blacklist data sharing method. It should be noted that the blacklist data sharing method provided by this application is applied to the blockchain chain group forming the alliance chain. There are multiple institutions in the alliance chain.
[0030] In addition, the blacklist data sharing method provided by this application does not limit its executive body. Optionally, the execution subject of the blacklist data sharing method provided by this application may be a client controlled by any institution in the consortium chain.
[0031]...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 

