Unlock instant, AI-driven research and patent intelligence for your innovation.

Blacklist data sharing method and acquisition method

A data sharing and blacklist technology, applied in the field of information security, can solve the problems of inability to guarantee privacy security and blacklist data, and achieve the effects of protecting privacy security, improving utilization efficiency, and efficient sharing

Active Publication Date: 2021-10-29
浙江甲骨文超级码科技股份有限公司
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a blacklist data sharing method and an acquisition method for the problem that the traditional blacklist data sharing method cannot guarantee the privacy security on the chain after the blacklist data is uploaded to the chain.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist data sharing method and acquisition method
  • Blacklist data sharing method and acquisition method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0028] In order to make the purpose, technical solution and advantages of the present application clearer, the present application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present application, and are not intended to limit the present application.

[0029] This application provides a blacklist data sharing method. It should be noted that the blacklist data sharing method provided by this application is applied to the blockchain chain group forming the alliance chain. There are multiple institutions in the alliance chain.

[0030] In addition, the blacklist data sharing method provided by this application does not limit its executive body. Optionally, the execution subject of the blacklist data sharing method provided by this application may be a client controlled by any institution in the consortium chain.

[0031]...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a blacklist data sharing method and a blacklist data acquisition method, and the blacklist data sharing method comprises the steps: carrying out the hash of a blacklist user identity identifier, generating a first secret key, and transmitting the first secret key to a receiver client, enabling the receiver client to only obtain the first secret key after the hash, the blacklist user identity identification cannot be acquired, therefore, the blacklist user identity identification of the user can be ensured not to be leaked in the transmission process. And on the other hand, the initiator client generates a first key corresponding to each receiver client, needs to receive each signature identity data returned by each receiver client, accumulates all signature identity data to generate a blacklist key, and then performs uplink operation. The blacklist secret key comprises the signature identity data of all the mechanisms, mutual trust alliance construction among the mechanisms is facilitated, efficient sharing of the blacklist data is achieved, and the utilization efficiency of the blacklist data is improved.

Description

technical field [0001] The present application relates to the technical field of information security, in particular to a blacklist data sharing method and obtaining method. Background technique [0002] As a valuable private data, blacklist data is owned by various organizations. At present, based on the consideration of data security, various institutions are worried about data leakage, so they all hold their own, which leads to insufficient sharing of existing blacklist data, and the island phenomenon is serious. [0003] Blacklist data includes blacklist user identity (referred to as id, such as ID number) and blacklist user detail data (referred to as data). Generally, blacklist user identity is used as the blacklist key on the chain (key), the blacklist user details data is used as the (value) on the chain, and the value can be retrieved through the key. [0004] Most of the existing blockchain blacklist data sharing methods are to upload the blacklist data to the ch...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/62H04L9/06
CPCG06F21/6254H04L9/0643
Inventor 顾惠波岳晓兰孙海锋
Owner 浙江甲骨文超级码科技股份有限公司