Block chain-based blacklist sharing method, arbitration method and device

An arbitration method and blacklist technology, applied in the field of blockchain-based blacklist sharing methods, arbitration methods and devices, can solve problems such as complex procedures, multi-party collaboration, and easy tampering, and achieve the effect of solving complex procedures

Pending Publication Date: 2019-07-19
SUN YAT SEN UNIV
View PDF4 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The primary purpose of the present invention is to provide a blacklist sharing method based on blockchain, which solves the problems of multi-party collaboration, complicated procedures, easy tampering, high repetition cost, and low credibility in the process of blacklist sharing

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain-based blacklist sharing method, arbitration method and device
  • Block chain-based blacklist sharing method, arbitration method and device
  • Block chain-based blacklist sharing method, arbitration method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0045] This embodiment provides a block chain-based blacklist sharing method, such as figure 1 , including the following steps:

[0046] S10: Build a block chain, the block chain includes several blocks;

[0047] S20: Build a smart contract, the smart contract stores blacklist data for the read and write logic of the blacklist, and the smart contract also exchanges data with the block chain;

[0048] S30: The accessing party performs synchronous sharing of blacklist data by executing the smart contract.

[0049] In the step S10, the block chain is used to store the maintenance process of all access parties to the blacklist, including adding data to the blacklist.

[0050] The smart contract’s logic of reading and writing to the blacklist includes sharing permissions. The smart contract is a group of functions that can realize active or passive processing of data, accept, store and send value, and control and manage various types of data on the chain. Programmatic rules and ...

Embodiment 2

[0056] This embodiment provides a blockchain-based blacklist arbitration method, such as figure 2 , including the following steps:

[0057] S01: Users or companies apply on the front end to check whether they or others are in the blacklist

[0058] S02: The arbitration server receives the query request from the front end, combines the off-chain data, and interacts with the smart contract;

[0059] S03: The smart contract returns the data, and the user or company decides whether to issue an arbitration application.

[0060] The smart contract contains the following functions:

[0061] a: smart contract query: traversal query on the underlying storage;

[0062] b: Permission and blacklist storage: store the write permission of the company and the arbitrator in the address variable, and store the IDs of the blacklist and arbitration list in the uint array;

[0063] c: Initialization permissions: When the smart contract is deployed for the first time, determine the read and wri...

Embodiment 3

[0068] This embodiment provides a block chain-based blacklist sharing and arbitration device, including a data processing unit, which completes the block chain-based blacklist sharing method described in Embodiment 1 and the block-based method described in Embodiment 2. Chain blacklist arbitration method.

[0069] The same or similar reference numerals correspond to the same or similar components;

[0070] The terms describing the positional relationship in the drawings are only for illustrative purposes and cannot be interpreted as limitations on this patent;

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a block chain-based blacklist sharing method, and the method comprises the following steps of S10, building a block chain which comprises a plurality of blocks; S20, constructing an intelligent contract, wherein the intelligent contract stores the blacklist data for reading and writing logics of a blacklist at the same time, and the intelligent contract further exchanges data with the block chain; and S30, enabling the access party to perform synchronous sharing of the blacklist data by executing the smart contract. Under the participation of multiple parties such as companies and arbitrators, the problem of multiple parties cooperation and being easily tampered is solved through the characteristic that the block chain technology cannot be tampered; and through an intelligent contract technology on the block chain, the problems of complex program, high repetition cost and low credibility are solved.

Description

technical field [0001] The present invention relates to the field of computer science and technology, and more specifically, to a block chain-based blacklist sharing method, arbitration method and device. Background technique [0002] The development of society is based on credit, and the development of various fields requires the establishment of a set of credit systems of their own, such as credit whitelists and blacklists, which exist in many fields such as big data credit investigation, manufacturing, supply chain, and legal enforcement. With various blacklists, the blacklist data of different companies and industries are like isolated data islands, which cannot be shared and updated efficiently. [0003] In order to seek blacklist data sharing in different companies and industries, there are two existing technologies: [0004] One is to adopt the method of centralized nodes accepting the blacklist. The disadvantages of this method are: multi-party cooperation is requir...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F16/24G06F16/27G06F21/64G06Q40/04H04L29/08
CPCG06F16/24G06F16/27G06F21/64H04L67/1095G06Q40/04
Inventor 郑子彬郑沛霖
Owner SUN YAT SEN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products