Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Blacklist management method and device, computer system and readable storage medium

A management method and blacklist technology, applied in the field of communication, can solve the problem that the authenticity of information in the blacklist cannot be guaranteed, and achieve the effect of ensuring closure, privacy and effectiveness

Inactive Publication Date: 2020-05-08
PING AN ASSET MANAGEMENT CO LTD
View PDF11 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The purpose of the present invention is to provide a blacklist management method, device, computer system and readable storage medium, which are used to solve the problem in the prior art that the blacklist cannot be identified whether the network nodes in the block chain intentionally provide false information or not. The problem that the authenticity of information cannot be guaranteed

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Blacklist management method and device, computer system and readable storage medium
  • Blacklist management method and device, computer system and readable storage medium
  • Blacklist management method and device, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0059] See figure 1 , The blacklist management method of this embodiment is based on a blockchain, the blockchain having at least one network node, and includes the following steps:

[0060] S1: Receive proposal information generated by a certain network node in the blockchain, and set the network node that generated the proposal information as the first node, and set other networks in the blockchain except the first node The node is set as the second node; the first node is verified and the verification result is generated, and the proposal information is written into the gray list of the blockchain according to the verification result; wherein, the gray list is used to store proposal information In the historical database, the proposal information is information of suspects suspected of dishonesty entered into the network node by the user through the user terminal;

[0061] S2: Receive the voting information generated by the second node to vote whether to add the proposal informa...

Embodiment 2

[0129] See Picture 9 , A blacklist management device 1 of this embodiment includes:

[0130] The proposal verification module 11 is configured to receive proposal information generated by a certain network node in the blockchain, and set the network node generating the proposal information as the first node, and divide the first node from the blockchain The other network nodes outside the node are set as the second node; the first node is verified and the verification result is generated, and the proposal information is written into the gray list of the blockchain according to the verification result; wherein, the gray list is used In a historical database storing proposal information, the proposal information is information of suspected untrustworthy suspects entered by the user through the user terminal to the network node;

[0131] The voting verification module 12 is configured to receive the voting information generated by the second node to vote whether to add the proposal i...

Embodiment 3

[0136] In order to achieve the above-mentioned object, the present invention also provides a computer system, which includes a plurality of computer devices 5. The components of the blacklist management apparatus 1 of the second embodiment can be dispersed in different computer devices, and the computer devices can be executed Program smart phones, tablet computers, notebook computers, desktop computers, rack servers, blade servers, tower servers or cabinet servers (including independent servers, or server clusters composed of multiple servers), etc. The computer device in this embodiment at least includes but is not limited to: a memory 51 and a processor 52 that can be communicatively connected to each other through a system bus, such as Picture 10 Shown. It should be pointed out that Picture 10 Only a computer device with components is shown, but it should be understood that it is not required to implement all the illustrated components, and more or fewer components may b...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a blacklist management method and device, a computer system and a readable storage medium, and the method comprises the following steps: receiving proposal information, verifying a first node, generating a verification result, and writing the proposal information into a grey list of a blockchain according to the verification result; receiving voting information, setting successfully verified voting information of a second node as normal voting information, and writing the normal voting information into a grey list; calculating a voting result according to the normal voting information and the weight of the second node generating the normal voting information; if the voting result is yes, writing the proposal information and the voting result thereof into a blacklistof the block chain; if the voting result is negative, reserving the proposal information and the voting result thereof in a grey list; increasing or decreasing the weight of the first node accordingto the proposal information written into the blacklist or reserved in the grey list and the voting result thereof. According to the method disclosed in the invention, blockade and privacy of the proposal information and the voting information are ensured, and authenticity of the proposal information written into the blacklist is ensured.

Description

Technical field [0001] The present invention relates to the field of communications technology, and in particular to a blacklist management method, device, computer system and readable storage medium. Background technique [0002] The blacklist is a tool used to store the information of untrustworthy units or personnel. At present, the blacklist system is mainly managed and stored through a centralized system, that is, a credible unit, or an authoritative institution as an intermediary, publishes and manages enterprises and Personal blacklist. This unit and organization must have absolute credibility and authority, so that we can unconditionally trust that its blacklist is accurate, fair and timely. In addition to using national credit to endorse it, in fact it is very difficult to establish such an institution, and the concentration of power often leads to internal corruption. This led to the emergence of a decentralized system; however, once a centralized system in this way i...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L9/30H04L9/08H04L29/08
CPCH04L63/08H04L63/12H04L67/1097H04L9/3066H04L9/0861H04L9/50
Inventor 胡培铭迟哲
Owner PING AN ASSET MANAGEMENT CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products