Movatterモバイル変換


[0]ホーム

URL:


CN113660097A - Data flow system based on block chain, data flow method and device - Google Patents

Data flow system based on block chain, data flow method and device
Download PDF

Info

Publication number
CN113660097A
CN113660097ACN202110943572.3ACN202110943572ACN113660097ACN 113660097 ACN113660097 ACN 113660097ACN 202110943572 ACN202110943572 ACN 202110943572ACN 113660097 ACN113660097 ACN 113660097A
Authority
CN
China
Prior art keywords
data
personal
holder
information
associated data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110943572.3A
Other languages
Chinese (zh)
Other versions
CN113660097B (en
Inventor
王志诚
王伟
吴海生
胡嫣洁
肖梅林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by IndividualfiledCriticalIndividual
Priority to CN202110943572.3ApriorityCriticalpatent/CN113660097B/en
Publication of CN113660097ApublicationCriticalpatent/CN113660097A/en
Application grantedgrantedCritical
Publication of CN113660097BpublicationCriticalpatent/CN113660097B/en
Activelegal-statusCriticalCurrent
Anticipated expirationlegal-statusCritical

Links

Images

Classifications

Landscapes

Abstract

The disclosure provides a data flow system, a data flow method and a data flow device based on a block chain. The data transfer system comprises a data transfer device and a server, wherein each data holder of the data transfer device forms a alliance chain network, the data transfer device is configured to acquire personal associated data from each data holder and record use trace information of the personal associated data on a first block chain when the personal associated data in the alliance chain network is used, and the use trace information at least comprises a data user corresponding to the used personal associated data and the data holder; and the server is configured to respond to the personal associated data authorization request of the data requester, forward the personal associated data authorization request to the authorization object, acquire the personal associated data of the authorization object from the data transfer device after the authorization object agrees with authorization, and send the acquired personal associated data to the data requester.

Description

Data flow system based on block chain, data flow method and device
Technical Field
The present disclosure relates to the field of credit investigation technologies, and in particular, to a data flow system, a data flow method, and a data flow device based on a block chain.
Background
With the continuous improvement of the social credit system, personal credit investigation is widely applied to various fields of commercial credit sale, credit transaction, recruitment and job hunting. With the wide application of personal credit, the personal credit is more and more valued, and the personal credit comprises relatively wide and accurate personal characteristic information, so that the personal credit has extremely high market value. For example, for an enterprise, the problem of restricting the marketing of the enterprise due to insufficient consumer information can be solved, thereby helping the enterprise to reach the target customers in the most effective and economic way.
At present, information resources for personal credit investigation are widely distributed in financial institutions, local financing platforms, internet financial institutions and the like, and information can not be shared among the institutions based on compliance and competitive considerations, so that an information island appears. Due to the existing information island, the source of the information acquired by the existing personal credit investigation system is single, the personal credit investigation system is not beneficial to comprehensively evaluating the personal credit investigation, the credit investigation information is relatively blocked, and the authority of the credit investigation system is influenced.
Disclosure of Invention
In view of the foregoing, the present disclosure provides a data streaming system, a data streaming method and an apparatus based on a block chain. In the data transfer system, the data transfer device and each data holder in the data transfer system form a alliance chain network, and the data transfer system can acquire personal associated data from each data holder, so that data sources are expanded, and a single personal associated data source is avoided. In addition, the use trace information used by the personal related data each time is recorded on the first block chain, benefit distribution is facilitated according to the use trace information, the personal related data held by each data holder is commercialized based on the scheme of the disclosure, so that each data holder is maintained in the alliance chain network as a block chain link point to continue providing the personal related data for the data circulation system, and in addition, more data holders are attracted to the alliance chain network in a mode of commercializing the personal related data, so that the source of the personal related data is further widened.
According to one aspect of the present disclosure, there is provided a data flow system based on a block chain, including a data relay device and a server communicably connected to the data relay device, each data holder of the data relay device forming a federation chain network, the data relay device being configured to acquire personal associated data from each data holder and record usage trace information of the personal associated data on a first block chain when the personal associated data in the federation chain network is used, the usage trace information including at least a data user and a data holder corresponding to the used personal associated data; and the server is configured to respond to a personal associated data authorization request of a data requester, forward the personal associated data authorization request to an authorization object, acquire personal associated data of the authorization object from the data transfer device after the authorization object agrees authorization, and send the acquired personal associated data to the data requester.
According to another aspect of the present disclosure, there is also provided a block chain-based data transfer method performed by a data transfer system including a data transfer device and a server communicably connected to the data transfer device, the data transfer device and each data holder forming one alliance chain network, the data transfer method including: responding to a personal associated data authorization request of a data requester, and forwarding the personal associated data authorization request to an authorization object; when the authorization object agrees to authorization, acquiring corresponding personal associated data from each data holder according to the personal characteristic information of the authorization object; sending the personal associated data to the data requester; and generating corresponding use trace information according to the personal associated data and the data requester, and recording the use trace information on a first block chain, wherein the use trace information at least comprises a data user and a data holder corresponding to the personal associated data.
According to another aspect of the present disclosure, there is also provided a block chain-based data transfer device applied to a data transfer system including a data transfer device and a server communicably connected to the data transfer device, the data transfer device and each data holder forming a federation chain network, the data transfer device including: at least one processor, a memory coupled with the at least one processor, and a computer program stored on the memory, the at least one processor executing the computer program to implement: responding to a personal associated data authorization request of a data requester, and forwarding the personal associated data authorization request to an authorization object; when the authorization object agrees to authorization, acquiring corresponding personal associated data from each data holder according to the personal characteristic information of the authorization object; sending the personal associated data to the data requester; and generating corresponding use trace information according to the personal associated data and the data requester, and recording the use trace information on a first block chain, wherein the use trace information at least comprises a data user and a data holder corresponding to the personal associated data.
According to another aspect of the present disclosure, there is also provided a machine-readable storage medium storing a computer program, which when executed by a processor implements any of the data flow methods described above.
According to another aspect of the present disclosure, there is also provided a computer program product comprising a computer program which, when executed by a processor, implements any of the data flow methods described above.
Drawings
A further understanding of the nature and advantages of the present disclosure may be realized by reference to the following drawings. In the drawings, similar components or features may have the same reference numerals.
FIG. 1 shows a schematic diagram of an example environment, in accordance with embodiments of the present disclosure.
Fig. 2 illustrates an example architectural diagram of a network of federated links and personal terminal devices in accordance with an embodiment of the present disclosure.
Fig. 3 shows an example architecture diagram of a network configured by a data flow system including a data relay device and a server, and a federation chain network configured by data holders, and personal terminal devices according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram of an example of a consensus process according to an embodiment of the present disclosure.
FIG. 5 is a diagram illustrating an example of formats of a Pre-prepare message, a prepare message, and an acknowledgement message in a consensus process according to an embodiment of the present disclosure
Fig. 6 shows a flowchart of one example of a block chain based data streaming method according to an embodiment of the present disclosure.
Fig. 7 shows a block diagram of one example of a blockchain-based data streaming apparatus according to an embodiment of the present disclosure.
Fig. 8 shows a block diagram of an electronic device for implementing a blockchain-based data streaming method according to an embodiment of the present disclosure.
Detailed Description
The subject matter described herein will be discussed with reference to example embodiments. It should be understood that these embodiments are discussed only to enable those skilled in the art to better understand and thereby implement the subject matter described herein, and are not intended to limit the scope, applicability, or examples set forth in the claims. Changes may be made in the function and arrangement of elements discussed without departing from the scope of the disclosure. Various examples may omit, substitute, or add various procedures or components as needed. In addition, features described with respect to some examples may also be combined in other examples.
As used herein, the term "include" and its variants mean open-ended terms in the sense of "including, but not limited to. The term "based on" means "based at least in part on". The terms "one embodiment" and "an embodiment" mean "at least one embodiment". The term "another embodiment" means "at least one other embodiment". The terms "first," "second," and the like may refer to different or the same object. Other definitions, whether explicit or implicit, may be included below. The definition of a term is consistent throughout the specification unless the context clearly dictates otherwise.
The block chain is a chain data structure formed by connecting and combining data blocks according to a time sequence, and the data blocks are guaranteed to be not falsifiable and not forged in a cryptographic mode. Each chunk in the chain of chunks is linked to the immediately preceding chunk in the chain of chunks by including a cryptographic hash of the preceding chunk. Each tile also includes a timestamp, a cryptographic hash of the tile, and one or more transactions. Transactions that have been verified by nodes of the blockchain network are hashed and form a Merkle tree. In a Merkle tree, data at leaf nodes is hashed and, for each branch of the Merkle tree, all hash values of the branch are concatenated at the root of the branch. The above process is performed for the Merkle tree up to the root node of the entire Merkle tree. The root node of the Merkle tree stores a hash value representing all the data in the Merkle tree. When a hash value claims to be a transaction stored in the Merkle tree, a quick verification can be performed by determining whether the hash value is consistent with the structure of the Merkle tree.
A blockchain network is a network of computing nodes used to manage, update and maintain one or more blockchain structures. In this specification, a blockchain network may include a public blockchain network, a private blockchain network, or a federated blockchain network.
In a public blockchain network, the consensus process is controlled by nodes of the consensus network. For example, there may be thousands of entity co-processes in a public blockchain network, each entity operating at least one node in the public blockchain network. Thus, a public blockchain network may be considered a public network of participating entities. In some examples, most entities (nodes) must sign each chunk in sequence and add the signed chunk to the blockchain of the blockchain network. An example of a public blockchain network may include a particular peer-to-peer payment network.
The public link network supports public transactions. Public transactions are shared among all nodes within a public-link network and are stored in a global blockchain. A global blockchain refers to a blockchain that is replicated across all nodes. To achieve consensus (e.g., agree to add blocks to a blockchain), a consensus protocol is implemented within the public chain network. Examples of consensus protocols include, but are not limited to: proof of work (POW), proof of rights (POS), and proof of authority (POA).
A private chain network is provided for a particular entity. The read-write authority of each node in the private chain network is strictly controlled. Thus, private chain networks, also commonly referred to as licensed networks, limit who is allowed to participate in the network and the level of network participation (e.g., only in certain transaction scenarios). In private blockchain networks, various types of access control mechanisms may be used (e.g., existing participants voting for adding new entities, regulatory body controlled permissions, etc.).
A federation chain network is private between participating entities. In a federated network, the consensus process is controlled by an authorizing node. For example, a federation consisting of several (e.g., 10) entities (e.g., legacy financial institutions, internet financing platforms, insurance companies) may operate a federation chain network, each entity operating at least one node in the federation chain network. Thus, a federation chain network can be considered a private network of participating entities. In some examples, each participating entity (node) must sign each chunk in sequence and add the chunk to the chain of chunks. In some examples, each tile may be signed by a subset of participating entities (nodes) (e.g., at least 7 entities) and added to the tile chain.
Fig. 1 shows a schematic diagram of anexample environment 100, in accordance with embodiments of the present disclosure. As shown in fig. 1, theexample environment 100 allows entities to participate in ablockchain network 102. Theblockchain network 102 may be, for example, a federation chain network. Theexample environment 100 may includecomputing devices 104, 106, 108, 110, 112 and a network 114. In an embodiment, the Network 114 may include a Local Area Network (LAN), Wide Area Network (WAN), the internet, or a combination thereof, and is connected to websites, user devices (e.g., computing devices), and backend systems. In an embodiment, thecomputing devices 104, 106, 108, 110, 112 may access the network 114 through wired and/or wireless communication.
In some cases, thecomputing devices 106, 108 may be nodes of a cloud computing system (not shown), or eachcomputing device 106, 108 may be a separate cloud computing system, including multiple computers interconnected by a network and operating as a distributed processing system.
In an embodiment, the computing devices 104-108 may run any suitable computing system that enables them to act as nodes in theblockchain network 102. For example, the computing devices 104-108 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones. In an embodiment, the computing devices 104-108 can be affiliated with a related entity and used to implement a corresponding service, which can be used to manage transactions between an entity or entities, for example.
In one embodiment, the computing devices 104-108 respectively store a blockchain ledger corresponding to theblockchain network 102. Thecomputing device 104 may be (or include) a web server for providing browser functionality that may provide visualization information related to theblockchain network 102 based on the network 114. In some cases, thecomputing device 104 may not participate in the blockchain verification, but rather monitor theblockchain network 102 to determine when other nodes (e.g., which may include thecomputing device 106 and 108) agree, and generate a corresponding blockchain visualization user interface accordingly.
In an embodiment,computing devices 110 and 112 may be client devices connected toblockchain network 102. For example,computing device 110 may be a terminal device used by an individual registered at a data streamer, and computing device 112 may be a terminal device at a data holder.Computing devices 110 and 112 may include, but are not limited to, servers, desktop computers, laptops, tablet computing devices, and smartphones.
In an embodiment,computing device 104 may receive a request initiated by a client device (e.g.,computing device 110 or computing device 112) for a blockchain visualization user interface. In some cases, the nodes of theblockchain network 102 may also act as client devices, such that a user of thecomputing device 108 may send the request to thecomputing device 104 using a browser running on thecomputing device 108.
In response to the request,computing device 104 may generate a blockchain visualization user interface (e.g., a web page) based on the stored blockchain ledger and send the generated blockchain visualization user interface to the requesting client device. Ifblockchain network 102 is a private type or a federated type blockchain network, the request for the blockchain visual user interface may include user authorization information, which may be verified by computingdevice 104 before generating and sending the blockchain visual user interface to the requesting client device, and the corresponding blockchain visual user interface returned after verification.
The blockchain visualization user interface may be displayed on the client device (e.g., as may be displayed inuser interface 116 shown in fig. 1). When the blockchain ledger is updated, the display content of theuser interface 116 may be updated accordingly. Further, user interaction withuser interface 116 may result in requests to other user interfaces, such as a search results page that displays a block list, block details, transaction list, transaction details, account list, account details, contract list, contract details, or results of a user conducting a search of the block chain network, and so forth.
In the present disclosure, the data relay device and each data holder in the data circulation system may form a network of a federation chain. In the alliance-link network, the data relay device and each data holder can be respectively used as a blockchain node or a component thereof. A data relay device is communicably connected to any two of the data holders.
Fig. 2 illustrates an example architectural diagram of anetwork 200 of federated links and personal terminal devices in accordance with an embodiment of the present disclosure.
The data flow system provided by the present disclosure may be applied to a data flow authority configured to operate the data flow system, so that the data flow authority may serve as a blockchain node in a federation chain network or a component thereof.
In one example, the data relay mechanism may be a data relay mechanism of a third party, and respectively connect the data holder and the data requester. The data flow mechanism can flow the data in real time, for example, when the data requester requests the data, the data flow mechanism can obtain the requested data from the data holder in real time and then forward the obtained data to the data requester after processing. In addition, the data circulation mechanism can store the data acquired from the data holder, so that when the data requester requests the data, the data circulation mechanism can acquire the requested data from the stored data and then forward the acquired data to the data requester. The data circulation mechanism in the disclosure can be an authorized legal mechanism capable of storing, circulating and the like data, the data which can be processed by the data circulation mechanism can comprise private data and core data, and the data circulation mechanism can effectively protect the private data and the core data.
As shown in fig. 2, the data flow mechanism 210 is a block chain node or a component thereof in thefederation chain network 214, and of course, the role played by the data flow mechanism 210 in thefederation chain network 214 is realized by a device or apparatus in the data flow system operated by the data flow mechanism 210. Aterminal device 230 of an individual, who may be registered and authenticated at the data streamer 210, may be communicatively coupled to the data streamer. The data streaming mechanism 210 shown in fig. 2 is connected to the personalterminal device 230 as an example, and the data streaming mechanism 210 may also be connected to a plurality of other registered personalterminal devices 230 in a communication manner.
In one example, a front-end APP of the data streamer 210 may be installed and run on theterminal device 230 of an individual, and the individual who has registered may directly log in through the APP, or an individual who has not registered may register on the APP and then authenticate the registration information by a server at the back end, and the authentication is successful, that is, the registration is successful, and after the registration is successful, the individual may log in on the APP on theterminal device 230.
After the individual logs in the APP, the individual establishes a connection with the data transfer mechanism 210 through theterminal device 230 and the server. The individual can perform operations such as data request, authorization, right confirmation, credit investigation, asset management and the like on the APP, and the server responds to the operation of the individual on the APP and executes corresponding processing.
Each data holder 220 may also be a blockchain node or component thereof, respectively, infederation chain network 214. Of course, the role played by each data holder 220 infederation chain network 214 may be implemented by a device or apparatus operated by each data holder 220.
Further, the data streamer 210 can be communicatively coupled to each data holder 220 in thefederation chain network 214, and the data streamer 210 can receive credit solicitation requests from each data holder 220. In addition, the data streamer 210 can be communicatively coupled with other third party entities such that the data streamer 210 can receive data requests from other third party entities.
In the alliance-link network, the data flow mechanism can be used as an authority party to authenticate a data holder which joins the alliance-link network, and the data flow mechanism is allowed to join the alliance-link network only under the condition that the authentication is passed.
In one example, the data streamer may be a personal credit reporting agency that is used to engage in collecting, organizing, processing and analyzing business and personal credit information material, providing credit reports, providing diverse credit reporting services, assisting customers in determining and controlling credit risk, and the like.
In the present disclosure, the data holder may be an organization, a company, a business, or the like that holds a large amount of personal-related data, and the personal-related data held by the data holder may be derived from data generated by an organization operation, a business activity, or the like. In the present disclosure, the data holder may include an internet enterprise operating based on the internet, and the internet enterprise in the data holder may relate to the fields of finance, communication, transportation, and the like. Further, the data holders may also include non-internet businesses that relate to areas of finance, communications, transportation, etc., and in one example, the non-internet businesses in the data holders may include traditional businesses or institutions that have government endorsements.
Taking the financial field as an example, the data holder may include a new internet financial institution such as a financial enterprise and a financing platform based on the internet, and may further include a traditional financial institution of government endorsements such as a bank, a security and a local financing platform. The business scope of the internet financial institution can cover a large number of financial activities in the folk, such as small loan activities performed by individuals through the internet financial institution, and the like. Because a large amount of civil financial activities are implemented through the Internet financial institutions, the traditional financial institutions cannot master the personal associated data of the part of business activities, and the scheme disclosed by the invention expands the source of the personal associated data by adding the novel Internet financial institutions into the alliance chain network as a data holder. When the data circulation mechanism is an individual credit investigation mechanism, the source of the individual associated data is expanded, so that the individual credit investigation evaluation performed by the individual credit investigation mechanism is more comprehensive and more accurate.
The data circulation system of data circulation mechanism operation includes data transfer device and with the server of this data transfer device communicative connection, this server can provide service for data circulation mechanism's front end APP.
Fig. 3 shows an exemplary architecture diagram of anetwork 300 configured by a data flow system including a data relay device and a server and a federation chain network configured by data holders and personal terminal devices according to an embodiment of the present disclosure.
As shown in fig. 3, a server in the data streaming system is communicably connected to a terminal device of an individual. The data transfer device can be used as a blockchain node in the alliance chain network or a component thereof to realize various functions of the blockchain node.
The data relay device is configured to obtain personal associated data from each data holder, and the obtained personal associated data can be stored locally, and can also be authorized to be used by a third party and used for personal credit investigation and the like.
In the present disclosure, the personal association data corresponds to individuals, and the personal association data of each individual may include all data associated with the individual, such as financial asset data of loan, bank deposit, real estate, equity, and the like, and data of travel records, flight records, and the like. In one example, the personal association data for an individual may include a specified type of data associated with the individual, e.g., the specified type of data is financial asset data, and the personal association data for the individual includes only financial asset data associated with the individual.
In one example, the personal association data may be classified into four categories by privacy level. The first type is absolute privacy data, and the first type is data unique to an individual, such as a human body characteristic, an identification number, and the like. The second type is structured cross-recognition data, which is data that can be obtained by structured recognition of individual features, such as addresses, work units, etc. The third type is association data, which is data that an individual shares or associates with other individuals or institutions, such as transactional data, social data, and the like. A fourth type is public data that includes data that has been fully disclosed or partially disclosed and data that has been derived based on the partial disclosure, such as data disclosed by a governmental agency.
In this example, the first type of data and the second type of data belong to private data for which desensitization is required before reuse. For the third type of data, the disclosed data can be used directly, and the data containing the private information needs to be desensitized and then reused. For the fourth type of data, it can be used directly.
In one example, the personal association data for each individual may be divided into personal asset data and personal liability data. Personal asset data may be data associated with positive assets capable of generating revenue for an individual, such as asset data for deposits, real estate, equity, and the like. Personal liability data may be data associated with negative assets output for the benefit of an individual, such as, for example, house credits, car credits, leases, and the like. In one example, the more personal asset data that an individual is associated with, indicating that the more positive assets an individual is, the better the individual credit accordingly. The more personal liability data an individual is associated with, indicating that the more liability an individual is, the correspondingly worse the individual credit.
In one example, when a person is associated with a corporate body such as a business, company, store, etc., then the person may be associated with business information for the corporate body. At this time, the individual-related data of the individual may include individual-subject-related data and legal-subject-related data of the individual. In this example, with respect to a person, it is possible to divide into a person subject and a legal subject associated with the person subject, the person subject being a natural person as a rights subject. For example, the loan subject of the Zhang III loan is Zhang III which is the subject of the individual, and the loan subject of the Zhang III related company loan is the company which is the subject of the legal. In this example, the personal-subject-associated data is data directly associated with the personal subject, and the legal-subject-associated data is data directly associated with a legal subject, which is in turn directly associated with the corresponding personal subject.
Further, the personal subject associated data may also include personal asset data and personal liability data. The data related to the legal main body can comprise data such as transaction amount, transaction activity, operation stability, operation growth capacity, regional environment and the like directly related to the legal main body.
In one manner of the data relay device acquiring the personal associated data, the data relay device may broadcast a personal associated data acquisition request, which may include summary information of the personal associated data requested by the data relay device, to each data holder in the federation chain network.
In the disclosure, the summary information of the personal related data may be obtained after the personal related data is subjected to data weight reduction processing, the summary information of each piece of personal related data corresponds to the personal related data one to one, the summary information may be key feature information in the corresponding personal related data, and the summary information may reflect data features of the corresponding personal related data. For example, one piece of personal association data is one piece of loan record data for Zhang three, the data comprises name, identification number, real estate certificate, loan amount, interest, loan time, repayment time and the like of Zhang three, and the summary information of the personal association data can be the identification number, so that the piece of loan record data for Zhang three can be inquired through the identification number of Zhang three.
After receiving the personal associated data acquisition request, each data holder may acquire summary information from the received personal associated data request, acquire personal associated data corresponding to the summary information from data held by the data holder, and then send the acquired personal associated data to the data relay device.
Further, the data transfer device may broadcast the responded request to each data holder in the alliance-link network in response to any one of a credit investigation request, a personal associated data authorization request, a data verification request, a data acquisition request, and the like. The request responded by the data relay device may come from a server in the data flow system, and the request responded by the data relay device may include summary information of the requested personal associated data. After receiving the request, each data holder may send the personal associated data corresponding to the summary information in the request to the data relay device. Thus, the data relay device can acquire the requested personal associated data in real time in response to the request.
In another manner of obtaining, the data circulation system may further include a first database, where the first database is used to store the personal association data obtained by the data transfer device from each data holder. In one example, all of the personal association data held by the respective data holders may be stored in the first database. In another example, the first database may store a portion of the personal association data held by the respective data holders. In this example, after acquiring the personal related data of each data holder, the data relay device may perform a weight reduction process on the acquired personal related data, for example, may delete unnecessary data in the personal related data, or may perform a weight reduction process on the personal related data. Through data lightweight processing, the data volume of data stored in the first database is reduced, and therefore the storage space of the first database is saved.
In an example of the above-mentioned obtaining manner, when each data holder obtains new personal related data, the obtained new personal related data may be sent to the data relay device, and then the data relay device stores the received personal related data in the first database.
In another example of the above-mentioned obtaining manner, the data relay device broadcasts the personal related data obtaining request in the alliance-link network at specified time intervals, and each data holder receiving the personal related data obtaining request may send the personal related data which is not provided to the data relay device. In this example, each data holder may determine whether the personal related data has been provided to the data relay device by means of a flag, for example, each data holder may flag the personal related data that has been provided to the data relay device, and the non-flagged personal related data is the personal related data that has not been provided to the data relay device. In addition, each data holder may determine personal-related data acquired in a time period between the currently received personal-related data acquisition request and the personal-related data acquisition request received last time next to the currently received personal-related data acquisition request as personal-related data that is not provided to the data relay device.
In another manner of obtaining, the data flow system may further include a second database, where the second database is used to store a corresponding relationship between each data holder and summary information of personal association data held by the data holder.
When the data relay device receives any one of a credit investigation request, a personal associated data authorization request, a data verification request, a data acquisition request, and the like, the request received by the data relay device may include summary information corresponding to the requested personal associated data. At this time, the data relay apparatus may determine, in response to the received request, a data holder corresponding to the summary information in the request from the second database, and then acquire the corresponding personal related data from the determined data holder. In one example, the data relay device may actively request the personal associated data corresponding to the summary information from the determined data holder.
Furthermore, the data relay device may be further configured to record usage trace information of the personal associated data on the first blockchain when the personal associated data in the alliance chain network is used.
In the present disclosure, the personal association data in the federation chain network may include personal association data held by any data holder in the federation chain network. The case where the personal related data is used may include any one of the following cases: the personal associated data is used for personal credit, the personal associated data is used for authorization, the personal associated data is used for data verification, the personal associated data is requested to be used by another party, and the like.
In the present disclosure, the usage trace information of the personal related data may include at least a data using party and a data holding party corresponding to the personal related data, the data using party being a party using the personal related data, and the data holding party being a party holding ownership of the personal related data. In addition, the usage trace information may also include an individual corresponding to the individual-related data, a time when the individual-related data was used, summary information of the individual-related data, and the like. The person corresponding to the personal related data is the object for which the personal related data is directed, for example, if a person corresponding to a group of loan data is three-year, the loan data is related data of a three-year loan.
The use trace information of the personal associated data when the personal associated data is used each time is recorded on the first block chain through the data transfer device, and based on the characteristic that the block chain is not tampered, the data transfer system is convenient to distribute benefits according to the use trace information recorded on the first block chain, for example, a reward is given to a data holder. The personal associated data held by each data holder is commercialized in such a way that each data holder is maintained in the alliance chain network as a block chain link point to continue providing the personal associated data for the data flow system, and in addition, the personal associated data is commercialized in a way of attracting more data holders to join the alliance chain network, thereby widening the source of the personal associated data.
In the process that the data transfer device records the usage trace information on the first blockchain, the data transfer device can serve as an accounting node to pack the usage trace information to be linked into blocks, and the blocks can include the usage trace information and corresponding hash values. Then, the data relay device broadcasts the block to a consensus node in the alliance-link network for consensus processing, and after the consensus node achieves consensus, the data relay device can record the block on the first blockchain.
Fig. 4 shows a schematic diagram of an example of a consensus process according to an embodiment of the present disclosure. In this disclosure, the usage trace information and corresponding hash values may be considered transaction data in the first blockchain. In the example of fig. 4, the block link point where the data relay device is located serves as a master node (i.e., accounting node, hereinafter referred to as master node R0) of the block chain network.
The master node R0 broadcasts the packaged tiles to all consensus nodes in the blockchain network for consensus processing, for example, the master node R0 broadcasts the packaged tiles to the backup nodes R1, R2, and R3 for consensus processing. Note that the consensus process is shown as including 4 network nodes R0, R1, R2, and R3 for illustrative purposes only, and the consensus process may include any suitable number of network nodes.
In the embodiments of the present disclosure, the consensus process may be implemented using PoW (workload proof algorithm), PoS (equity proof algorithm), PBFT (practical byzantine fault-tolerant algorithm), and the like. The following description will be made by taking the PBFT consensus process as an example.
As shown in fig. 4, the procedure of the PBFT consensus process includes: a Pre-preparation phase (Pre-preparation) 410, a preparation phase (preparation) 420, and a validation phase (Commit) 430.
Specifically, at 410, the master node R0 packages usage trace information to be recorded into the first block chain into a message m, then generates a Pre-prepare message Pre-prepare, and sends (e.g., broadcasts) the Pre-prepare message Pre-prepare to the backup nodes R1, R2, and R3 within a given time interval. The Pre-prepare message Pre-prepare indicates that master node R0 is initiating the consensus process.
In an embodiment of the present disclosure, as shown in fig. 5, the format of the Pre-preparation message Pre-preparation may be: < PRE-PREPARE, epoch, seq, D (m), signature-p >, m, j >. Here, "PRE-PREPARE" denotes a protocol identification of the PRE-prepared message, "epoch" denotes an age of R0 as a master node, "seq" denotes a proposal number of a proposal of required consensus (i.e., adding the block to the block chain 216), "d (m)" denotes a digest of a request message set, "signature-p" denotes a signature of R0, "m" denotes a specific content of the request message (i.e., a specific content of each piece of authentication information in the block), and "j" denotes a node identification of R0. Here, d (m) is obtained by performing a hash calculation on each authentication information set in the block.
In thepreparation stage 420, for each backup node (R1, R2, or R3), after receiving the Pre-preparation message Pre-preparation and detecting that the Pre-preparation message Pre-preparation is legitimate, the Pre-preparation message Pre-preparation may be stored in a local log, and a preparation message preparation for responding to the Pre-preparation message Pre-preparation may be generated and then broadcast to other nodes. The Prepare message Prepare indicates that the backup node has received the Pre-Prepare message Pre-Prepare from the primary node and is sending a reply in response to the Pre-Prepare message Pre-Prepare.
Accordingly, each backup node will also receive the prepare message Pre-prepare sent by the other backup nodes. Taking backup node R1 as an example, after receiving the Prepare message Pre-Prepare sent by master node R0, backup node R1 broadcasts the generated Prepare message Pre-Prepare to master node R0, backup nodes R2, and R3. Accordingly, backup node R1 also receives Prepare message Prepare sent by primary node R0, backup nodes R2 and R3.
In the present disclosure, the Prepare message Prepare broadcast by the backup node may be used to indicate the consensus commitment made by the backup node during thePrepare phase 420.
In this specification, as shown in fig. 5, the format of the preparation message Prepare may be: < PREPARE, epoch, seq, D (m), i, signature-i >. Here, "PREPARE" denotes a protocol identification of the preparation message PREPARE, "i" denotes a node identification of the node that transmitted the preparation message PREPARE, and "signature-i" denotes a signature of the node that transmitted the preparation message PREPARE. The meaning of "epoch", "seq", and "d (m)" in the preparation message Prepare is the same as that of "epoch", "seq", and "d (m)" in the above-described preparation message Pre-Prepare.
In theacknowledgement phase 430, when a network node receives a sufficient number of preparation messages Prepare from other network nodes, the network node determines that consensus has been reached. For example, if the primary node R0 or backup nodes R1, R2, or R3 receive qurum (e.g., 2f +1, where f represents the number of failed network nodes) Prepare messages Prepare, it is determined that consensus is achieved between the network nodes. The master node R0 or the backup node R1, R2 or R3 then broadcasts an acknowledgement message Commit to the other nodes.
In this specification, as shown in fig. 5, the format of the acknowledgment message Commit may be: < COMMIT, epoch, seq, D (m), p, signature-p >. Wherein "COMMIT" represents a protocol identification of the acknowledgment message COMMIT, "p" represents a node identification of a node that transmits the acknowledgment message COMMIT, and "signature-p" represents a signature of the node that transmits the acknowledgment message COMMIT. The meaning of "epoch", "seq" and "d (m)" in the acknowledgment message Commit is the same as that of "epoch", "seq" and "d (m)" in the aforementioned Pre-preparation message Pre-preparation.
In this description, a node sends a confirmation message Commit and stores the confirmation message Commit in a local log to represent consensus commitments made by the node during theconfirmation phase 430.
After reaching consensus for the initiated proposal as above, the master node records the chunk into the blockchain, thereby completing the recording of the usage footprint information and the corresponding hash value into the blockchain.
In an example of the present disclosure, the data relay device may be further configured to record summary information of each personal associated data held by each data holder in the federation chain network and an identifier of the data holder on the second blockchain in a corresponding manner.
In this example, the second blockchain may be different from the first blockchain. In the process that the data relay device records the summary information and the corresponding identifier of the data holder on the second blockchain, the data relay device may serve as an accounting node, and packages the summary information to be linked and the corresponding identifier of the data holder into a block, where the block may include the summary information, the corresponding first hash value and identifier, and the corresponding second hash value. Then, the data relay device may broadcast the block to a consensus node in the alliance-link network for consensus processing, and after the consensus node achieves consensus, the data relay device may record the block on the second blockchain.
In this example, the summary information recorded on the second blockchain corresponds to the identities of the data holders, and each summary information corresponds to one identity of the data holder. By recording the summary information of the personal associated data held by each data holder on the second blockchain, all data holders in the alliance chain network and the data circulation mechanism can conveniently inquire the summary information on the second blockchain, so that the types of the personal associated data held by each other are known among the data holders. When the data circulation system or any data holder needs to request the personal associated data, the data holder holding the requested personal associated data can be determined according to the summary information and the corresponding identification recorded on the second block chain, and then the personal associated data can be directly requested to the determined data holder through the data circulation system. By means of the method, the data holders holding the needed personal associated data are determined from the multiple data holders in a targeted mode, and the acquisition efficiency of the personal associated data is improved.
In one example, when the summary information includes the privacy information, desensitization processing may be performed on the privacy information in the summary information to hide the privacy information, thereby avoiding privacy disclosure. In one example, the desensitization process may be performed by performing a partial confusion replacement process on the private information such as name, identification number, address, etc., for example, replacing a part of the private information with a designated code, number, symbol, etc. For example, when the digest information includes the identification number, the first 4 bits and the last 4 bits of the identification number may be reserved, and other numbers are replaced with symbols, so that the identification number may be hidden, thereby preventing the identification number from being leaked. In this example, since the private information in the summary information is incomplete, the data streaming system or the data holder requesting the personal related data may determine the corresponding summary information from the second blockchain in a fuzzy matching manner, that is, the requested personal related data matches with the information that is not hidden in the determined summary information. Then, the data holders actually holding the requested personal related data are further screened out from the identified data holders.
In the present disclosure, the server may receive a personal associated data authorization request from a data requesting party, and the received personal associated data authorization request may include personal characteristic information of an authorization object that is a person corresponding to personal associated data to be authorized. For example, if the personal related data of person a includes data such as deposit, real estate, stock, and loan of a, the authorization object at this time is a, and the person corresponding to the personal related data is also a.
In one example, the personal related data authorization request can also request the use information of the requested personal related data, and the use information can be used for determining the use range of the authorized personal related data, and after the data requester obtains authorization, the data requester can only use the personal related data within the use range indicated by the use information.
Further, in one example, the personal association data authorization request may include an authorization request form, which may include information such as authorized person information, authorization items, usage information, authorization terms, responsibility arrangements, consent statements, and signatures. The information of the authorized person may be information of a data requesting party.
After receiving the personal associated data authorization request, the server responds to the personal associated data authorization request, forwards the personal associated data authorization request to an authorization object, and determines whether to grant authorization or not by the authorization object. If the authorization object does not agree with the authorization, the information of not agreeing with the authorization is fed back to the server, and the server transfers the information to the data request party to inform the data request party that the authorization is not obtained. If the authorization object agrees with the authorization, information on the agreement is fed back to the server, and in one example, the information on the agreement may include a personal association data certificate signed by the authorization object.
After obtaining the authorization of the authorization object, the server may obtain the personal association data of the authorization object from the data relay device or the first database. Specifically, in one example, where the data flow system includes a first database, the server may obtain the personal association data of the authorization object directly from the first database. In another example, in a case where the server directly acquires the personal-related data of the authorized object from the data relay device, the server sends a request including summary information of the personal-related data to be acquired to the data relay device, and the data relay device may acquire the personal-related data of the authorized object by broadcasting in the alliance-link network, and may also acquire the personal-related data of the authorized object by using the second database.
After obtaining the personal associated data of the authorized object, the server may send the obtained personal associated data to the data requesting party to complete authorization. In one example, the server may authorize the acquired personal related data to the data requesting party within the usage range determined by the usage information, so that the usage range of the authorized personal related data may be limited, thereby avoiding misuse of the personal related data.
In one example, after the authorization request of the data requester is granted, the personal associated data of the authorization object may be used, and at this time, the data transfer device may record the use trace information of the personal associated data of the authorization object on the first block chain.
Specifically, after the data transfer system completes authorization, the server may further determine information of an authorization object from personal associated data authorized to the data requester, for example, if the authorized personal associated data is financial asset data for a person a, the personal associated data includes personal characteristic information such as a name and an identification number of the person a, and it may be determined from the personal associated data that the authorization object is a, and the personal characteristic information of the person a may be obtained.
In addition, the server can also determine a data holder of the personal associated data according to the authorized personal associated data, and the data holder holds the ownership of the authorized personal associated data. In one example, when the server acquires the personal related data from the first database, the first database records data holder information corresponding to the personal related data, and the server may determine, from the data holder information recorded in the first database, a data holder corresponding to the authorized personal related data. In another example, when the server receives the personal related data from the data relay apparatus, the data relay apparatus may transmit information of a data holder that transmits the authorized personal related data to the server, and thereby the server may determine the authorized data holder of the personal related data.
After determining the authorization object and the data holder corresponding to the authorized personal related data, the server may generate the usage trace information for the authorized personal related data according to the determined authorization object, the determined data holder and the determined data requester. The generated usage footprint information may include the authorization object, the data holder, and the data requestor. Then, the server sends the generated usage trace information to the data relay device, and the data relay device records the received usage trace information on the first block chain.
In one example, the usage trace information may also include usage information for personally associated data authorized for use.
In one example, the server can also perform benefit distribution for the authorized object and the data holder according to the use trace information of the personal associated data recorded on the first blockchain. Such as awarding points, money, etc. In addition, the server may charge the data requestor a corresponding data usage fee for payment to the authorized object and the data holder. Wherein, the distribution rule and the fee charging rule of the reward can be negotiated and decided by the data circulation system and each data holder in the alliance chain network.
In one example of the disclosure, the server may be configured to, in response to a credit investigation request of a personal credit investigation requester, acquire corresponding personal associated data according to personal characteristic information of a credit investigation object in the credit investigation request, perform credit investigation processing on the acquired personal associated data to obtain personal credit investigation information, and send the obtained personal credit investigation information to the personal credit investigation requester.
The individual credit investigation requesting party can be any data holding party in the alliance chain network, and can also be any third party. The credit investigation request sent by the individual credit investigation requester can include the individual characteristic information of the credit investigation object, such as name, identification card number, face characteristics, and the like. The personal characteristic information of the credit investigation object is the same as or matches with the summary information of the corresponding personal associated data, for example, the summary information of each personal associated data includes a name and an identification number, and the personal characteristic information in the credit investigation request also includes the name and the identification number.
The credit investigation processing can comprise the processes of integrating, removing duplicate, extracting, classifying and the like of the personal associated data. Data integration is the integration of all personal associated data obtained from various data holders. The data deduplication is to delete the repeated personal associated data in the integrated personal associated data to reduce the personal associated data. The data extraction is to extract personal related data of a specified type from the personal related data, for example, if the specified type of data is financial asset data, the financial asset data is extracted from the acquired personal related data to be used for personal credit. The data classification is that the personal associated data of the credit investigation object can be divided into personal asset data and personal liability data according to requirements, or the personal subject associated data of the credit investigation object and the personal associated legal subject associated data.
In one example, when the data circulation system further includes a first database for storing personal related data acquired by the data relay device from each data holder, the server may further acquire personal related data associated with the personal characteristic information from the first database according to the personal characteristic information of the authorization object. Specifically, the server matches the personal characteristic information with personal associated data in a first database, and determines personal associated data matched with the personal characteristic information as personal associated data associated with the personal characteristic information.
In another example, the server may forward the credit investigation request to the data relay device, and the data relay device obtains the corresponding personal associated data from each data holder in real time according to the credit investigation request. Specifically, in one example, the data relay device may broadcast the credit investigation request to each data holder, and the data holder holding the personal related data associated with the personal characteristic information in the credit investigation request may transmit the corresponding personal related data to the data relay device. In another example, when the data circulation system further includes a second database, the data transfer device may determine, from the second database, a data holder corresponding to the summary information matching the personal characteristic information in the credit investigation request, and may then acquire corresponding personal association data from the determined data holder.
After the data relay device acquires the personal related data, the data relay device may send the acquired personal related data to the server. And after receiving the personal associated data acquired by the data transfer device from the data transfer device, the server performs credit investigation processing on the received personal associated data to obtain personal credit investigation information.
In one example, during credit investigation processing of the personal associated data, the server may classify the personal associated data of each credit investigation object into two categories of personal asset data and personal liability data, and then sort the classified personal asset data and personal liability data from the two dimensions of the horizontal dimension and the vertical dimension respectively.
Specifically, for the personal asset data of each credit investigation object, the data categories related to the personal asset data can be counted from the horizontal dimension, and the personal asset data can be sorted according to each data category counted. Through data sorting in the transverse dimension, the data type related to the personal asset data of the credit investigation object can be obtained, so that the field related to the personal asset data can be known, personal credit investigation is carried out on the basis of personal related data of a wide and different related fields, and the comprehensiveness of personal credit investigation is improved.
In addition, for the personal asset data of each credit investigation object, deep mining and sorting can be performed on the personal asset data of each data type from the longitudinal dimension, and the relevance among the personal asset data belonging to the same data type is mined, so that the relevance among the personal asset data can be reflected more deeply, the personal credit investigation information of the credit investigation object can be reflected more accurately, and the accuracy of personal credit investigation is improved.
Accordingly, the personal liability data of each credit investigation object can be sorted from the transverse dimension, and the liability condition of the credit investigation object can be known more widely and comprehensively. Personal liability data can be sorted from the longitudinal dimension, and relevance among the personal liability data is mined, so that liability conditions which are not easy to find are reflected. The comprehensiveness and the accuracy of personal credit investigation are improved through data arrangement of the transverse dimension and the longitudinal dimension.
In an example of the present disclosure, the data circulation system may further include a data verification device for performing data verification through a data verification interface provided by the government functional department, and the data verification device may be communicably connected to the data relay device and the server, respectively.
In this example, the government functional departments may include police, tax, industry and business, social security department, public deposit department, education department, academic record certification center, and the like, each of the government functional departments provides the data verification apparatus with a data verification interface, and different government functional departments correspond to different data verification interfaces. The data verification device can provide the data to be verified to the corresponding government functional department through the data verification interface, the government functional department verifies the data, and the data verification result is fed back to the data verification device through the data verification interface.
In this example, any party in the federation chain network (including the various data holders and the data staging devices in the data flow system) may question the correctness of any individual associated data in the federation chain network. For example, data holder E and data holder F in the federation chain network both hold personal association data for person a, where the identity number of a in the personal association data held by data holder E is different from the identity number of a in the personal association data held by data holder F, then data holder E may challenge the personal association data in data holder F at this time.
For another example, the data relay device may verify the acquired personal related data after acquiring the personal related data for the same person, and if there is a difference in records for the same information in the personal related data, the data relay device may question the correctness of the personal related data.
When a challenge is raised for personal associated data, any data holder or data transfer device in the alliance chain network can initiate a data verification request and send the initiated data verification request to the data verification device. The data verification request may include personal associated data to be verified and a data holder corresponding to each piece of personal associated data.
And the data verification device responds to the data verification request, acquires the personal associated data to be verified from the data verification request, and provides the personal associated data to be verified to the corresponding government functional department through the data verification interface so as to verify the data. After the government functional department completes the data verification, the data can also be fed back to the data verification device through the corresponding data verification interface. The data verification device may send the verification result to the data relay device. The data relay device may broadcast the verification results to the respective data holders. When the verification result indicates that the verified personal associated data is correct, each data holder can confirm the correctness of the verified personal associated data in a strengthened mode, and when the verification result indicates that the verified personal associated data is wrong, the data holder holding the personal associated data can correct the personal associated data conveniently.
In one example, when the verification result indicates that the verified personal associated data is faulty, the data verification apparatus may further send a verification result to the server, where the verification result includes the party initiating the data verification request, the verified personal associated data, and the corresponding data holder. After receiving the verification result, the server may determine, from the verification result, a party initiating the data verification request, the verified personal associated data, and a corresponding data holder. And then, the server generates data verification information corresponding to the personal associated data according to the determined party initiating the data verification request and the data holder corresponding to the personal associated data verified to be wrong, and sends the generated data verification information to the data transfer device, and the data transfer device records the received data verification information on the first block chain.
In one example, when the party initiating the data verification request is a data relay device in the data flow system, since the data flow system does not need to be rewarded as a rule maker, the server may generate the data verification information for the personal associated data only according to the data holder corresponding to the personal associated data verified to be incorrect. At this time, only the data holder is included in the data verification information.
Through the two examples, the data circulation system may determine the reward punishment object according to the data verification information recorded on the first block chain, when the verification result indicates that the verified personal associated data is wrong, the party initiating the data verification request is the party being rewarded, and the data holder holding the personal associated data verified to be wrong is the party being punished. Through the reward and punishment mechanism, all parties in the alliance chain network can be effectively stimulated to verify the personal associated data, and therefore errors of the personal associated data in the alliance chain network are reduced.
In an example of the present disclosure, the server may be further configured to acquire the personal association data of the authorized object from the data relay apparatus or the first database. Specifically, in one example, where the data flow system includes a first database, the server may obtain the personal association data of the authorization object directly from the first database. In another example, in a case where the server directly acquires the personal-related data of the authorization object from the data relay device, the server may send a request including summary information of the personal-related data to be acquired to the data relay device, and the data relay device may acquire the personal-related data of the authorization object by broadcasting in the alliance-link network, and may also acquire the personal-related data of the authorization object by using the second database.
After the server acquires the personal associated data of the authorized object, desensitization processing can be performed on the acquired personal associated data. In one example, the manner of desensitization processing may be a partial aliasing replacement process. For example, the name "zhang san" in the personal association data is desensitized, and one word in the name is replaced with a symbol, and the replaced name is "zhang. In another example, the desensitization process may remove all private information in the personal-associated data, leaving only non-private information.
After the server completes desensitization processing on the personal associated data, the desensitized personal associated data can be sent to the data requester. In one example, the server may encrypt the desensitized personal associated data before sending the personal associated data, and then send the encrypted personal associated data to the data requester.
In one example, after obtaining the personal associated data of the authorized object, the server may determine a privacy level to which the personal associated data belongs, and when the personal associated data belongs to the first class or the second class, desensitization processing needs to be performed on the personal associated data. And when the personal associated data belongs to the third class, further judging whether the personal associated data contains the privacy information, if so, performing desensitization processing on the contained privacy information, and if not, directly sending the data to a data requester. When the personal associated data belongs to the fourth class, the personal associated data may be directly transmitted to the data requester.
In one example, when the server obtains the personal associated data of the authorization object, it may further determine a data holder corresponding to the personal associated data of the authorization object, and the determined data holder holds ownership of the personal associated data of the authorization object. In one example, when the server obtains the personal associated data from the first database, the server may determine the data holder corresponding to the personal associated data of the authorized object from the data holder information recorded in the first database. In another example, when the server receives the personal related data from the data relay device, the data relay device may transmit information of the data holder corresponding to the personal related data of the authorization object to the server, and thus, the server may determine the data holder corresponding to the personal related data of the authorization object.
After the data holder is determined, the server may generate usage trace information for the requested personal related data according to the determined data holder and the determined data requester, and send the generated usage trace information to the data relay device. The data relay device records the received usage trace information on the first block chain.
The data transfer device records the use trace information aiming at the data acquisition request on the first block chain, so that the data transfer system can conveniently distribute benefits for the data holder according to the use trace information recorded on the first block chain, and in addition, the data transfer system can also charge corresponding fees for the data requester to be paid to the data holder. The source of the personal associated data is expanded by attracting more data holders to join the alliance chain network in a charging and data profit providing mode.
Fig. 6 illustrates a flow diagram of one example 600 of a blockchain-based data streaming method in accordance with an embodiment of the present disclosure.
The data transfer method shown in fig. 6 may be performed by a data transfer system including a data transfer device and a server communicably connected to the data transfer device, where the data transfer device and each data holder form a federation chain network.
As shown in fig. 6, at 610, a personal associated data authorization request is forwarded to an authorization object in response to the personal associated data authorization request of the data requestor.
At 620, corresponding personal association data from each data holder is obtained based on the personal characteristic information of the authorized subject when the authorized subject agrees to authorization.
At 630, the personal association data is sent to the data requestor.
At 640, corresponding usage footprint information is generated from the personal association data and the data requestor and recorded on the first blockchain. The use trace information at least comprises a data user and a data holder corresponding to the personal associated data.
In an example, the corresponding personal related data may also be obtained from the first database according to the personal characteristic information of the authorized object, where the first database in the data flow system is used to store the personal related data obtained by the data transfer device from each data holder.
In one example, in response to a personal associated data authorization request sent by a server, a data holder corresponding to summary information matched with personal characteristic information of an authorization object is determined from a second database, and corresponding personal associated data is obtained from the determined data holder; and a server configured to receive the acquired personal related data from the data relay apparatus. The second database in the data circulation system is used for storing the corresponding relation between each data holder and the summary information of the personal association data held by the data holder.
In one example, the acquired personal associated data may also be authorized to the data requestor within the usage scope determined by the usage information. Wherein the usage information is included in the personal associated data authorization request and in the usage trace information.
In one example, an authorization object and a corresponding data holder can be determined according to authorized personal associated data, and usage trace information for the personal associated data is generated according to the determined authorization object, the data holder and the data requester; and the data transfer device is configured to record the use trace information generated by the server in the first block chain.
In one example, benefit distribution can be performed for the authorization object, the data holder and the data requester according to the use trace information of the personal associated data recorded on the first block chain.
In one example, in response to a data verification request initiated by any data holder or data transfer device in the alliance chain network, the personal associated data to be verified is provided to the corresponding government functional department through the data verification interface for data verification, and a verification result is obtained from the government functional department.
In one example, the personal associated data of the authorized object is acquired from the data relay device or the first database, desensitization processing is performed on the acquired personal associated data, and the desensitized personal associated data is sent to the data requester.
In one example, the summary information of the personal associated data held by each data holder and the identification of the data holder can be correspondingly recorded on the second block chain.
Fig. 7 shows a block diagram of an example of a blockchain-based data streamer 700, according to an embodiment of the present disclosure.
The data transfer device 700 shown in fig. 7 is applied to a data transfer system including a data transfer device and a server communicably connected to the data transfer device, and the data transfer device and each data holder form a federation chain network.
As shown in fig. 7, the data streaming apparatus 700 includes an authorizationrequest forwarding unit 710, adata obtaining unit 720, adata sending unit 730, and aninformation recording unit 740.
The authorizationrequest forwarding unit 710 is configured to forward a personal associated data authorization request to an authorization object in response to the personal associated data authorization request of the data requestor.
Thedata acquisition unit 720 is configured to acquire corresponding individual associated data from each data holder according to individual characteristic information of an authorization object when the authorization object agrees with authorization.
Thedata transmitting unit 730 is configured to transmit the personal associated data to the data requester.
Theinformation recording unit 740 is configured to generate corresponding usage trace information from the personal associated data and the data requester, and record the usage trace information on the first block chain, wherein the usage trace information includes at least a data user and a data holder for the personal associated data.
Embodiments of a data streaming system, a data streaming method and an apparatus based on a block chain according to the embodiments of the present disclosure are described above with reference to fig. 1 to 7.
The data transfer device of the present disclosure may be implemented by hardware, or may be implemented by software, or a combination of hardware and software. The software implementation is taken as an example, and is formed by reading corresponding computer program instructions in the storage into the memory for operation through the processor of the device where the software implementation is located as a logical means. In the present disclosure, the data streaming apparatus may be implemented by, for example, an electronic device.
Fig. 8 shows a block diagram of an electronic device 800 for implementing a blockchain-based data streaming method according to an embodiment of the present disclosure.
As shown in fig. 8, electronic device 800 may include at least one processor 810, storage (e.g., non-volatile storage) 820,memory 830, andcommunication interface 840, and the at least one processor 810, storage 820,memory 830, andcommunication interface 840 are connected together via a bus 850. The at least one processor 810 executes at least one computer-readable instruction (i.e., the elements described above as being implemented in software) stored or encoded in memory.
In one embodiment, computer-executable instructions are stored in the memory that, when executed, cause the at least one processor 810 to: responding to a personal associated data authorization request of a data requester, and forwarding the personal associated data authorization request to an authorization object; when the authorization object agrees with authorization, corresponding personal associated data from each data holder is obtained according to the personal characteristic information of the authorization object; sending the personal associated data to a data requester; and generating corresponding use trace information according to the personal associated data and the data requester, and recording the use trace information on the first block chain, wherein the use trace information at least comprises a data user and a data holder corresponding to the personal associated data.
It should be understood that the computer-executable instructions stored in the memory, when executed, cause the at least one processor 810 to perform the various operations and functions described above in connection with fig. 1-7 in the various embodiments of the present disclosure.
According to one embodiment, a program product, such as a machine-readable medium, is provided. A machine-readable medium may have instructions (i.e., elements described above as being implemented in software) that, when executed by a machine, cause the machine to perform various operations and functions described above in connection with fig. 1-7 in various embodiments of the disclosure.
Specifically, a system or apparatus may be provided which is provided with a readable storage medium on which software program code implementing the functions of any of the above embodiments is stored, and causes a computer or processor of the system or apparatus to read out and execute instructions stored in the readable storage medium.
In this case, the program code itself read from the readable medium can realize the functions of any of the above-described embodiments, and thus the machine-readable code and the readable storage medium storing the machine-readable code form part of the present invention.
Computer program code required for the operation of various portions of the present specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB, NET, Python, and the like, a conventional programming language such as C, Visual Basic 2003, Perl, COBOL2002, PHP, and ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute on the user's computer, or on the user's computer as a stand-alone software package, or partially on the user's computer and partially on a remote computer, or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Examples of the readable storage medium include floppy disks, hard disks, magneto-optical disks, optical disks (e.g., CD-ROMs, CD-R, CD-RWs, DVD-ROMs, DVD-RAMs, DVD-RWs), magnetic tapes, nonvolatile memory cards, and ROMs. Alternatively, the program code may be downloaded from a server computer or from the cloud via a communications network.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
Not all steps and elements in the above flows and system structure diagrams are necessary, and some steps or elements may be omitted according to actual needs. The execution order of the steps is not fixed, and can be determined as required. The apparatus structures described in the above embodiments may be physical structures or logical structures, that is, some units may be implemented by the same physical entity, or some units may be implemented by a plurality of physical entities, or some units may be implemented by some components in a plurality of independent devices.
The term "exemplary" used throughout this specification means "serving as an example, instance, or illustration," and does not mean "preferred" or "advantageous" over other embodiments. The detailed description includes specific details for the purpose of providing an understanding of the described technology. However, the techniques may be practiced without these specific details. In some instances, well-known structures and devices are shown in block diagram form in order to avoid obscuring the concepts of the described embodiments.
Alternative embodiments of the present disclosure are described in detail with reference to the drawings, however, the embodiments of the present disclosure are not limited to the specific details in the embodiments, and various simple modifications may be made to the technical solutions of the embodiments of the present disclosure within the technical concept of the embodiments of the present disclosure, and the simple modifications all belong to the protective scope of the embodiments of the present disclosure.
The previous description of the disclosure is provided to enable any person skilled in the art to make or use the disclosure. Various modifications to the disclosure will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other variations without departing from the scope of the disclosure. Thus, the disclosure is not intended to be limited to the examples and designs described herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (17)

CN202110943572.3A2021-08-172021-08-17Data transfer system, data transfer method and device based on block chainActiveCN113660097B (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
CN202110943572.3ACN113660097B (en)2021-08-172021-08-17Data transfer system, data transfer method and device based on block chain

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
CN202110943572.3ACN113660097B (en)2021-08-172021-08-17Data transfer system, data transfer method and device based on block chain

Publications (2)

Publication NumberPublication Date
CN113660097Atrue CN113660097A (en)2021-11-16
CN113660097B CN113660097B (en)2024-04-19

Family

ID=78480000

Family Applications (1)

Application NumberTitlePriority DateFiling Date
CN202110943572.3AActiveCN113660097B (en)2021-08-172021-08-17Data transfer system, data transfer method and device based on block chain

Country Status (1)

CountryLink
CN (1)CN113660097B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115099800A (en)*2022-06-292022-09-23蚂蚁区块链科技(上海)有限公司Block chain based method and device for transferring poor asset data

Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109993647A (en)*2019-03-082019-07-09西安电子科技大学 A tax credit system and processing method based on blockchain
CN110414270A (en)*2019-08-012019-11-05谈建中A kind of personal data protection system and method based on block chain
CN111046078A (en)*2019-11-112020-04-21北京海益同展信息科技有限公司Block chain-based credit investigation query method and device and electronic equipment
CN111126964A (en)*2019-12-242020-05-08深圳前海乐寻坊区块链科技有限公司Method, device, equipment and storage medium for authenticating position credit based on block chain
KR20210015006A (en)*2019-07-312021-02-10김태욱System for processing financial information using blockchain platform

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN109993647A (en)*2019-03-082019-07-09西安电子科技大学 A tax credit system and processing method based on blockchain
KR20210015006A (en)*2019-07-312021-02-10김태욱System for processing financial information using blockchain platform
CN110414270A (en)*2019-08-012019-11-05谈建中A kind of personal data protection system and method based on block chain
CN111046078A (en)*2019-11-112020-04-21北京海益同展信息科技有限公司Block chain-based credit investigation query method and device and electronic equipment
CN111126964A (en)*2019-12-242020-05-08深圳前海乐寻坊区块链科技有限公司Method, device, equipment and storage medium for authenticating position credit based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
郭树行;宋子琦;: "面向征信的区块链模式设计与应用研究", 网络与信息安全学报, no. 04*

Cited By (1)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
CN115099800A (en)*2022-06-292022-09-23蚂蚁区块链科技(上海)有限公司Block chain based method and device for transferring poor asset data

Also Published As

Publication numberPublication date
CN113660097B (en)2024-04-19

Similar Documents

PublicationPublication DateTitle
BonyuetOverview and impact of blockchain on auditing
US10942994B2 (en)Multicomputer processing for data authentication using a blockchain approach
US10965445B2 (en)Blockchain-based unexpected data detection
Gatteschi et al.To blockchain or not to blockchain: That is the question
US11159537B2 (en)Multicomputer processing for data authentication and event execution using a blockchain approach
US11334882B1 (en)Data access management on a distributed ledger system
CN114862578B (en)Network topology
CN108985100B (en)Block chain-based element security certification method, device, equipment and medium
US12126721B2 (en)Reputation profile propagation on blockchain networks
US20180204191A1 (en)Secure Digital Data Operations
CN109472678B (en)Accounting book management method based on block chain, electronic device and readable storage medium
JP2020503579A (en) Blockchain-based method and system for specifying recipients of electronic communication
US20210272114A1 (en)Computer system for handling securitized token and voting contracts and distribution and voting transactions
US20210377274A1 (en)Distributed ledger data verification network
CN112836001B (en) Trajectory determination method, device, system and electronic device based on blockchain
US12212699B2 (en)Systems and methods for conditional distribution of aggregated cryptographic data based on a trigger
CN113660097B (en)Data transfer system, data transfer method and device based on block chain
US11887146B2 (en)Product exploration-based promotion
CN115099800A (en)Block chain based method and device for transferring poor asset data
WO2020167317A1 (en)Identity-based transaction processing
KR102573034B1 (en) Information judgment server for blockchain, information judgment method for blockchain, and recording medium on which information judgment program for blockchain is recorded
CN112926091B (en)Block chain-based data ownership recording and data transaction verification method and device
Antal et al.Distributed Ledger Technology Review and Decentralized Applications Development Guidelines. Future Internet 2021, 13, 62
CN114531260A (en)Information processing method based on alliance chain system and related equipment
CN112967049B (en)Method and device for issuing receivable through block chain

Legal Events

DateCodeTitleDescription
PB01Publication
PB01Publication
SE01Entry into force of request for substantive examination
SE01Entry into force of request for substantive examination
GR01Patent grant
GR01Patent grant

[8]ページ先頭

©2009-2025 Movatter.jp