CN110365685A - A kind of data processing method, device, equipment and computer readable storage medium - Google Patents

A kind of data processing method, device, equipment and computer readable storage medium Download PDF

Info

Publication number
CN110365685A
CN110365685A CN201910650874.4A CN201910650874A CN110365685A CN 110365685 A CN110365685 A CN 110365685A CN 201910650874 A CN201910650874 A CN 201910650874A CN 110365685 A CN110365685 A CN 110365685A
Authority
CN
China
Prior art keywords
user
node
block
information
user information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910650874.4A
Other languages
Chinese (zh)
Inventor
许晨阳
任珊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hundsun Technologies Inc
Original Assignee
Hundsun Technologies Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hundsun Technologies Inc filed Critical Hundsun Technologies Inc
Priority to CN201910650874.4A priority Critical patent/CN110365685A/en
Publication of CN110365685A publication Critical patent/CN110365685A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

This application discloses a kind of data processing methods, comprising: acquisition user information, the user information include at least customer position information;To block chain network broadcasting user information;Receive the signature endorsement of the user information of kith and kin's node transmission of user node in block chain network;If determining that the user information meets strategy of endorsing based on signature endorsement, the user information is sent to block node out, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block;The block is received, and after block verification passes through, it will be in the block typing block chain.So, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one node can provide trip related data, to ensure user security, also, user's trip related data only circulates in block chain network and security side, avoids privacy leakage risk.Disclosed herein as well is corresponding device, equipment and media.

Description

A kind of data processing method, device, equipment and computer readable storage medium
Technical field
This application involves block chain technical fields more particularly to a kind of data processing method, device, equipment and computer can Read storage medium.
Background technique
Safety safeguards system is usually to be collected personal trace information by the service provider of centralization and realized.Its In, personal trace information is usually obtained by the locating module of mobile phone terminal according to satellite positioning, and specifically, locating module is according to certain Frequency acquisition anchor point, the line that anchor point is linked to be are trace information.
However, centralization service side considers for interests or other factors after unexpected incidents occur, conceal intentionally related Data then will cause immeasurable loss to the person of meeting accident.For example, in the net about aggrieved case of vehicle platform passengers, user cannot and Shi Youxiao provides trip data to kith and kin and the police, and the service side of centralization is after client is in danger, and it is slow that there are response speeds, refuses Absolutely to the behaviors such as the police submit necessary information, irremediable situation is then caused.
Also, centralization service side is relied on simply, excessive personal data is provided it, can also generate individual privacy data quilt The problem of abuse, for example, being launched the event that zonal advertisement or big data kill-acquaintance etc. damage user benefit.
Therefore, how not to centralization service side provide user trajectory information while can guarantee user's safety again As urgent problem to be solved.
Summary of the invention
This application provides a kind of data processing method, user information is saved by block chain network, when happening suddenly When sexual behavior part, each node in block chain network can provide data, due to being not necessarily to provide data to centralization service side, one Aspect avoids centralization service side and refuses to submit necessary information to the police the problem of causing user security to be on the hazard, another party Face avoids the problem of individual privacy is abused.Accordingly, present invention also provides data processing equipment, equipment, medium and meters Calculation machine program product.
In view of this, the application first aspect provides a kind of data processing method, applied to the use in block chain network Family node, which comprises
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the label for the user information that kith and kin's node of user node described in the block chain network is sent Name endorsement;
If determining that the user information meets endorsement strategy based on signature endorsement, the use is sent to block node out Family information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, it is described go out block section Point is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
The application second aspect provides a kind of data processing method, the kith and kin applied to user node in block chain network Node, which comprises
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block out Node sends the user information for meeting endorsement strategy, wherein the block node out is the user node and kith and kin's node According to common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will In the block typing block chain.
The application third aspect provides a kind of data processing equipment, and described device includes:
Acquisition unit, for acquiring user information, the user information includes at least customer position information;
Radio unit, for broadcasting the user information to block chain network;
Receiving unit, what kith and kin's node for receiving user node in block chain network was sent is directed to the user information Signature endorsement;
Transmission unit, if for determining that the user information meets endorsement strategy based on signature endorsement, to block out Node sends the user information, and the instruction block node out is packaged block according to the user information and the whole network broadcasts the area Block, the block node out are that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit, for receiving the block, and after block verification passes through, by the block typing block chain In.
The application fourth aspect provides a kind of data processing equipment, and described device includes:
Receiving unit, for receiving the user information of user node transmission, the user information includes at least user location Information;
Generation unit for verifying the user information, and generates the label for being directed to the user information when being verified Name endorsement;
Transmission unit indicates the user node according to for sending the signature endorsement to the user node Signature, which is endorsed, sends the user information of satisfaction endorsement strategy to block node out, wherein the block node out is the user node With kith and kin's node according to common recognition algorithm reach common understanding and determine;
Recording unit, for receiving the block that block node is packaged according to the user information out, and in the block It, will be in the block typing block chain after verification passes through.
The 5th aspect of the application provides a kind of terminal, and the terminal includes processor and memory:
The memory is for storing computer program;
The processor be used for according to the computer program execute the application first aspect or second aspect described in number According to processing method.
The aspect of the application the 6th provides a kind of data processing system, the system comprises first terminal and second terminal, Wherein:
First terminal, for acquiring user information, the user information includes at least customer position information;To the block Chain network broadcasts the user information;Receive kith and kin's node transmission of user node described in block chain network is directed to the use The signature of family information is endorsed;If determining that the user information meets endorsement strategy based on signature endorsement, to block node out The user information is sent, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block, The block node out is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;Receive the area Block, and after block verification passes through, it will be in the block typing block chain;
Second terminal, for receiving the user information of user node transmission, the user information includes at least user location Information;The user information is verified, and generates the signature endorsement for the user information when being verified;To the user Node sends the signature endorsement, indicates that the user node is sent according to signature endorsement to block node out and meets endorsement plan User information slightly, wherein the block node out is that the user node and kith and kin's node are reached altogether according to common recognition algorithm Know and determine;The block that block node is packaged according to the user information out is received, and after block verification passes through, It will be in the block typing block chain.
The 7th aspect of the application provides a kind of computer readable storage medium, and the computer readable storage medium is used for Computer program is stored, said program code is for executing data processing method described in above-mentioned first aspect or second aspect.
The application eighth aspect provides a kind of computer program product including instruction, when run on a computer, So that the computer executes data processing method described in above-mentioned first aspect or second aspect.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
A kind of data processing method is provided in the embodiment of the present application, this method is by storing user using block chain network Related data when trip ensures user security, specifically, area when user is in danger, to provide related data in time User node in block chain network acquires user information, which includes at least customer position information, then user node To block chain network broadcasting user information, kith and kin's node of user node receives above-mentioned user information and verifies to it, The signature generated after being verified for user information is endorsed, and signature endorsement is returned to user node, if user node is based on The signature that kith and kin's node returns, which is endorsed, determines that user information meets endorsement strategy, then sends the user information to block node out, The instruction block node out is packaged block according to the user information and the whole network broadcasts the block, each in block chain network Node verifies block after receiving the block, when verification passes through, then by the block chain of the block typing self maintained In.In this way, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one section Point can provide trip related data, to ensure user security, also, user go on a journey related data only in block chain network and It circulates in security side, avoids privacy leakage risk.
Detailed description of the invention
Fig. 1 is a kind of scene framework figure of data processing method in the embodiment of the present application;
Fig. 2 is a kind of method flow diagram of data processing method in the embodiment of the present application;
Fig. 3 is a kind of interface schematic diagram by alarm control triggering alarm operation in the embodiment of the present application;
Fig. 4 is a kind of method flow diagram of data processing method in the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of data processing equipment in the embodiment of the present application;
Fig. 6 is a kind of structural schematic diagram of data processing equipment in the embodiment of the present application;
Fig. 7 is a kind of structural schematic diagram of terminal in the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage The data that solution uses in this way are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be to remove Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this A little process, methods, the other step or units of product or equipment inherently.
Slow for response speed existing for the personal trace information offer trip safety guarantee service of centralization service side collection, Concealing intentionally or refusing to provide relevant information to the police causes safety to be unable to get asking for effective guarantee and privacy leakage Topic, this application provides a kind of data processing method, this method utilizes block chain network storage user's trip related data, block Chain network is substantially the distributed data base by participating in safeguarding a sustainable growth jointly in many ways, also referred to as Distributed sharing account This (Distributed Shared Ledger), core is the cryptography account that can not be distorted by distributed network, timing Trusting relationship between this and distributed common recognition Mechanism establishing, replaces centralization service side to establish and trusts using aforesaid way Relationship, it is thus possible to when avoiding the occurrence of unexpected, centralization service side be based on interests or other factors conceal data or refuse to Security unit, which provides data, causes safety to be unable to get guarantee, and also avoids centralization service side and reveal privacy number According to.
It is appreciated that data processing method provided by the present application can be applied to the portable of terminal, especially lightweight Mobile terminal, including smart phone, tablet computer, wearable device etc..In specific implementation, data processing method can be with The form of computer program is stored in terminal, and terminal realizes the data processing side of the application by executing above-mentioned computer program Method.
It should be noted that computer program can be independent program, it is also possible to be integrated on other programs Program, such as plug-in unit, functional module or small routine, the embodiment of the present application are not construed as limiting this.
In order to enable the technical solution of the application it is clearer, it can be readily appreciated that below first combine concrete scene to data at Reason method is introduced.
The scene framework figure of data processing method shown in Figure 1 includes three terminals, specially eventually in this scenario End 10, terminal 20 and terminal 30, these three terminals can form a block chain network, in block chain network, three terminals Kith and kin's node each other, for example, when terminal 10 is user node, kith and kin's node of terminal 20 and the as user node of terminal 30.
Terminal 10 acquires user information, which includes at least customer position information, then to the block link network Network broadcasts the user information, and the kith and kin's node, that is, terminal 20 and terminal 30 for then receiving user node in block chain network are sent The signature for the user information endorse, if based on signature endorsement determine the user information meet endorse it is tactful, The user information then is sent to block node out, instruction is described, and block node is packaged block according to the user information out and the whole network is wide Broadcast the block, terminal 10 receives the block, and after block verification passes through, by the block typing block chain, It is so real by block typing block chain in addition, terminal 20 and terminal 30 receive above-mentioned block, and after block verification passes through Distributed storage of the existing user information in entire block chain network.
It is to be appreciated that Fig. 1 is that the block chain network formed using three nodes is introduced as example, in the application reality It applies in other possible implementations of example, number of nodes can be arranged according to actual needs, such as be also possible to four or five A, the present embodiment is not construed as limiting this.
Next, first data processing method provided by the present application is introduced from the angle of user node.Institute referring to fig. 2 The flow chart for the data processing method shown, this method comprises:
S201: acquisition user information, the user information include at least customer position information.
In order to ensure safety, user node acquisition includes at least the user information including customer position information, specifically Ground, user node can be by locating modules, such as global positioning system (Global Positioning System, GPS), nothing Line local area network (Wireless Local Area Networks, WLAN) module or mobile network's module acquire user location Information.
When acquiring customer position information, need to expend certain electricity, in order to avoid user node is in collection process Because electricity expends the case where excessively causing remaining capacity insufficient and then exception is caused to be closed, user node can be according to described The remaining capacity and movement speed of user node determine frequency acquisition, acquire user information according to the frequency acquisition.Namely During acquiring user information, the adjustment of being adapted to property of frequency acquisition.For example, current residual electricity is 10%, current driving speed When degree (the i.e. corresponding user node movement speed of Vehicle Speed) is 60km/h, when remainder stroke is 30km, if still according to original There is frequency acquisition such as 5 seconds once, then there is larger probability to generate the case where remaining capacity deficiency leads to shutdown, if by frequency acquisition tune Whole is 10 seconds primary, then power consumption can be effectively reduced, and avoids user node when stroke is not finished i.e. because of remaining capacity deficiency And exception is closed.
In some cases, user node can also acquire auxiliary information, which includes the user node At least one of remaining capacity, the operating condition of the user node, movement speed, user's message information.Wherein, above-mentioned auxiliary Supplementary information can help to exclude abnormal data and timely learning distress message.
For example, can actively leave a message comment when user notes abnormalities or is in danger, user node, which acquires user and leaves a message, to be believed Breath, and be stored in block chain network, the node in block chain network can be contacted the police in time based on the message information or it His security unit.
In another example kith and kin have found that user node is not uploading data for a period of time, it can be based in data before this Obtain the information such as remaining capacity, it is determined whether because remaining capacity deficiency causes user node to shut down, and then data can not be uploaded, Avoid false alarm.
It should be noted that when confirming whether user is safe, it is also necessary to be based on the time corresponding with customer position information Information determines.For user node, corresponding temporal information can be acquired together when acquiring customer position information, for Kith and kin's node, can be determined based on the temporal information carried in received user information namely user information in further include Temporal information corresponding with customer position information does not carry time letter corresponding with customer position information certainly, in user information When breath, kith and kin's node directly can also determine that the time corresponding with customer position information believes according to the time for receiving user information Breath.
S202: Xiang Suoshu block chain network broadcasts the user information.
S203: receive kith and kin's node transmission of user node described in the block chain network is directed to the user information Signature endorsement.
When specific, user node is saved to block chain network broadcasting user information, each of such block chain network Point includes that kith and kin's node of user node can receive the user information, and verify to user information, is being verified It afterwards, is user information addition signature using own private key, the signature generated for user information is endorsed, or is referred to as endorsement label Name.Wherein, the signature that the public key verifications user information including the use of user node is verified to user information, in signature verification By rear, further the content of user information can also be verified.
Wherein, signature endorsement can be understood as characterizing the trust to the user information by way of signature.Kith and kin's node After generating the signature endorsement for user information, the signature to user node return for user information is endorsed.
S204: it if determining that the user information meets endorsement strategy based on signature endorsement, is sent to block node out The user information, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block.
In practical application, negating user information, or forge and use in view of illegal person can disguise oneself as kith and kin's node Family information, and hence it is also possible to which endorsement strategy is arranged, in the case where meeting endorsement strategy, determination is endorsed successfully.
As the example of the application, endorsement strategy can be the endorsement strategy based on quantity, such as more than half above back Book node returns to signature endorsement, it is determined that endorses successfully, endorsement strategy is also possible to the endorsement based on endorsement to order node certainly Strategy specifically specifies certain nodes to endorse, and forms the set of an endorsement node, when one endorsement node knot of completion The signature of conjunction, i.e. coalition signature can be determined and be endorsed successfully.Wherein, endorsement node, which refers to, implements endorsement function in block chain network The node of energy.
In block chain network, node also has the function of being packaged block, and the node for implementing this function is referred to as block section Point.Block node is to be reached common understanding based on common recognition algorithm by the node in block chain network and determined out.Not in view of network Certainty, common recognition algorithm can choose the relatively high common recognition algorithm of serious forgiveness.In addition, user node may be deployed in portable set It is standby upper, in order to avoid power consumption is excessive, it can choose calculating simply, the common recognition algorithm without excessive calculation amount.In an example In, it can choose Byzantine failure tolerance (Practical Byzantine Fault Tolerance, PBFT) algorithm and calculated as common recognition Method.
It is endorsed when user node based on the signature received and determines that user information meets endorsement strategy, then sent out to block node out The user information endorsed is sent, indicates that block node is packaged block according to user information and the whole network broadcasts block.
S205: receiving the block, and after block verification passes through, will be in the block typing block chain.
User node receives block, and verifies to block, in practical application, standard schedule can be preset, User node verifies block according to standard schedule.In one example, standard schedule may include following standard: user The grammer and data structure of information must be correct, and outputting and inputting list all cannot be sky, language of the user node to block content Method and data structure are verified, and input is verified with output listing, in addition, standard schedule can also be including cryptographic Hash etc. In 0, in this way, user node can also verify cryptographic Hash.
In this embodiment, after user node passes through for the verification of the block, by the block typing self maintained Block chain in, it is subsequent when needing to provide data, corresponding data can be obtained from the block chain.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data processing method, this method is by utilizing block chain network Related data when user's trip is stored, so that related data when user is in danger, can be provided in time, ensures user security, Specifically, the user node in block chain network acquires user information, which includes at least customer position information, then User node receives above-mentioned user information and carries out to it to block chain network broadcasting user information, kith and kin's node of user node Verifying, the signature generated after being verified for user information are endorsed, and signature endorsement are returned to user node, if user saves Point is endorsed based on the signature that kith and kin's node returns determines that user information meets endorsement strategy, then sends the user to block node out Information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, in block chain network Each node after receiving the block, block is verified, verification is when passing through, then by the block typing self maintained In block chain.In this way, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, arbitrarily One node can provide trip related data, and to ensure user security, also, user goes on a journey related data only in block chain It circulates in network and security side, avoids privacy leakage risk.
For embodiment described in Fig. 2, user node can also judge whether user is in danger according to user information, and in user When in danger, Xiang Anbao node such as police's node sends user in the trace information of preceding designated time period in danger, to ensure that user goes out Row safety.
In specific implementation, user node can determine whether user is in danger according to default safety regulation, preset safety rule Then refer to user predetermined rule in a safe condition, does not meet safety in advance when user node is determined based on user information If when safety regulation, generating trace information according to the user information recorded in block chain, Xiang Anbao node is sent in preceding finger in danger The trace information for section of fixing time.
Wherein, default safety regulation may include at the appointed time being spaced to execute specified operation to user node, in movement Specified operation is executed to user node when distance to a declared goal, specified operation at the appointed time is executed to user node, in designated place Specified operation is executed to user node.
In this way, user node can determine whether user is in danger by following methods:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, then Determine that user is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, then Determine that user is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that use Family is in danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that use Family is in danger.
Specified time interval, distance to a declared goal, specified time and designated place etc. can be arranged according to actual needs, this reality It applies example and this is not construed as limiting.
Further, in the data processing method of the embodiment of the present application, automatic alarm is not only may be implemented in user node, also Manual alarm may be implemented.Specifically, user node can be operated in response to user by the alarm of alarm control triggering, Xiang An The trace information that node sends the user at the appointed time section is protected, which is according to the use recorded in the block chain What family information generated.
Fig. 3 shows a kind of schematic diagram of user node initiative alarming, and user node shows the first interface 300, this One interface display has user's trip information 301, which also carries alarm control 302, when user has found trip information It is abnormal, when deviating considerably from such as track, the alarm control 302 can be triggered, to trigger alarm operation, sends and uses to police's node Family one hour trace information before this.
It can be seen that the scheme that the application proposes is kind of the track shared system based on block chain technology, on chain node it Between share trace information, complete decentralization, all data are stored on privately owned chain, will not land data in centralization service Side sends data to the police only when needing to request service.Block chain common recognition algorithm ensures trace information on each node Consistency prevents malicious node.Block chain technology anti-tamper characteristic, it is ensured that the real effectiveness of trace information itself. Meanwhile this programme provides certain security strategy, anticipation user is in danger, notifies kith and kin and is in time sent to personal trace information Related side's emergency response speed improves to protect the personal safety of traveler in the police, meanwhile, effective protection individual privacy data, Prevent the events such as information abuse.
It should be noted that kith and kin's number of nodes be adjustably, be in data safety the considerations of, it is proposed that two and two Above kith and kin's node is advisable.Meanwhile for reasons of efficiency, kith and kin's number of nodes is also unsuitable excessive.Kith and kin's node and user Data consistency is kept by common recognition algorithm between node, guarantees that the data on all node account books are consistent.
Next, by being introduced from data processing method of the angle of kith and kin's node to the application.
The flow chart of data processing method shown in Figure 4, this method comprises:
S401: the user information that user node is sent is received.
Specifically, kith and kin's node receives the user information that user node is sent, and the user information includes at least user position Confidence breath.In some possible implementations, user information can also include auxiliary information, and auxiliary information user auxiliary is true Recognize user information whether exception or user it is whether in danger.As the example of the application, auxiliary information includes the user At least one of the remaining capacity of node, the operating condition of the user node, movement speed, user's message information.
It should be noted that the form that user information is data packet is sent, user node is added when sending data packet There is user's signature, verified to receive the node of the data packet, to determine data packet validity.
S402: verifying the user information, and the signature endorsement for the user information is generated when being verified.
Specifically, kith and kin's node can use the signature of the public key verifications user information of user node, realizes and believes user The verifying of breath, in some cases, kith and kin's node can also also test the content of user information after signature verification passes through Card.
When being verified, kith and kin's node generates the signature endorsement for user information, to characterize kith and kin's node to this The trust of user information.
S403: Xiang Suoshu user node sends the signature endorsement, indicates that the user node is endorsed according to the signature The user information for meeting endorsement strategy is sent to block node out.
Kith and kin's node returns to the signature endorsement for user information to user node, in this way, user node can be according to label Name, which endorses to send to block node out, meets the tactful user information of endorsement.In the present embodiment, a certain kith and kin's node returns to signature Endorsement is not characterized endorses successfully for the user information, but determination is endorsed successfully when user information meets endorsement strategy.
Endorsement strategy can be set according to actual needs, such as can be set to the endorsement strategy based on quantity, such as be more than The stage of half returns to signature endorsement, it is determined that endorses successfully, in another example can be set to the endorsement plan based on endorsement to order node Slightly, specify certain nodes to endorse, formed one endorsement node set, when complete one endorsement node combine signature, That is coalition signature, it is determined that endorse successfully.
User node determines the user information for meeting endorsement strategy according to the signature endorsement received, then to block section out Point sends the user information for meeting endorsement strategy.Wherein, the block node out is the user node and kith and kin's node root According to common recognition algorithm reach common understanding and determine.
S404: the block that block node is packaged according to the user information out is received, and is passed through in block verification It afterwards, will be in the block typing block chain.
Block node is packaged block according to the user information received out, then block is broadcasted to block chain network, in this way, close Friendly node receives the block, and verifies to block, will be in block typing block chain after block verification passes through.
Further, kith and kin's node is also based on user information and determines whether user is in danger, and in alarm in danger.Tool Body, if interval preset time does not receive the user information that the user node is sent, it is determined that user is in danger, and to security Node sends the user in the trace information of preceding designated time period in danger, and the trace information is remembered according in the block chain What the user information of record generated.
In some possible implementations, the user information further includes auxiliary information, and the auxiliary information includes institute State the remaining capacity of user node, the operating condition of the user node, movement speed, user leave a message information at least one Kind, if interval preset time does not receive the user information that the user node is sent, the auxiliary information is shown, with instruction Kith and kin determine whether user is in danger according to the auxiliary information, can be with when kith and kin determine that user is in danger based on the auxiliary information By alarm control triggering alarm operation, kith and kin's node is operated in response to user by the alarm of alarm control triggering, Xiang Anbao Node sends the user in the trace information of preceding designated time period in danger.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data processing method, kith and kin's node receives user node and sends User information, the user information include at least customer position information, then verify the user information, and be verified Shi Shengcheng endorses for the signature of the user information, and Xiang Suoshu user node sends the signature endorsement, indicates the user Node is endorsed according to the signature sends the user information of satisfaction endorsement strategy to block node out, followed by the reception block section out The block that is packaged according to the user information of point, and after the block verifies and passes through, by the block typing block chain, such as This, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one node To provide related data of going on a journey, to ensure user security, also, user goes on a journey related data only in block chain network and security side Middle circulation avoids privacy leakage risk.
Data processing method provided by the embodiments of the present application is applied to trip scene, can close trip field to appoint in life Scape provides simple and fast safety auxiliary.For example have no mishap to the parent of the various duty dealers of single living, children in school, old man Trip, kith and kin's pleasure trip on foot, jungle field exploration etc..
As an example, when user rides in the late into the night, security strategy can be set as the user of input in every 10 minutes is certainly Password is defined, since speed is very fast, and this is believed using time shorter position of per minute or 30s collection that can be set as It ceases and to the whole network broadcasting user location information.In user's riding process, every 10 minutes points open terminal, input password, complete primary Safety verification.If user normally arrives at the destination, this use can be terminated.If the non-normal termination of user uses, still Also it can then cause the alarm of kith and kin's node without input password in 10 minutes.
Explanation is explained to data processing method provided by the present application above by embodiment, with above-mentioned data processing Method is corresponding, and the embodiment of the present application also provides a kind of data processing equipments, next, explaining to the device Bright, referring to Fig. 5, which includes:
Acquisition unit 510, for acquiring user information, the user information includes at least customer position information;
Radio unit 520, for broadcasting the user information to block chain network;
Receiving unit 530, what kith and kin's node for receiving user node in block chain network was sent is directed to the user The signature of information is endorsed;
Transmission unit 540, if determining that the user information meets endorsement strategy for endorsing based on the signature, to out Block node sends the user information, and the instruction block node out is according to user information packing block and the whole network broadcast Block, the block node out are that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit 550, for receiving the block, and after block verification passes through, by block typing area In block chain.
Optionally, described device 500 further include:
Determination unit, for determining whether user is in danger according to default safety regulation;
The transmission unit 540 is also used to if so, sending the user in preceding designated time period in danger to security node Trace information, the trace information is generated according to the user information recorded in the block chain.
Optionally, the determination unit is specifically used for:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, then Determine that user is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, then Determine that user is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that use Family is in danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that use Family is in danger.
Optionally, the transmission unit is also used to:
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user at the appointed time The trace information of section, the trace information is generated according to the user information recorded in the block chain.
Optionally, the acquisition unit 510 is specifically used for:
Frequency acquisition is determined according to the remaining capacity of the user node and movement speed;
User information is acquired according to the frequency acquisition.
Optionally, the user information further includes auxiliary information, and the auxiliary information includes the residue of the user node At least one of electricity, the operating condition of the user node, movement speed, user's message information.
The embodiment of the present application also provides another data processing equipments, and referring to Fig. 6, which includes:
Receiving unit 610, for receiving the user information of user node transmission, the user information includes at least user position Confidence breath;
Generation unit 620 is generated for verifying the user information, and when being verified for the user information Signature endorsement;
Transmission unit 630 indicates the user node according to institute for sending the signature endorsement to the user node It states signature and endorses and meet the user information of endorsement strategy to the transmission of block node out, wherein the block node out is that the user saves Point and kith and kin's node according to common recognition algorithm reach common understanding and determine;
Recording unit 640, for receiving the block that block node is packaged according to the user information out, and in the area It, will be in the block typing block chain after block check passes through.
Optionally, described device 600 further include:
Determination unit, if not receiving the user information that the user node is sent for being spaced preset time, it is determined that User is in danger;
The transmission unit is also used to send the user to security node and believes in the track of preceding designated time period in danger Breath, the trace information is generated according to the user information recorded in the block chain.
Optionally, the user information further includes auxiliary information, and the auxiliary information includes the residue of the user node At least one of electricity, the operating condition of the user node, movement speed, user's message information;
Described device 600 further include:
Display unit is shown if not receiving the user information that the user node is sent for being spaced preset time The auxiliary information, to indicate kith and kin determine whether user is in danger according to the auxiliary information;
The transmission unit is also used to the alarm operation in response to user by alarm control triggering, Xiang Anbao node hair Send the user in the trace information of preceding designated time period in danger, the trace information is according to the use recorded in the block chain What family information generated.
Based on above-mentioned data processing equipment provided by the embodiments of the present application, the embodiment of the present application also provides at a kind of data Equipment is managed, which is terminal device, makees exemplary theory below with reference to hardware configuration of the Fig. 7 to the terminal device Bright, as shown in fig. 7, for ease of description, illustrating only part relevant to the embodiment of the present application, particular technique details is not disclosed , please refer to the embodiment of the present application method part.The terminal device can be include mobile phone, tablet computer, personal digital assistant (full name in English: Personal Digital Assistant, english abbreviation: PDA), point-of-sale terminal (full name in English: Point of Sales, english abbreviation: POS), any terminal device such as vehicle-mounted computer, taking the terminal as an example:
Fig. 7 shows the block diagram of the part-structure of mobile phone relevant to terminal provided by the embodiments of the present application.With reference to figure 7, mobile phone includes: radio frequency (full name in English: Radio Frequency, english abbreviation: RF) circuit 710, memory 720, input list Member 730, display unit 740, sensor 750, voicefrequency circuit 760, Wireless Fidelity (full name in English: wireless fidelity, English abbreviation: WiFi) components such as module 770, processor 780 and power supply 790.It will be understood by those skilled in the art that Fig. 7 Shown in handset structure do not constitute the restriction to mobile phone, may include than illustrating more or fewer components, or combination Certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Fig. 7 to mobile phone:
RF circuit 710 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station After downlink information receives, handled to processor 780;In addition, the data for designing uplink are sent to base station.In general, RF circuit 710 Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (full name in English: Low Noise Amplifier, english abbreviation: LNA), duplexer etc..In addition, RF circuit 710 can also by wireless communication with network It is communicated with other equipment.Any communication standard or agreement can be used in above-mentioned wireless communication, and including but not limited to the whole world is mobile logical News system (full name in English: Global System of Mobile communication, english abbreviation: GSM), general packet Wireless service (full name in English: General Packet Radio Service, GPRS), CDMA (full name in English: Code Division Multiple Access, english abbreviation: CDMA), wideband code division multiple access (full name in English: Wideband Code Division Multiple Access, english abbreviation: WCDMA), long term evolution (full name in English: Long Term Evolution, english abbreviation: LTE), Email, short message service (full name in English: Short Messaging Service, SMS) etc..
Memory 720 can be used for storing software program and module, and processor 780 is stored in memory 720 by operation Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 720 can mainly include Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 720 may include high-speed random access memory Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states Part.
Input unit 730 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with And the related key signals input of function control.Specifically, input unit 730 may include that touch panel 731 and other inputs are set Standby 732.Touch panel 731, also referred to as touch screen, collect user on it or nearby touch operation (such as user use The operation of any suitable object or attachment such as finger, stylus on touch panel 731 or near touch panel 731), and root Corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include touch detecting apparatus and touch Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected, Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching Point coordinate, then gives processor 780, and can receive order that processor 780 is sent and be executed.Furthermore, it is possible to using electricity The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 731.In addition to touch panel 731, input Unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to secondary or physical bond One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 740 can be used for showing information input by user or be supplied to user information and mobile phone it is various Menu.Display unit 740 may include display panel 741, optionally, can use liquid crystal display (full name in English: Liquid Crystal Display, english abbreviation: LCD), Organic Light Emitting Diode (full name in English: Organic Light-Emitting Diode, english abbreviation: OLED) etc. forms configure display panel 741.Further, touch panel 731 can cover display surface Plate 741 sends processor 780 to determine and touches thing after touch panel 731 detects touch operation on it or nearby The type of part is followed by subsequent processing device 780 according to the type of touch event and provides corresponding visual output on display panel 741.Though So in Fig. 7, touch panel 731 and display panel 741 are the input and input for realizing mobile phone as two independent components Function, but in some embodiments it is possible to touch panel 731 and display panel 741 is integrated and realize the input of mobile phone and Output function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other sensors. Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light Light and shade adjust the brightness of display panel 741, proximity sensor can close display panel 741 when mobile phone is moved in one's ear And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and mobile phone.Audio-frequency electric Electric signal after the audio data received conversion can be transferred to loudspeaker 761, be converted to sound by loudspeaker 761 by road 760 Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, is turned after being received by voicefrequency circuit 760 It is changed to audio data, then by after the processing of audio data output processor 780, such as another mobile phone is sent to through RF circuit 710, Or audio data is exported to memory 720 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 770 Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown WiFi module 770, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely Become in the range of the essence of invention and omits.
Processor 780 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to It crosses operation or executes the software program and/or module being stored in memory 720, and call and be stored in memory 720 Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 780 can wrap Include one or more processing units;Preferably, processor 780 can integrate application processor and modem processor, wherein answer With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication. It is understood that above-mentioned modem processor can not also be integrated into processor 780.
Mobile phone further includes the power supply 790 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe Reason system and processor 780 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In the embodiment of the present application, processor 780 included by the terminal is also with the following functions:
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the label for the user information that kith and kin's node of user node described in the block chain network is sent Name endorsement;
If determining that the user information meets endorsement strategy based on signature endorsement, the use is sent to block node out Family information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, it is described go out block section Point is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
Optionally, processor 780 can be also used for executing any one reality of data processing method in the embodiment of the present application The step of applying mode.
The embodiment of the present application also provides another terminal devices, with the identical structure of Fig. 7, processor also have with Lower function:
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block out Node sends the user information for meeting endorsement strategy, wherein the block node out is the user node and kith and kin's node According to common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will In the block typing block chain.
Optionally, processor 780 can be also used for executing any one reality of data processing method in the embodiment of the present application The step of applying mode.
The embodiment of the present application also provides a kind of computer readable storage medium, for storing program code, the program code For executing any one embodiment in a kind of data processing method described in foregoing individual embodiments.
The embodiment of the present application also provides a kind of computer program product including instruction, when run on a computer, So that computer executes any one embodiment in a kind of data processing method described in foregoing individual embodiments.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme 's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words It embodies, which is stored in a storage medium, including some instructions are used so that a computer Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (full name in English: Read-Only Memory, english abbreviation: ROM), random access memory (full name in English: Random Access Memory, english abbreviation: RAM), the various media that can store program code such as magnetic or disk.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c (a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also To be multiple.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.

Claims (10)

1. a kind of data processing method, which is characterized in that applied to the user node in block chain network, which comprises
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the signature back for the user information that kith and kin's node of user node described in the block chain network is sent Book;
If determining that the user information meets endorsement strategy based on signature endorsement, user's letter is sent to block node out It ceases, block node is gone out described in instruction, and according to user information packing block, simultaneously the whole network broadcasts the block, and the block node out is Node in the block chain network is reached common understanding according to common recognition algorithm and is determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
2. the method according to claim 1, wherein the method also includes:
Determine whether user is in danger according to default safety regulation;
If so, sending the user in the trace information of preceding designated time period in danger to security node, the trace information is It is generated according to the user information recorded in the block chain.
3. according to the method described in claim 2, it is characterized in that, the basis presets safety regulation determines whether user is in danger Include:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that User is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, it is determined that User is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that Yong Huyu Danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that Yong Huyu Danger.
4. the method according to claim 1, wherein the method also includes:
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user at the appointed time section Trace information, the trace information are generated according to the user information recorded in the block chain.
5. method according to any one of claims 1 to 4, which is characterized in that the acquisition user information includes:
Frequency acquisition is determined according to the remaining capacity of the user node and movement speed;
User information is acquired according to the frequency acquisition.
6. method according to any one of claims 1 to 4, which is characterized in that the user information further includes auxiliary information, The auxiliary information includes the remaining capacity of the user node, the operating condition of the user node, movement speed, Yong Huliu Say at least one of information.
7. a kind of data processing method, which is characterized in that applied to kith and kin's node of user node in block chain network, the side Method includes:
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block node out Send the user information for meeting endorsement strategy, wherein it is described go out block node be the user node and kith and kin's node according to Common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will be described In block typing block chain.
8. the method according to the description of claim 7 is characterized in that the method also includes:
If interval preset time does not receive the user information that the user node is sent, it is determined that user is in danger, and to security Node sends the user in the trace information of preceding designated time period in danger, and the trace information is remembered according in the block chain What the user information of record generated.
9. the method according to the description of claim 7 is characterized in that the user information further includes auxiliary information, the auxiliary Information include the remaining capacity of the user node, the operating condition of the user node, movement speed, user leave a message information in At least one;
If interval preset time does not receive the user information that the user node is sent, the auxiliary information is shown, to refer to Show kith and kin determine whether user is in danger according to the auxiliary information;
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user when in danger preceding specified Between section trace information, the trace information is generated according to the user information recorded in the block chain.
10. a kind of data processing equipment, which is characterized in that described device includes:
Acquisition unit, for acquiring user information, the user information includes at least customer position information;
Radio unit, for broadcasting the user information to block chain network;
Receiving unit, the label for the user information that kith and kin's node for receiving user node in block chain network is sent Name endorsement;
Transmission unit, if for determining that the user information meets endorsement strategy based on signature endorsement, to block node out The user information is sent, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block, The block node out is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit will be in the block typing block chain for receiving the block, and after block verification passes through.
CN201910650874.4A 2019-07-18 2019-07-18 A kind of data processing method, device, equipment and computer readable storage medium Pending CN110365685A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910650874.4A CN110365685A (en) 2019-07-18 2019-07-18 A kind of data processing method, device, equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910650874.4A CN110365685A (en) 2019-07-18 2019-07-18 A kind of data processing method, device, equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN110365685A true CN110365685A (en) 2019-10-22

Family

ID=68221077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910650874.4A Pending CN110365685A (en) 2019-07-18 2019-07-18 A kind of data processing method, device, equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110365685A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110798807A (en) * 2019-11-06 2020-02-14 北京海益同展信息科技有限公司 Method, apparatus, computer device and medium for recording vehicle trajectory
CN112532416A (en) * 2019-12-26 2021-03-19 数海信息技术有限公司 Security state information management method and system based on consensus mechanism
CN112564919A (en) * 2020-12-04 2021-03-26 广东投盟科技有限公司 Identity authentication method, identity authentication equipment and computer readable storage medium
CN112883106A (en) * 2020-12-31 2021-06-01 北京百度网讯科技有限公司 Method, device, equipment and medium for determining out-of-block node of block chain
CN114254050A (en) * 2022-03-02 2022-03-29 恒生电子股份有限公司 Block chain network consensus preloading method, device, equipment and storage medium

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160240063A1 (en) * 2013-10-25 2016-08-18 Beijing Qihoo Technology Company Limited Position information prompting method, device and system
CN107045650A (en) * 2016-10-25 2017-08-15 罗轶 Net based on block chain about car
CN107358484A (en) * 2017-05-27 2017-11-17 上海与德科技有限公司 A kind of net about car monitoring method and system
CN108446992A (en) * 2018-05-11 2018-08-24 济南浪潮高新科技投资发展有限公司 A kind of net connection accurate Accident Handling Method of automobile based on block chain
CN108711090A (en) * 2018-05-15 2018-10-26 华南农业大学 A kind of non-stop layer chauffeur protocol method and system based on block chain
EP3410156A1 (en) * 2017-06-02 2018-12-05 Nokia Technologies Oy Positioning information verification
CN108961669A (en) * 2018-07-19 2018-12-07 上海小蚁科技有限公司 The safe early warning method and device, storage medium, server of net about vehicle
CN109146490A (en) * 2018-10-11 2019-01-04 北京京东尚科信息技术有限公司 block generation method, device and system
CN109389506A (en) * 2018-10-23 2019-02-26 四川大学 Detection method for transaction data source under super account book multichain scene
CN109493564A (en) * 2018-11-28 2019-03-19 阿里巴巴集团控股有限公司 A kind of alarm method, apparatus and system
CN109637082A (en) * 2018-12-24 2019-04-16 航天信息股份有限公司 Net about vehicle maintenance device and method
CN109767212A (en) * 2018-10-11 2019-05-17 平安科技(深圳)有限公司 Assets exchanging method, system, terminal and storage medium based on block chain

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160240063A1 (en) * 2013-10-25 2016-08-18 Beijing Qihoo Technology Company Limited Position information prompting method, device and system
CN107045650A (en) * 2016-10-25 2017-08-15 罗轶 Net based on block chain about car
CN107358484A (en) * 2017-05-27 2017-11-17 上海与德科技有限公司 A kind of net about car monitoring method and system
EP3410156A1 (en) * 2017-06-02 2018-12-05 Nokia Technologies Oy Positioning information verification
CN108446992A (en) * 2018-05-11 2018-08-24 济南浪潮高新科技投资发展有限公司 A kind of net connection accurate Accident Handling Method of automobile based on block chain
CN108711090A (en) * 2018-05-15 2018-10-26 华南农业大学 A kind of non-stop layer chauffeur protocol method and system based on block chain
CN108961669A (en) * 2018-07-19 2018-12-07 上海小蚁科技有限公司 The safe early warning method and device, storage medium, server of net about vehicle
CN109146490A (en) * 2018-10-11 2019-01-04 北京京东尚科信息技术有限公司 block generation method, device and system
CN109767212A (en) * 2018-10-11 2019-05-17 平安科技(深圳)有限公司 Assets exchanging method, system, terminal and storage medium based on block chain
CN109389506A (en) * 2018-10-23 2019-02-26 四川大学 Detection method for transaction data source under super account book multichain scene
CN109493564A (en) * 2018-11-28 2019-03-19 阿里巴巴集团控股有限公司 A kind of alarm method, apparatus and system
CN109637082A (en) * 2018-12-24 2019-04-16 航天信息股份有限公司 Net about vehicle maintenance device and method

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110798807A (en) * 2019-11-06 2020-02-14 北京海益同展信息科技有限公司 Method, apparatus, computer device and medium for recording vehicle trajectory
CN112532416A (en) * 2019-12-26 2021-03-19 数海信息技术有限公司 Security state information management method and system based on consensus mechanism
CN112564919A (en) * 2020-12-04 2021-03-26 广东投盟科技有限公司 Identity authentication method, identity authentication equipment and computer readable storage medium
CN112883106A (en) * 2020-12-31 2021-06-01 北京百度网讯科技有限公司 Method, device, equipment and medium for determining out-of-block node of block chain
CN112883106B (en) * 2020-12-31 2024-02-13 北京百度网讯科技有限公司 Block-out node determining method, device, equipment and medium of block chain
CN114254050A (en) * 2022-03-02 2022-03-29 恒生电子股份有限公司 Block chain network consensus preloading method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110365685A (en) A kind of data processing method, device, equipment and computer readable storage medium
CN104796385B (en) Terminal binding method, apparatus and system
JP6783382B2 (en) Methods, devices, and mobile devices for associating notification messages
CN105468608B (en) Crowdsourcing-based data acquisition and processing method and system
CN106412311B (en) A kind of data transmission method and terminal device
CN106657690A (en) Method and device for preventing phone scam, and mobile terminal
CN104901805B (en) A kind of identification authentication methods, devices and systems
CN106470269A (en) A kind of method and apparatus of antitheft mobile phone
CN110278329B (en) Notification message management method and mobile terminal
CN110049496A (en) A kind of method for network access and mobile terminal
CN108389028A (en) The method, device and mobile terminal of stroke reminding
CN108510612A (en) Parking lot night watching method, system and computer readable storage medium
CN106383780A (en) Monkey test method and device
CN106331370A (en) Data transmission method and terminal device
CN108881103A (en) A kind of method and device accessing network
CN106130735A (en) The processing method of a kind of communication information, device and mobile terminal
CN110457888A (en) A kind of verifying code imput method, device, electronic equipment and storage medium
CN106330889A (en) Method and apparatus for deblocking account
CN108494786A (en) A kind of emergency vehicle based reminding method, server and mobile terminal
CN109446834A (en) A kind of right management method and mobile terminal of application program
CN106131133A (en) Browsing history information inspection method, Apparatus and system
CN109819016A (en) Information issuing method, message receiving method and mobile terminal based on block chain
CN104899488B (en) Numeric value transfer and device
CN108551525A (en) A kind of state of motion track determines method and mobile terminal
CN108632454A (en) Information processing method and device, computer readable storage medium, terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191022

RJ01 Rejection of invention patent application after publication