CN110365685A - A kind of data processing method, device, equipment and computer readable storage medium - Google Patents
A kind of data processing method, device, equipment and computer readable storage medium Download PDFInfo
- Publication number
- CN110365685A CN110365685A CN201910650874.4A CN201910650874A CN110365685A CN 110365685 A CN110365685 A CN 110365685A CN 201910650874 A CN201910650874 A CN 201910650874A CN 110365685 A CN110365685 A CN 110365685A
- Authority
- CN
- China
- Prior art keywords
- user
- node
- block
- information
- user information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
This application discloses a kind of data processing methods, comprising: acquisition user information, the user information include at least customer position information;To block chain network broadcasting user information;Receive the signature endorsement of the user information of kith and kin's node transmission of user node in block chain network;If determining that the user information meets strategy of endorsing based on signature endorsement, the user information is sent to block node out, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block;The block is received, and after block verification passes through, it will be in the block typing block chain.So, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one node can provide trip related data, to ensure user security, also, user's trip related data only circulates in block chain network and security side, avoids privacy leakage risk.Disclosed herein as well is corresponding device, equipment and media.
Description
Technical field
This application involves block chain technical fields more particularly to a kind of data processing method, device, equipment and computer can
Read storage medium.
Background technique
Safety safeguards system is usually to be collected personal trace information by the service provider of centralization and realized.Its
In, personal trace information is usually obtained by the locating module of mobile phone terminal according to satellite positioning, and specifically, locating module is according to certain
Frequency acquisition anchor point, the line that anchor point is linked to be are trace information.
However, centralization service side considers for interests or other factors after unexpected incidents occur, conceal intentionally related
Data then will cause immeasurable loss to the person of meeting accident.For example, in the net about aggrieved case of vehicle platform passengers, user cannot and
Shi Youxiao provides trip data to kith and kin and the police, and the service side of centralization is after client is in danger, and it is slow that there are response speeds, refuses
Absolutely to the behaviors such as the police submit necessary information, irremediable situation is then caused.
Also, centralization service side is relied on simply, excessive personal data is provided it, can also generate individual privacy data quilt
The problem of abuse, for example, being launched the event that zonal advertisement or big data kill-acquaintance etc. damage user benefit.
Therefore, how not to centralization service side provide user trajectory information while can guarantee user's safety again
As urgent problem to be solved.
Summary of the invention
This application provides a kind of data processing method, user information is saved by block chain network, when happening suddenly
When sexual behavior part, each node in block chain network can provide data, due to being not necessarily to provide data to centralization service side, one
Aspect avoids centralization service side and refuses to submit necessary information to the police the problem of causing user security to be on the hazard, another party
Face avoids the problem of individual privacy is abused.Accordingly, present invention also provides data processing equipment, equipment, medium and meters
Calculation machine program product.
In view of this, the application first aspect provides a kind of data processing method, applied to the use in block chain network
Family node, which comprises
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the label for the user information that kith and kin's node of user node described in the block chain network is sent
Name endorsement;
If determining that the user information meets endorsement strategy based on signature endorsement, the use is sent to block node out
Family information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, it is described go out block section
Point is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
The application second aspect provides a kind of data processing method, the kith and kin applied to user node in block chain network
Node, which comprises
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block out
Node sends the user information for meeting endorsement strategy, wherein the block node out is the user node and kith and kin's node
According to common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will
In the block typing block chain.
The application third aspect provides a kind of data processing equipment, and described device includes:
Acquisition unit, for acquiring user information, the user information includes at least customer position information;
Radio unit, for broadcasting the user information to block chain network;
Receiving unit, what kith and kin's node for receiving user node in block chain network was sent is directed to the user information
Signature endorsement;
Transmission unit, if for determining that the user information meets endorsement strategy based on signature endorsement, to block out
Node sends the user information, and the instruction block node out is packaged block according to the user information and the whole network broadcasts the area
Block, the block node out are that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit, for receiving the block, and after block verification passes through, by the block typing block chain
In.
The application fourth aspect provides a kind of data processing equipment, and described device includes:
Receiving unit, for receiving the user information of user node transmission, the user information includes at least user location
Information;
Generation unit for verifying the user information, and generates the label for being directed to the user information when being verified
Name endorsement;
Transmission unit indicates the user node according to for sending the signature endorsement to the user node
Signature, which is endorsed, sends the user information of satisfaction endorsement strategy to block node out, wherein the block node out is the user node
With kith and kin's node according to common recognition algorithm reach common understanding and determine;
Recording unit, for receiving the block that block node is packaged according to the user information out, and in the block
It, will be in the block typing block chain after verification passes through.
The 5th aspect of the application provides a kind of terminal, and the terminal includes processor and memory:
The memory is for storing computer program;
The processor be used for according to the computer program execute the application first aspect or second aspect described in number
According to processing method.
The aspect of the application the 6th provides a kind of data processing system, the system comprises first terminal and second terminal,
Wherein:
First terminal, for acquiring user information, the user information includes at least customer position information;To the block
Chain network broadcasts the user information;Receive kith and kin's node transmission of user node described in block chain network is directed to the use
The signature of family information is endorsed;If determining that the user information meets endorsement strategy based on signature endorsement, to block node out
The user information is sent, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block,
The block node out is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;Receive the area
Block, and after block verification passes through, it will be in the block typing block chain;
Second terminal, for receiving the user information of user node transmission, the user information includes at least user location
Information;The user information is verified, and generates the signature endorsement for the user information when being verified;To the user
Node sends the signature endorsement, indicates that the user node is sent according to signature endorsement to block node out and meets endorsement plan
User information slightly, wherein the block node out is that the user node and kith and kin's node are reached altogether according to common recognition algorithm
Know and determine;The block that block node is packaged according to the user information out is received, and after block verification passes through,
It will be in the block typing block chain.
The 7th aspect of the application provides a kind of computer readable storage medium, and the computer readable storage medium is used for
Computer program is stored, said program code is for executing data processing method described in above-mentioned first aspect or second aspect.
The application eighth aspect provides a kind of computer program product including instruction, when run on a computer,
So that the computer executes data processing method described in above-mentioned first aspect or second aspect.
As can be seen from the above technical solutions, the embodiment of the present application has the advantage that
A kind of data processing method is provided in the embodiment of the present application, this method is by storing user using block chain network
Related data when trip ensures user security, specifically, area when user is in danger, to provide related data in time
User node in block chain network acquires user information, which includes at least customer position information, then user node
To block chain network broadcasting user information, kith and kin's node of user node receives above-mentioned user information and verifies to it,
The signature generated after being verified for user information is endorsed, and signature endorsement is returned to user node, if user node is based on
The signature that kith and kin's node returns, which is endorsed, determines that user information meets endorsement strategy, then sends the user information to block node out,
The instruction block node out is packaged block according to the user information and the whole network broadcasts the block, each in block chain network
Node verifies block after receiving the block, when verification passes through, then by the block chain of the block typing self maintained
In.In this way, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one section
Point can provide trip related data, to ensure user security, also, user go on a journey related data only in block chain network and
It circulates in security side, avoids privacy leakage risk.
Detailed description of the invention
Fig. 1 is a kind of scene framework figure of data processing method in the embodiment of the present application;
Fig. 2 is a kind of method flow diagram of data processing method in the embodiment of the present application;
Fig. 3 is a kind of interface schematic diagram by alarm control triggering alarm operation in the embodiment of the present application;
Fig. 4 is a kind of method flow diagram of data processing method in the embodiment of the present application;
Fig. 5 is a kind of structural schematic diagram of data processing equipment in the embodiment of the present application;
Fig. 6 is a kind of structural schematic diagram of data processing equipment in the embodiment of the present application;
Fig. 7 is a kind of structural schematic diagram of terminal in the embodiment of the present application.
Specific embodiment
In order to make those skilled in the art more fully understand application scheme, below in conjunction in the embodiment of the present application
Attached drawing, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described embodiment is only this
Apply for a part of the embodiment, instead of all the embodiments.Based on the embodiment in the application, those of ordinary skill in the art exist
Every other embodiment obtained under the premise of creative work is not made, shall fall in the protection scope of this application.
The description and claims of this application and term " first ", " second ", " third ", " in above-mentioned attached drawing
The (if present)s such as four " are to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should manage
The data that solution uses in this way are interchangeable under appropriate circumstances, so that embodiments herein described herein for example can be to remove
Sequence other than those of illustrating or describe herein is implemented.In addition, term " includes " and " having " and theirs is any
Deformation, it is intended that cover it is non-exclusive include, for example, containing the process, method of a series of steps or units, system, production
Product or equipment those of are not necessarily limited to be clearly listed step or unit, but may include be not clearly listed or for this
A little process, methods, the other step or units of product or equipment inherently.
Slow for response speed existing for the personal trace information offer trip safety guarantee service of centralization service side collection,
Concealing intentionally or refusing to provide relevant information to the police causes safety to be unable to get asking for effective guarantee and privacy leakage
Topic, this application provides a kind of data processing method, this method utilizes block chain network storage user's trip related data, block
Chain network is substantially the distributed data base by participating in safeguarding a sustainable growth jointly in many ways, also referred to as Distributed sharing account
This (Distributed Shared Ledger), core is the cryptography account that can not be distorted by distributed network, timing
Trusting relationship between this and distributed common recognition Mechanism establishing, replaces centralization service side to establish and trusts using aforesaid way
Relationship, it is thus possible to when avoiding the occurrence of unexpected, centralization service side be based on interests or other factors conceal data or refuse to
Security unit, which provides data, causes safety to be unable to get guarantee, and also avoids centralization service side and reveal privacy number
According to.
It is appreciated that data processing method provided by the present application can be applied to the portable of terminal, especially lightweight
Mobile terminal, including smart phone, tablet computer, wearable device etc..In specific implementation, data processing method can be with
The form of computer program is stored in terminal, and terminal realizes the data processing side of the application by executing above-mentioned computer program
Method.
It should be noted that computer program can be independent program, it is also possible to be integrated on other programs
Program, such as plug-in unit, functional module or small routine, the embodiment of the present application are not construed as limiting this.
In order to enable the technical solution of the application it is clearer, it can be readily appreciated that below first combine concrete scene to data at
Reason method is introduced.
The scene framework figure of data processing method shown in Figure 1 includes three terminals, specially eventually in this scenario
End 10, terminal 20 and terminal 30, these three terminals can form a block chain network, in block chain network, three terminals
Kith and kin's node each other, for example, when terminal 10 is user node, kith and kin's node of terminal 20 and the as user node of terminal 30.
Terminal 10 acquires user information, which includes at least customer position information, then to the block link network
Network broadcasts the user information, and the kith and kin's node, that is, terminal 20 and terminal 30 for then receiving user node in block chain network are sent
The signature for the user information endorse, if based on signature endorsement determine the user information meet endorse it is tactful,
The user information then is sent to block node out, instruction is described, and block node is packaged block according to the user information out and the whole network is wide
Broadcast the block, terminal 10 receives the block, and after block verification passes through, by the block typing block chain,
It is so real by block typing block chain in addition, terminal 20 and terminal 30 receive above-mentioned block, and after block verification passes through
Distributed storage of the existing user information in entire block chain network.
It is to be appreciated that Fig. 1 is that the block chain network formed using three nodes is introduced as example, in the application reality
It applies in other possible implementations of example, number of nodes can be arranged according to actual needs, such as be also possible to four or five
A, the present embodiment is not construed as limiting this.
Next, first data processing method provided by the present application is introduced from the angle of user node.Institute referring to fig. 2
The flow chart for the data processing method shown, this method comprises:
S201: acquisition user information, the user information include at least customer position information.
In order to ensure safety, user node acquisition includes at least the user information including customer position information, specifically
Ground, user node can be by locating modules, such as global positioning system (Global Positioning System, GPS), nothing
Line local area network (Wireless Local Area Networks, WLAN) module or mobile network's module acquire user location
Information.
When acquiring customer position information, need to expend certain electricity, in order to avoid user node is in collection process
Because electricity expends the case where excessively causing remaining capacity insufficient and then exception is caused to be closed, user node can be according to described
The remaining capacity and movement speed of user node determine frequency acquisition, acquire user information according to the frequency acquisition.Namely
During acquiring user information, the adjustment of being adapted to property of frequency acquisition.For example, current residual electricity is 10%, current driving speed
When degree (the i.e. corresponding user node movement speed of Vehicle Speed) is 60km/h, when remainder stroke is 30km, if still according to original
There is frequency acquisition such as 5 seconds once, then there is larger probability to generate the case where remaining capacity deficiency leads to shutdown, if by frequency acquisition tune
Whole is 10 seconds primary, then power consumption can be effectively reduced, and avoids user node when stroke is not finished i.e. because of remaining capacity deficiency
And exception is closed.
In some cases, user node can also acquire auxiliary information, which includes the user node
At least one of remaining capacity, the operating condition of the user node, movement speed, user's message information.Wherein, above-mentioned auxiliary
Supplementary information can help to exclude abnormal data and timely learning distress message.
For example, can actively leave a message comment when user notes abnormalities or is in danger, user node, which acquires user and leaves a message, to be believed
Breath, and be stored in block chain network, the node in block chain network can be contacted the police in time based on the message information or it
His security unit.
In another example kith and kin have found that user node is not uploading data for a period of time, it can be based in data before this
Obtain the information such as remaining capacity, it is determined whether because remaining capacity deficiency causes user node to shut down, and then data can not be uploaded,
Avoid false alarm.
It should be noted that when confirming whether user is safe, it is also necessary to be based on the time corresponding with customer position information
Information determines.For user node, corresponding temporal information can be acquired together when acquiring customer position information, for
Kith and kin's node, can be determined based on the temporal information carried in received user information namely user information in further include
Temporal information corresponding with customer position information does not carry time letter corresponding with customer position information certainly, in user information
When breath, kith and kin's node directly can also determine that the time corresponding with customer position information believes according to the time for receiving user information
Breath.
S202: Xiang Suoshu block chain network broadcasts the user information.
S203: receive kith and kin's node transmission of user node described in the block chain network is directed to the user information
Signature endorsement.
When specific, user node is saved to block chain network broadcasting user information, each of such block chain network
Point includes that kith and kin's node of user node can receive the user information, and verify to user information, is being verified
It afterwards, is user information addition signature using own private key, the signature generated for user information is endorsed, or is referred to as endorsement label
Name.Wherein, the signature that the public key verifications user information including the use of user node is verified to user information, in signature verification
By rear, further the content of user information can also be verified.
Wherein, signature endorsement can be understood as characterizing the trust to the user information by way of signature.Kith and kin's node
After generating the signature endorsement for user information, the signature to user node return for user information is endorsed.
S204: it if determining that the user information meets endorsement strategy based on signature endorsement, is sent to block node out
The user information, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block.
In practical application, negating user information, or forge and use in view of illegal person can disguise oneself as kith and kin's node
Family information, and hence it is also possible to which endorsement strategy is arranged, in the case where meeting endorsement strategy, determination is endorsed successfully.
As the example of the application, endorsement strategy can be the endorsement strategy based on quantity, such as more than half above back
Book node returns to signature endorsement, it is determined that endorses successfully, endorsement strategy is also possible to the endorsement based on endorsement to order node certainly
Strategy specifically specifies certain nodes to endorse, and forms the set of an endorsement node, when one endorsement node knot of completion
The signature of conjunction, i.e. coalition signature can be determined and be endorsed successfully.Wherein, endorsement node, which refers to, implements endorsement function in block chain network
The node of energy.
In block chain network, node also has the function of being packaged block, and the node for implementing this function is referred to as block section
Point.Block node is to be reached common understanding based on common recognition algorithm by the node in block chain network and determined out.Not in view of network
Certainty, common recognition algorithm can choose the relatively high common recognition algorithm of serious forgiveness.In addition, user node may be deployed in portable set
It is standby upper, in order to avoid power consumption is excessive, it can choose calculating simply, the common recognition algorithm without excessive calculation amount.In an example
In, it can choose Byzantine failure tolerance (Practical Byzantine Fault Tolerance, PBFT) algorithm and calculated as common recognition
Method.
It is endorsed when user node based on the signature received and determines that user information meets endorsement strategy, then sent out to block node out
The user information endorsed is sent, indicates that block node is packaged block according to user information and the whole network broadcasts block.
S205: receiving the block, and after block verification passes through, will be in the block typing block chain.
User node receives block, and verifies to block, in practical application, standard schedule can be preset,
User node verifies block according to standard schedule.In one example, standard schedule may include following standard: user
The grammer and data structure of information must be correct, and outputting and inputting list all cannot be sky, language of the user node to block content
Method and data structure are verified, and input is verified with output listing, in addition, standard schedule can also be including cryptographic Hash etc.
In 0, in this way, user node can also verify cryptographic Hash.
In this embodiment, after user node passes through for the verification of the block, by the block typing self maintained
Block chain in, it is subsequent when needing to provide data, corresponding data can be obtained from the block chain.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data processing method, this method is by utilizing block chain network
Related data when user's trip is stored, so that related data when user is in danger, can be provided in time, ensures user security,
Specifically, the user node in block chain network acquires user information, which includes at least customer position information, then
User node receives above-mentioned user information and carries out to it to block chain network broadcasting user information, kith and kin's node of user node
Verifying, the signature generated after being verified for user information are endorsed, and signature endorsement are returned to user node, if user saves
Point is endorsed based on the signature that kith and kin's node returns determines that user information meets endorsement strategy, then sends the user to block node out
Information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, in block chain network
Each node after receiving the block, block is verified, verification is when passing through, then by the block typing self maintained
In block chain.In this way, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, arbitrarily
One node can provide trip related data, and to ensure user security, also, user goes on a journey related data only in block chain
It circulates in network and security side, avoids privacy leakage risk.
For embodiment described in Fig. 2, user node can also judge whether user is in danger according to user information, and in user
When in danger, Xiang Anbao node such as police's node sends user in the trace information of preceding designated time period in danger, to ensure that user goes out
Row safety.
In specific implementation, user node can determine whether user is in danger according to default safety regulation, preset safety rule
Then refer to user predetermined rule in a safe condition, does not meet safety in advance when user node is determined based on user information
If when safety regulation, generating trace information according to the user information recorded in block chain, Xiang Anbao node is sent in preceding finger in danger
The trace information for section of fixing time.
Wherein, default safety regulation may include at the appointed time being spaced to execute specified operation to user node, in movement
Specified operation is executed to user node when distance to a declared goal, specified operation at the appointed time is executed to user node, in designated place
Specified operation is executed to user node.
In this way, user node can determine whether user is in danger by following methods:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, then
Determine that user is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, then
Determine that user is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that use
Family is in danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that use
Family is in danger.
Specified time interval, distance to a declared goal, specified time and designated place etc. can be arranged according to actual needs, this reality
It applies example and this is not construed as limiting.
Further, in the data processing method of the embodiment of the present application, automatic alarm is not only may be implemented in user node, also
Manual alarm may be implemented.Specifically, user node can be operated in response to user by the alarm of alarm control triggering, Xiang An
The trace information that node sends the user at the appointed time section is protected, which is according to the use recorded in the block chain
What family information generated.
Fig. 3 shows a kind of schematic diagram of user node initiative alarming, and user node shows the first interface 300, this
One interface display has user's trip information 301, which also carries alarm control 302, when user has found trip information
It is abnormal, when deviating considerably from such as track, the alarm control 302 can be triggered, to trigger alarm operation, sends and uses to police's node
Family one hour trace information before this.
It can be seen that the scheme that the application proposes is kind of the track shared system based on block chain technology, on chain node it
Between share trace information, complete decentralization, all data are stored on privately owned chain, will not land data in centralization service
Side sends data to the police only when needing to request service.Block chain common recognition algorithm ensures trace information on each node
Consistency prevents malicious node.Block chain technology anti-tamper characteristic, it is ensured that the real effectiveness of trace information itself.
Meanwhile this programme provides certain security strategy, anticipation user is in danger, notifies kith and kin and is in time sent to personal trace information
Related side's emergency response speed improves to protect the personal safety of traveler in the police, meanwhile, effective protection individual privacy data,
Prevent the events such as information abuse.
It should be noted that kith and kin's number of nodes be adjustably, be in data safety the considerations of, it is proposed that two and two
Above kith and kin's node is advisable.Meanwhile for reasons of efficiency, kith and kin's number of nodes is also unsuitable excessive.Kith and kin's node and user
Data consistency is kept by common recognition algorithm between node, guarantees that the data on all node account books are consistent.
Next, by being introduced from data processing method of the angle of kith and kin's node to the application.
The flow chart of data processing method shown in Figure 4, this method comprises:
S401: the user information that user node is sent is received.
Specifically, kith and kin's node receives the user information that user node is sent, and the user information includes at least user position
Confidence breath.In some possible implementations, user information can also include auxiliary information, and auxiliary information user auxiliary is true
Recognize user information whether exception or user it is whether in danger.As the example of the application, auxiliary information includes the user
At least one of the remaining capacity of node, the operating condition of the user node, movement speed, user's message information.
It should be noted that the form that user information is data packet is sent, user node is added when sending data packet
There is user's signature, verified to receive the node of the data packet, to determine data packet validity.
S402: verifying the user information, and the signature endorsement for the user information is generated when being verified.
Specifically, kith and kin's node can use the signature of the public key verifications user information of user node, realizes and believes user
The verifying of breath, in some cases, kith and kin's node can also also test the content of user information after signature verification passes through
Card.
When being verified, kith and kin's node generates the signature endorsement for user information, to characterize kith and kin's node to this
The trust of user information.
S403: Xiang Suoshu user node sends the signature endorsement, indicates that the user node is endorsed according to the signature
The user information for meeting endorsement strategy is sent to block node out.
Kith and kin's node returns to the signature endorsement for user information to user node, in this way, user node can be according to label
Name, which endorses to send to block node out, meets the tactful user information of endorsement.In the present embodiment, a certain kith and kin's node returns to signature
Endorsement is not characterized endorses successfully for the user information, but determination is endorsed successfully when user information meets endorsement strategy.
Endorsement strategy can be set according to actual needs, such as can be set to the endorsement strategy based on quantity, such as be more than
The stage of half returns to signature endorsement, it is determined that endorses successfully, in another example can be set to the endorsement plan based on endorsement to order node
Slightly, specify certain nodes to endorse, formed one endorsement node set, when complete one endorsement node combine signature,
That is coalition signature, it is determined that endorse successfully.
User node determines the user information for meeting endorsement strategy according to the signature endorsement received, then to block section out
Point sends the user information for meeting endorsement strategy.Wherein, the block node out is the user node and kith and kin's node root
According to common recognition algorithm reach common understanding and determine.
S404: the block that block node is packaged according to the user information out is received, and is passed through in block verification
It afterwards, will be in the block typing block chain.
Block node is packaged block according to the user information received out, then block is broadcasted to block chain network, in this way, close
Friendly node receives the block, and verifies to block, will be in block typing block chain after block verification passes through.
Further, kith and kin's node is also based on user information and determines whether user is in danger, and in alarm in danger.Tool
Body, if interval preset time does not receive the user information that the user node is sent, it is determined that user is in danger, and to security
Node sends the user in the trace information of preceding designated time period in danger, and the trace information is remembered according in the block chain
What the user information of record generated.
In some possible implementations, the user information further includes auxiliary information, and the auxiliary information includes institute
State the remaining capacity of user node, the operating condition of the user node, movement speed, user leave a message information at least one
Kind, if interval preset time does not receive the user information that the user node is sent, the auxiliary information is shown, with instruction
Kith and kin determine whether user is in danger according to the auxiliary information, can be with when kith and kin determine that user is in danger based on the auxiliary information
By alarm control triggering alarm operation, kith and kin's node is operated in response to user by the alarm of alarm control triggering, Xiang Anbao
Node sends the user in the trace information of preceding designated time period in danger.
From the foregoing, it will be observed that the embodiment of the present application provides a kind of data processing method, kith and kin's node receives user node and sends
User information, the user information include at least customer position information, then verify the user information, and be verified
Shi Shengcheng endorses for the signature of the user information, and Xiang Suoshu user node sends the signature endorsement, indicates the user
Node is endorsed according to the signature sends the user information of satisfaction endorsement strategy to block node out, followed by the reception block section out
The block that is packaged according to the user information of point, and after the block verifies and passes through, by the block typing block chain, such as
This, each node of block chain network, which is safeguarded, user's trip relevant information, when user is in danger, any one node
To provide related data of going on a journey, to ensure user security, also, user goes on a journey related data only in block chain network and security side
Middle circulation avoids privacy leakage risk.
Data processing method provided by the embodiments of the present application is applied to trip scene, can close trip field to appoint in life
Scape provides simple and fast safety auxiliary.For example have no mishap to the parent of the various duty dealers of single living, children in school, old man
Trip, kith and kin's pleasure trip on foot, jungle field exploration etc..
As an example, when user rides in the late into the night, security strategy can be set as the user of input in every 10 minutes is certainly
Password is defined, since speed is very fast, and this is believed using time shorter position of per minute or 30s collection that can be set as
It ceases and to the whole network broadcasting user location information.In user's riding process, every 10 minutes points open terminal, input password, complete primary
Safety verification.If user normally arrives at the destination, this use can be terminated.If the non-normal termination of user uses, still
Also it can then cause the alarm of kith and kin's node without input password in 10 minutes.
Explanation is explained to data processing method provided by the present application above by embodiment, with above-mentioned data processing
Method is corresponding, and the embodiment of the present application also provides a kind of data processing equipments, next, explaining to the device
Bright, referring to Fig. 5, which includes:
Acquisition unit 510, for acquiring user information, the user information includes at least customer position information;
Radio unit 520, for broadcasting the user information to block chain network;
Receiving unit 530, what kith and kin's node for receiving user node in block chain network was sent is directed to the user
The signature of information is endorsed;
Transmission unit 540, if determining that the user information meets endorsement strategy for endorsing based on the signature, to out
Block node sends the user information, and the instruction block node out is according to user information packing block and the whole network broadcast
Block, the block node out are that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit 550, for receiving the block, and after block verification passes through, by block typing area
In block chain.
Optionally, described device 500 further include:
Determination unit, for determining whether user is in danger according to default safety regulation;
The transmission unit 540 is also used to if so, sending the user in preceding designated time period in danger to security node
Trace information, the trace information is generated according to the user information recorded in the block chain.
Optionally, the determination unit is specifically used for:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, then
Determine that user is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, then
Determine that user is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that use
Family is in danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that use
Family is in danger.
Optionally, the transmission unit is also used to:
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user at the appointed time
The trace information of section, the trace information is generated according to the user information recorded in the block chain.
Optionally, the acquisition unit 510 is specifically used for:
Frequency acquisition is determined according to the remaining capacity of the user node and movement speed;
User information is acquired according to the frequency acquisition.
Optionally, the user information further includes auxiliary information, and the auxiliary information includes the residue of the user node
At least one of electricity, the operating condition of the user node, movement speed, user's message information.
The embodiment of the present application also provides another data processing equipments, and referring to Fig. 6, which includes:
Receiving unit 610, for receiving the user information of user node transmission, the user information includes at least user position
Confidence breath;
Generation unit 620 is generated for verifying the user information, and when being verified for the user information
Signature endorsement;
Transmission unit 630 indicates the user node according to institute for sending the signature endorsement to the user node
It states signature and endorses and meet the user information of endorsement strategy to the transmission of block node out, wherein the block node out is that the user saves
Point and kith and kin's node according to common recognition algorithm reach common understanding and determine;
Recording unit 640, for receiving the block that block node is packaged according to the user information out, and in the area
It, will be in the block typing block chain after block check passes through.
Optionally, described device 600 further include:
Determination unit, if not receiving the user information that the user node is sent for being spaced preset time, it is determined that
User is in danger;
The transmission unit is also used to send the user to security node and believes in the track of preceding designated time period in danger
Breath, the trace information is generated according to the user information recorded in the block chain.
Optionally, the user information further includes auxiliary information, and the auxiliary information includes the residue of the user node
At least one of electricity, the operating condition of the user node, movement speed, user's message information;
Described device 600 further include:
Display unit is shown if not receiving the user information that the user node is sent for being spaced preset time
The auxiliary information, to indicate kith and kin determine whether user is in danger according to the auxiliary information;
The transmission unit is also used to the alarm operation in response to user by alarm control triggering, Xiang Anbao node hair
Send the user in the trace information of preceding designated time period in danger, the trace information is according to the use recorded in the block chain
What family information generated.
Based on above-mentioned data processing equipment provided by the embodiments of the present application, the embodiment of the present application also provides at a kind of data
Equipment is managed, which is terminal device, makees exemplary theory below with reference to hardware configuration of the Fig. 7 to the terminal device
Bright, as shown in fig. 7, for ease of description, illustrating only part relevant to the embodiment of the present application, particular technique details is not disclosed
, please refer to the embodiment of the present application method part.The terminal device can be include mobile phone, tablet computer, personal digital assistant
(full name in English: Personal Digital Assistant, english abbreviation: PDA), point-of-sale terminal (full name in English: Point of
Sales, english abbreviation: POS), any terminal device such as vehicle-mounted computer, taking the terminal as an example:
Fig. 7 shows the block diagram of the part-structure of mobile phone relevant to terminal provided by the embodiments of the present application.With reference to figure
7, mobile phone includes: radio frequency (full name in English: Radio Frequency, english abbreviation: RF) circuit 710, memory 720, input list
Member 730, display unit 740, sensor 750, voicefrequency circuit 760, Wireless Fidelity (full name in English: wireless fidelity,
English abbreviation: WiFi) components such as module 770, processor 780 and power supply 790.It will be understood by those skilled in the art that Fig. 7
Shown in handset structure do not constitute the restriction to mobile phone, may include than illustrating more or fewer components, or combination
Certain components or different component layouts.
It is specifically introduced below with reference to each component parts of the Fig. 7 to mobile phone:
RF circuit 710 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base station
After downlink information receives, handled to processor 780;In addition, the data for designing uplink are sent to base station.In general, RF circuit 710
Including but not limited to antenna, at least one amplifier, transceiver, coupler, low-noise amplifier (full name in English: Low
Noise Amplifier, english abbreviation: LNA), duplexer etc..In addition, RF circuit 710 can also by wireless communication with network
It is communicated with other equipment.Any communication standard or agreement can be used in above-mentioned wireless communication, and including but not limited to the whole world is mobile logical
News system (full name in English: Global System of Mobile communication, english abbreviation: GSM), general packet
Wireless service (full name in English: General Packet Radio Service, GPRS), CDMA (full name in English: Code
Division Multiple Access, english abbreviation: CDMA), wideband code division multiple access (full name in English: Wideband Code
Division Multiple Access, english abbreviation: WCDMA), long term evolution (full name in English: Long Term
Evolution, english abbreviation: LTE), Email, short message service (full name in English: Short Messaging Service,
SMS) etc..
Memory 720 can be used for storing software program and module, and processor 780 is stored in memory 720 by operation
Software program and module, thereby executing the various function application and data processing of mobile phone.Memory 720 can mainly include
Storing program area and storage data area, wherein storing program area can application journey needed for storage program area, at least one function
Sequence (such as sound-playing function, image player function etc.) etc.;Storage data area can be stored to be created according to using for mobile phone
Data (such as audio data, phone directory etc.) etc..It, can be in addition, memory 720 may include high-speed random access memory
Including nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-states
Part.
Input unit 730 can be used for receiving the number or character information of input, and generate with the user setting of mobile phone with
And the related key signals input of function control.Specifically, input unit 730 may include that touch panel 731 and other inputs are set
Standby 732.Touch panel 731, also referred to as touch screen, collect user on it or nearby touch operation (such as user use
The operation of any suitable object or attachment such as finger, stylus on touch panel 731 or near touch panel 731), and root
Corresponding attachment device is driven according to preset formula.Optionally, touch panel 731 may include touch detecting apparatus and touch
Two parts of controller.Wherein, the touch orientation of touch detecting apparatus detection user, and touch operation bring signal is detected,
Transmit a signal to touch controller;Touch controller receives touch information from touch detecting apparatus, and is converted into touching
Point coordinate, then gives processor 780, and can receive order that processor 780 is sent and be executed.Furthermore, it is possible to using electricity
The multiple types such as resistive, condenser type, infrared ray and surface acoustic wave realize touch panel 731.In addition to touch panel 731, input
Unit 730 can also include other input equipments 732.Specifically, other input equipments 732 can include but is not limited to secondary or physical bond
One of disk, function key (such as volume control button, switch key etc.), trace ball, mouse, operating stick etc. are a variety of.
Display unit 740 can be used for showing information input by user or be supplied to user information and mobile phone it is various
Menu.Display unit 740 may include display panel 741, optionally, can use liquid crystal display (full name in English: Liquid
Crystal Display, english abbreviation: LCD), Organic Light Emitting Diode (full name in English: Organic Light-Emitting
Diode, english abbreviation: OLED) etc. forms configure display panel 741.Further, touch panel 731 can cover display surface
Plate 741 sends processor 780 to determine and touches thing after touch panel 731 detects touch operation on it or nearby
The type of part is followed by subsequent processing device 780 according to the type of touch event and provides corresponding visual output on display panel 741.Though
So in Fig. 7, touch panel 731 and display panel 741 are the input and input for realizing mobile phone as two independent components
Function, but in some embodiments it is possible to touch panel 731 and display panel 741 is integrated and realize the input of mobile phone and
Output function.
Mobile phone may also include at least one sensor 750, such as optical sensor, motion sensor and other sensors.
Specifically, optical sensor may include ambient light sensor and proximity sensor, wherein ambient light sensor can be according to ambient light
Light and shade adjust the brightness of display panel 741, proximity sensor can close display panel 741 when mobile phone is moved in one's ear
And/or backlight.As a kind of motion sensor, accelerometer sensor can detect (generally three axis) acceleration in all directions
Size, can detect that size and the direction of gravity when static, can be used to identify the application of mobile phone posture, (for example horizontal/vertical screen is cut
Change, dependent game, magnetometer pose calibrating), Vibration identification correlation function (such as pedometer, tap) etc.;May be used also as mobile phone
The other sensors such as gyroscope, barometer, hygrometer, thermometer, the infrared sensor of configuration, details are not described herein.
Voicefrequency circuit 760, loudspeaker 761, microphone 762 can provide the audio interface between user and mobile phone.Audio-frequency electric
Electric signal after the audio data received conversion can be transferred to loudspeaker 761, be converted to sound by loudspeaker 761 by road 760
Signal output;On the other hand, the voice signal of collection is converted to electric signal by microphone 762, is turned after being received by voicefrequency circuit 760
It is changed to audio data, then by after the processing of audio data output processor 780, such as another mobile phone is sent to through RF circuit 710,
Or audio data is exported to memory 720 to be further processed.
WiFi belongs to short range wireless transmission technology, and mobile phone can help user's transceiver electronics postal by WiFi module 770
Part, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 7 is shown
WiFi module 770, but it is understood that, and it is not belonging to must be configured into for mobile phone, it can according to need do not changing completely
Become in the range of the essence of invention and omits.
Processor 780 is the control centre of mobile phone, using the various pieces of various interfaces and connection whole mobile phone, is led to
It crosses operation or executes the software program and/or module being stored in memory 720, and call and be stored in memory 720
Data execute the various functions and processing data of mobile phone, to carry out integral monitoring to mobile phone.Optionally, processor 780 can wrap
Include one or more processing units;Preferably, processor 780 can integrate application processor and modem processor, wherein answer
With the main processing operation system of processor, user interface and application program etc., modem processor mainly handles wireless communication.
It is understood that above-mentioned modem processor can not also be integrated into processor 780.
Mobile phone further includes the power supply 790 (such as battery) powered to all parts, it is preferred that power supply can pass through power supply pipe
Reason system and processor 780 are logically contiguous, to realize management charging, electric discharge and power managed by power-supply management system
Etc. functions.
Although being not shown, mobile phone can also include camera, bluetooth module etc., and details are not described herein.
In the embodiment of the present application, processor 780 included by the terminal is also with the following functions:
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the label for the user information that kith and kin's node of user node described in the block chain network is sent
Name endorsement;
If determining that the user information meets endorsement strategy based on signature endorsement, the use is sent to block node out
Family information, instruction it is described go out block node block is packaged according to the user information and the whole network broadcasts the block, it is described go out block section
Point is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
Optionally, processor 780 can be also used for executing any one reality of data processing method in the embodiment of the present application
The step of applying mode.
The embodiment of the present application also provides another terminal devices, with the identical structure of Fig. 7, processor also have with
Lower function:
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block out
Node sends the user information for meeting endorsement strategy, wherein the block node out is the user node and kith and kin's node
According to common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will
In the block typing block chain.
Optionally, processor 780 can be also used for executing any one reality of data processing method in the embodiment of the present application
The step of applying mode.
The embodiment of the present application also provides a kind of computer readable storage medium, for storing program code, the program code
For executing any one embodiment in a kind of data processing method described in foregoing individual embodiments.
The embodiment of the present application also provides a kind of computer program product including instruction, when run on a computer,
So that computer executes any one embodiment in a kind of data processing method described in foregoing individual embodiments.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description,
The specific work process of device and unit, can refer to corresponding processes in the foregoing method embodiment, and details are not described herein.
In several embodiments provided herein, it should be understood that disclosed system, device and method can be with
It realizes by another way.For example, the apparatus embodiments described above are merely exemplary, for example, the unit
It divides, only a kind of logical function partition, there may be another division manner in actual implementation, such as multiple units or components
It can be combined or can be integrated into another system, or some features can be ignored or not executed.Another point, it is shown or
The mutual coupling, direct-coupling or communication connection discussed can be through some interfaces, the indirect coupling of device or unit
It closes or communicates to connect, can be electrical property, mechanical or other forms.
The unit as illustrated by the separation member may or may not be physically separated, aobvious as unit
The component shown may or may not be physical unit, it can and it is in one place, or may be distributed over multiple
In network unit.It can select some or all of unit therein according to the actual needs to realize the mesh of this embodiment scheme
's.
It, can also be in addition, each functional unit in each embodiment of the application can integrate in one processing unit
It is that each unit physically exists alone, can also be integrated in one unit with two or more units.Above-mentioned integrated list
Member both can take the form of hardware realization, can also realize in the form of software functional units.
If the integrated unit is realized in the form of SFU software functional unit and sells or use as independent product
When, it can store in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially
The all or part of the part that contributes to existing technology or the technical solution can be in the form of software products in other words
It embodies, which is stored in a storage medium, including some instructions are used so that a computer
Equipment (can be personal computer, server or the network equipment etc.) executes the complete of each embodiment the method for the application
Portion or part steps.And storage medium above-mentioned includes: USB flash disk, mobile hard disk, read-only memory (full name in English: Read-Only
Memory, english abbreviation: ROM), random access memory (full name in English: Random Access Memory, english abbreviation:
RAM), the various media that can store program code such as magnetic or disk.
It should be appreciated that in this application, " at least one (item) " refers to one or more, and " multiple " refer to two or two
More than a."and/or" indicates may exist three kinds of relationships, for example, " A and/or B " for describing the incidence relation of affiliated partner
It can indicate: only exist A, only exist B and exist simultaneously tri- kinds of situations of A and B, wherein A, B can be odd number or plural number.Word
Symbol "/" typicallys represent the relationship that forward-backward correlation object is a kind of "or"." at least one of following (a) " or its similar expression, refers to
Any combination in these, any combination including individual event (a) or complex item (a).At least one of for example, in a, b or c
(a) can indicate: a, b, c, " a and b ", " a and c ", " b and c ", or " a and b and c ", and wherein a, b, c can be individually, can also
To be multiple.
The above, above embodiments are only to illustrate the technical solution of the application, rather than its limitations;Although referring to before
Embodiment is stated the application is described in detail, those skilled in the art should understand that: it still can be to preceding
Technical solution documented by each embodiment is stated to modify or equivalent replacement of some of the technical features;And these
It modifies or replaces, the spirit and scope of each embodiment technical solution of the application that it does not separate the essence of the corresponding technical solution.
Claims (10)
1. a kind of data processing method, which is characterized in that applied to the user node in block chain network, which comprises
User information is acquired, the user information includes at least customer position information;
The user information is broadcasted to the block chain network;
Receive the signature back for the user information that kith and kin's node of user node described in the block chain network is sent
Book;
If determining that the user information meets endorsement strategy based on signature endorsement, user's letter is sent to block node out
It ceases, block node is gone out described in instruction, and according to user information packing block, simultaneously the whole network broadcasts the block, and the block node out is
Node in the block chain network is reached common understanding according to common recognition algorithm and is determined;
The block is received, and after block verification passes through, it will be in the block typing block chain.
2. the method according to claim 1, wherein the method also includes:
Determine whether user is in danger according to default safety regulation;
If so, sending the user in the trace information of preceding designated time period in danger to security node, the trace information is
It is generated according to the user information recorded in the block chain.
3. according to the method described in claim 2, it is characterized in that, the basis presets safety regulation determines whether user is in danger
Include:
It does not receive user in interval at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that
User is in danger;Alternatively,
It does not receive user after mobile distance to a declared goal and instruction caused by specified operation is executed to the user node, it is determined that
User is in danger;Alternatively,
It does not receive user at the appointed time and instruction caused by specified operation is executed to the user node, it is determined that Yong Huyu
Danger;Alternatively,
User is not received in designated place, instruction caused by specified operation is executed to the user node, it is determined that Yong Huyu
Danger.
4. the method according to claim 1, wherein the method also includes:
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user at the appointed time section
Trace information, the trace information are generated according to the user information recorded in the block chain.
5. method according to any one of claims 1 to 4, which is characterized in that the acquisition user information includes:
Frequency acquisition is determined according to the remaining capacity of the user node and movement speed;
User information is acquired according to the frequency acquisition.
6. method according to any one of claims 1 to 4, which is characterized in that the user information further includes auxiliary information,
The auxiliary information includes the remaining capacity of the user node, the operating condition of the user node, movement speed, Yong Huliu
Say at least one of information.
7. a kind of data processing method, which is characterized in that applied to kith and kin's node of user node in block chain network, the side
Method includes:
The user information that user node is sent is received, the user information includes at least customer position information;
The user information is verified, and generates the signature endorsement for the user information when being verified;
The signature endorsement is sent to the user node, indicates that the user node is endorsed according to the signature to block node out
Send the user information for meeting endorsement strategy, wherein it is described go out block node be the user node and kith and kin's node according to
Common recognition algorithm reach common understanding and determine;
The block that block node is packaged according to the user information out is received, and after block verification passes through, it will be described
In block typing block chain.
8. the method according to the description of claim 7 is characterized in that the method also includes:
If interval preset time does not receive the user information that the user node is sent, it is determined that user is in danger, and to security
Node sends the user in the trace information of preceding designated time period in danger, and the trace information is remembered according in the block chain
What the user information of record generated.
9. the method according to the description of claim 7 is characterized in that the user information further includes auxiliary information, the auxiliary
Information include the remaining capacity of the user node, the operating condition of the user node, movement speed, user leave a message information in
At least one;
If interval preset time does not receive the user information that the user node is sent, the auxiliary information is shown, to refer to
Show kith and kin determine whether user is in danger according to the auxiliary information;
In response to user by the alarm operation of alarm control triggering, Xiang Anbao node sends the user when in danger preceding specified
Between section trace information, the trace information is generated according to the user information recorded in the block chain.
10. a kind of data processing equipment, which is characterized in that described device includes:
Acquisition unit, for acquiring user information, the user information includes at least customer position information;
Radio unit, for broadcasting the user information to block chain network;
Receiving unit, the label for the user information that kith and kin's node for receiving user node in block chain network is sent
Name endorsement;
Transmission unit, if for determining that the user information meets endorsement strategy based on signature endorsement, to block node out
The user information is sent, the instruction block node out is packaged block according to the user information and the whole network broadcasts the block,
The block node out is that the node in the block chain network is reached common understanding according to common recognition algorithm and determined;
Recording unit will be in the block typing block chain for receiving the block, and after block verification passes through.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910650874.4A CN110365685A (en) | 2019-07-18 | 2019-07-18 | A kind of data processing method, device, equipment and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910650874.4A CN110365685A (en) | 2019-07-18 | 2019-07-18 | A kind of data processing method, device, equipment and computer readable storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110365685A true CN110365685A (en) | 2019-10-22 |
Family
ID=68221077
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910650874.4A Pending CN110365685A (en) | 2019-07-18 | 2019-07-18 | A kind of data processing method, device, equipment and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110365685A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798807A (en) * | 2019-11-06 | 2020-02-14 | 北京海益同展信息科技有限公司 | Method, apparatus, computer device and medium for recording vehicle trajectory |
CN112532416A (en) * | 2019-12-26 | 2021-03-19 | 数海信息技术有限公司 | Security state information management method and system based on consensus mechanism |
CN112564919A (en) * | 2020-12-04 | 2021-03-26 | 广东投盟科技有限公司 | Identity authentication method, identity authentication equipment and computer readable storage medium |
CN112883106A (en) * | 2020-12-31 | 2021-06-01 | 北京百度网讯科技有限公司 | Method, device, equipment and medium for determining out-of-block node of block chain |
CN114254050A (en) * | 2022-03-02 | 2022-03-29 | 恒生电子股份有限公司 | Block chain network consensus preloading method, device, equipment and storage medium |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160240063A1 (en) * | 2013-10-25 | 2016-08-18 | Beijing Qihoo Technology Company Limited | Position information prompting method, device and system |
CN107045650A (en) * | 2016-10-25 | 2017-08-15 | 罗轶 | Net based on block chain about car |
CN107358484A (en) * | 2017-05-27 | 2017-11-17 | 上海与德科技有限公司 | A kind of net about car monitoring method and system |
CN108446992A (en) * | 2018-05-11 | 2018-08-24 | 济南浪潮高新科技投资发展有限公司 | A kind of net connection accurate Accident Handling Method of automobile based on block chain |
CN108711090A (en) * | 2018-05-15 | 2018-10-26 | 华南农业大学 | A kind of non-stop layer chauffeur protocol method and system based on block chain |
EP3410156A1 (en) * | 2017-06-02 | 2018-12-05 | Nokia Technologies Oy | Positioning information verification |
CN108961669A (en) * | 2018-07-19 | 2018-12-07 | 上海小蚁科技有限公司 | The safe early warning method and device, storage medium, server of net about vehicle |
CN109146490A (en) * | 2018-10-11 | 2019-01-04 | 北京京东尚科信息技术有限公司 | block generation method, device and system |
CN109389506A (en) * | 2018-10-23 | 2019-02-26 | 四川大学 | Detection method for transaction data source under super account book multichain scene |
CN109493564A (en) * | 2018-11-28 | 2019-03-19 | 阿里巴巴集团控股有限公司 | A kind of alarm method, apparatus and system |
CN109637082A (en) * | 2018-12-24 | 2019-04-16 | 航天信息股份有限公司 | Net about vehicle maintenance device and method |
CN109767212A (en) * | 2018-10-11 | 2019-05-17 | 平安科技(深圳)有限公司 | Assets exchanging method, system, terminal and storage medium based on block chain |
-
2019
- 2019-07-18 CN CN201910650874.4A patent/CN110365685A/en active Pending
Patent Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160240063A1 (en) * | 2013-10-25 | 2016-08-18 | Beijing Qihoo Technology Company Limited | Position information prompting method, device and system |
CN107045650A (en) * | 2016-10-25 | 2017-08-15 | 罗轶 | Net based on block chain about car |
CN107358484A (en) * | 2017-05-27 | 2017-11-17 | 上海与德科技有限公司 | A kind of net about car monitoring method and system |
EP3410156A1 (en) * | 2017-06-02 | 2018-12-05 | Nokia Technologies Oy | Positioning information verification |
CN108446992A (en) * | 2018-05-11 | 2018-08-24 | 济南浪潮高新科技投资发展有限公司 | A kind of net connection accurate Accident Handling Method of automobile based on block chain |
CN108711090A (en) * | 2018-05-15 | 2018-10-26 | 华南农业大学 | A kind of non-stop layer chauffeur protocol method and system based on block chain |
CN108961669A (en) * | 2018-07-19 | 2018-12-07 | 上海小蚁科技有限公司 | The safe early warning method and device, storage medium, server of net about vehicle |
CN109146490A (en) * | 2018-10-11 | 2019-01-04 | 北京京东尚科信息技术有限公司 | block generation method, device and system |
CN109767212A (en) * | 2018-10-11 | 2019-05-17 | 平安科技(深圳)有限公司 | Assets exchanging method, system, terminal and storage medium based on block chain |
CN109389506A (en) * | 2018-10-23 | 2019-02-26 | 四川大学 | Detection method for transaction data source under super account book multichain scene |
CN109493564A (en) * | 2018-11-28 | 2019-03-19 | 阿里巴巴集团控股有限公司 | A kind of alarm method, apparatus and system |
CN109637082A (en) * | 2018-12-24 | 2019-04-16 | 航天信息股份有限公司 | Net about vehicle maintenance device and method |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110798807A (en) * | 2019-11-06 | 2020-02-14 | 北京海益同展信息科技有限公司 | Method, apparatus, computer device and medium for recording vehicle trajectory |
CN112532416A (en) * | 2019-12-26 | 2021-03-19 | 数海信息技术有限公司 | Security state information management method and system based on consensus mechanism |
CN112564919A (en) * | 2020-12-04 | 2021-03-26 | 广东投盟科技有限公司 | Identity authentication method, identity authentication equipment and computer readable storage medium |
CN112883106A (en) * | 2020-12-31 | 2021-06-01 | 北京百度网讯科技有限公司 | Method, device, equipment and medium for determining out-of-block node of block chain |
CN112883106B (en) * | 2020-12-31 | 2024-02-13 | 北京百度网讯科技有限公司 | Block-out node determining method, device, equipment and medium of block chain |
CN114254050A (en) * | 2022-03-02 | 2022-03-29 | 恒生电子股份有限公司 | Block chain network consensus preloading method, device, equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110365685A (en) | A kind of data processing method, device, equipment and computer readable storage medium | |
CN104796385B (en) | Terminal binding method, apparatus and system | |
JP6783382B2 (en) | Methods, devices, and mobile devices for associating notification messages | |
CN105468608B (en) | Crowdsourcing-based data acquisition and processing method and system | |
CN106412311B (en) | A kind of data transmission method and terminal device | |
CN106657690A (en) | Method and device for preventing phone scam, and mobile terminal | |
CN104901805B (en) | A kind of identification authentication methods, devices and systems | |
CN106470269A (en) | A kind of method and apparatus of antitheft mobile phone | |
CN110278329B (en) | Notification message management method and mobile terminal | |
CN110049496A (en) | A kind of method for network access and mobile terminal | |
CN108389028A (en) | The method, device and mobile terminal of stroke reminding | |
CN108510612A (en) | Parking lot night watching method, system and computer readable storage medium | |
CN106383780A (en) | Monkey test method and device | |
CN106331370A (en) | Data transmission method and terminal device | |
CN108881103A (en) | A kind of method and device accessing network | |
CN106130735A (en) | The processing method of a kind of communication information, device and mobile terminal | |
CN110457888A (en) | A kind of verifying code imput method, device, electronic equipment and storage medium | |
CN106330889A (en) | Method and apparatus for deblocking account | |
CN108494786A (en) | A kind of emergency vehicle based reminding method, server and mobile terminal | |
CN109446834A (en) | A kind of right management method and mobile terminal of application program | |
CN106131133A (en) | Browsing history information inspection method, Apparatus and system | |
CN109819016A (en) | Information issuing method, message receiving method and mobile terminal based on block chain | |
CN104899488B (en) | Numeric value transfer and device | |
CN108551525A (en) | A kind of state of motion track determines method and mobile terminal | |
CN108632454A (en) | Information processing method and device, computer readable storage medium, terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20191022 |
|
RJ01 | Rejection of invention patent application after publication |