CN107528855A - A kind of data verification method and server - Google Patents

A kind of data verification method and server Download PDF

Info

Publication number
CN107528855A
CN107528855A CN201710882095.8A CN201710882095A CN107528855A CN 107528855 A CN107528855 A CN 107528855A CN 201710882095 A CN201710882095 A CN 201710882095A CN 107528855 A CN107528855 A CN 107528855A
Authority
CN
China
Prior art keywords
block chain
server
client
block
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710882095.8A
Other languages
Chinese (zh)
Inventor
周志刚
陈少杰
张文明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201710882095.8A priority Critical patent/CN107528855A/en
Priority to PCT/CN2017/108051 priority patent/WO2019061627A1/en
Publication of CN107528855A publication Critical patent/CN107528855A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25808Management of client data

Abstract

The embodiment of the invention discloses a kind of data verification method and server.Present invention method includes:First block chain is issued to the roomed all clients of live platform institute by server, to cause each client to generate the second block chain after receiving the first block chain, and the second block chain is sent to server;Server receives all second block chains that all clients return;Server in all second block chains, determine identical second block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines that client corresponding to the second legal block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating pressure of server, have realized that the minority is subordinate to the majority, the thought of decentralization in the embodiment of the present invention.

Description

A kind of data verification method and server
Technical field
The present invention relates to net cast technical field, more particularly to a kind of data verification method and server.
Background technology
At present, as the progress of the network communications technology and the speed-raising of broadband network, network direct broadcasting have obtained more and more Development and application.Especially in live field of playing, increasing spectators can watch the live of game main broadcaster.
And part main broadcaster can improve the spectator attendance in room while viewing by the method for brush popularity, received so as to obtain Benefit.The concrete implementation mode of its brush popularity is then on an extraordinary server of performance, by cracking live platform Procotol, while forge substantial amounts of false client user and log on direct broadcasting room simultaneously, so as to forge the method for mass viewer audiences, The popularity data of direct broadcasting room is brushed higher.
Therefore a kind of method is then needed to be capable of detecting when the direct broadcasting room with the presence or absence of the false client of forgery for live platform Hold the situation of a large amount of brush popularities.
The content of the invention
The embodiments of the invention provide a kind of data verification method and server, and false client is forged to detect direct broadcasting room The situation of brush popularity.
In a first aspect, this application provides a kind of data verification method, this method includes:
Server issues the first block chain to the roomed all clients of live platform institute, to cause each client to receive The second block chain is generated after to the first block chain, and the second block chain is sent to the server;
The server receives all second block chains that all clients return;
The server in all second block chains, determine identical second block chain quantity it is most for legal second Block chain, it is other for the second illegal block chain;
The server determines that client corresponding to the second legal block chain is legitimate client, the second illegal block Client corresponding to chain is illegitimate client.
Further, the server issue the first block chain to the roomed all clients of live platform institute it Before, methods described also includes:
The server generates the first block chain.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation Obtained data are filled after one fixed data encryption.
Further, methods described also includes:
If the server, which is received in all second block chains that all clients return, does not have the live platform target The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really The fixed destination client is illegitimate client.
Further, the server is in all second block chains, determine identical second block chain quantity it is most be The second legal block chain, it is other for the second illegal block chain the step of, including:
The server is using each second block chain in all second block chains as a numerical value;
The server determines that the numerical value that quantity is most in all numerical value is Constant numerical values, by corresponding to Constant numerical values second Block chain is defined as the second legal block chain, other for the second illegal block chain.
Second aspect, the application provide a kind of server, and the server includes:
Sending module, it is each to cause for issuing the first block chain to the roomed all clients of live platform institute Client generates the second block chain after receiving the first block chain, and the second block chain is sent into the server;
Receiving module, for receiving all second block chains of all clients return;
First determining module, in all second block chains, determine identical second block chain quantity it is most to close Second block chain of method, it is other for the second illegal block chain;
Second determining module, for determining that client corresponding to the second legal block chain is legitimate client, illegal Client corresponding to second block chain is illegitimate client.
Further, the server also includes:
Generation module, for issuing the first block chain to the roomed all clients of live platform institute in the sending module Before end, the first block chain is generated.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation Obtained data are filled after one fixed data encryption.
Further, second determining module is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really The fixed destination client is illegitimate client.
Further, second determining module is specifically used for:
Using each second block chain in all second block chains as a numerical value, determine that quantity in all numerical value is most Numerical value is Constant numerical values, the second block chain corresponding to Constant numerical values is defined as to the second legal block chain, other is illegal Second block chain.
The third aspect, the present invention also provide a kind of server, including:Memory, processor and is stored in the memory Computer program that is upper and can running on the processor, wherein, can be with during computer program described in the computing device Realize any described method in first aspect.
Fourth aspect, the present invention also provide a kind of computer-readable recording medium, are stored thereon with computer program, the journey Any described method in first aspect is realized when sequence is executed by processor.
The embodiment of the present invention issues the first block chain to the roomed all clients of live platform institute by server, with So that each client generates the second block chain after receiving the first block chain, and the second block chain is sent to server;Service Device receives all second block chains that all clients return;Server determines identical secondth area in all second block chains Block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines legal second Client corresponding to block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.This hair After server issues the first block chain in bright embodiment, the new block chain numerical value that legal client is calculated is the same , therefore the new block chain that server is reported by the client received, obey a small number of principles by most, it is believed that phase With new block chain quantity it is maximum be legal block chain, and measure and on the low side be then considered illegal block chain so that Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating of server Pressure, server only need to carry out the result of block chain distributed number to determine legal block chain, and realization is a small number of to be obeyed Majority, the thought of decentralization.
Brief description of the drawings
Fig. 1 is one embodiment schematic diagram of data verification method in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of data verification method in the embodiment of the present invention;
Fig. 3 is one embodiment schematic diagram of S103 in embodiment illustrated in fig. 1;
Fig. 4 is one embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of server in the embodiment of the present invention;
Fig. 6 is another embodiment schematic diagram of server in the embodiment of the present invention.
Embodiment
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model that the present invention protects Enclose.
The (if present)s such as term " first ", " second " in description and claims of this specification and above-mentioned accompanying drawing It is for distinguishing similar object, without for describing specific order or precedence.It should be appreciated that the number so used According to can exchange in the appropriate case, so as to the embodiments described herein can with except the content for illustrating or describing herein with Outer order is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that cover non-exclusive bag Contain, for example, containing the process of series of steps or unit, method, system, product or equipment is not necessarily limited to what is clearly listed Those steps or unit, but may include not listing clearly or intrinsic for these processes, method, product or equipment Other steps or unit.
Referring to Fig. 1, one embodiment of data verification method includes in the embodiment of the present invention:
S101, server issue the first block chain to the roomed all clients of live platform institute, to cause each visitor Family end generates the second block chain after receiving the first block chain, and the second block chain is sent into server;
In the present embodiment, server i.e. server corresponding to live platform, client can be user terminal, such as hand The intelligent terminals such as machine, tablet personal computer, target room are the direct broadcasting room that main broadcaster establishes on live platform, and destination client is to enter to be somebody's turn to do The client of target direct broadcasting room.Block chain be it is a kind of sequentially in time by data block by sequentially be connected in a manner of be combined into A kind of linked data structure, and the distributed account book that can not be distorted He can not forge ensured in a manner of cryptography.
S102, server receive all second block chains that all clients return;
Specifically, the second block chain is in step S101, each client in target room is receiving the first block chain Generate afterwards.
S103, server in all second block chains, determine identical second block chain quantity it is most for legal the Two block chains, it is other for the second illegal block chain;
Because in the user of whole live platform, validated user must exceed disabled user, then it can be assumed that most The correct quantity of numerical value for being reported to the second block chain of server eventually should be most, so as to the second block chain of other values It is then illegal.
S104, server determine that client corresponding to the second legal block chain is legitimate client, the secondth illegal area Client corresponding to block chain is illegitimate client.
The embodiment of the present invention issues the first block chain to the roomed all clients of live platform institute by server, with So that each client generates the second block chain after receiving the first block chain, and the second block chain is sent to server;Service Device receives all second block chains that all clients return;Server determines identical secondth area in all second block chains Block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain;Server determines legal second Client corresponding to block chain is legitimate client, and client corresponding to the second illegal block chain is illegitimate client.This hair After server issues the first block chain in bright embodiment, the new block chain numerical value that legal client is calculated is the same , therefore the new block chain that server is reported by the client received, obey a small number of principles by most, it is believed that phase With new block chain quantity it is maximum be legal block chain, and measure and on the low side be then considered illegal block chain so that Server and the block chain progress legitimacy verifies that need not be reported to each client, have greatly subtracted the calculating of server Pressure, server only need to carry out the result of block chain distributed number to determine legal block chain, and realization is a small number of to be obeyed Majority, the thought of decentralization.
As shown in Fig. 2 the server issue the first block chain to the roomed all clients of live platform institute it Before, method can further include in the embodiment of the present invention:
S105, server generate the first block chain.
In the embodiment of the present invention, the first block chain and the second block chain can have identical data structure; The data structure can include the block number of block chain, the cryptographic Hash of previous block chain, the timestamp and block of current time Chain performance data, the block chain performance data are the random data that the server generates at random, or solid for generation one Determine to fill obtained data after data encryption, now, the data structure of the first block chain can be the data knot of foregoing description Structure, the first block chain can include the block number of the first block chain, the cryptographic Hash of previous block chain, the timestamp of current time And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation Obtained data are filled after one fixed data encryption.In the embodiment of the present invention, above-mentioned data structure is implemented as follows:
Struct BlockData{
Int64index;
String previousHash;
Int64timestamp;
String data;
String hash;
}
Wherein, index is used for representing the block number of block chain, is incremented by generally since 0;PreviousHash represents previous The HASH values of block chain;Timestamp represents current time stamp;Data then represents splicing (the i.e. above-mentioned block chain of some data Performance data), the content of this data field is then according to designed by the function of being completed required for block chain, is directed to this paper's All room popularities are detected, block chain performance data data can be that server generates one piece of data at random, and this data is to all Client all uses same value, fills this value during server initiation, client then directly takes this when generating new block chain Value;Hash then represents the hash values of the content of this current block chain.After the design for having this block chain, when server receives Client, then can be by verifying, to judge its legitimacy newly after caused block chain to the data of the inside.
In the embodiment of the present invention, the first block chain can be the original block chain of server generation, when the first block chain is During original block chain, original block chain is due to being first block chain generated, and the block number of original block chain is 0, timestamp It is then current time, the hash values of a upper block chain are 0, and block chain performance data (above-mentioned data data) is then entered for server The random generation of row, server are generated to fill after a fixed data is encrypted and obtained.
The algorithm that new block chain generates in block chain, block chain initial first are devised in the embodiment of the present invention simultaneously It is that server generates (such as the first block chain), server can be issued to each client for logging on live platform target room End, then the client in the target room receives after original block chain, it is necessary to which algorithm generates next block chain.Specific implementation It is as follows:The data structure of a upper block chain has been got first, and next block chain is then according to a upper block chain Data generated.
In the embodiment of the present invention, it is assumed that the name of a upper block chain is prevblock, the name of newly-generated block chain It is newblock, the process for specifically generating new block chain is as follows:
(1) block number of new block chain is calculated.
Newblock.index=prevblock.index+1;
The block number of i.e. new block chain is that current block number adds 1.
(2) timestamp of new block chain is calculated.
Newblock.timestamp=prevblock.time;
In the embodiment of the present invention, the timestamp of new block chain then uses the timestamp of a upper block chain, because if making With the current time, then the Time Inconsistency that each client is got is likely to result in, so as to cause the hash finally calculated It is worth inconsistent, ultimately results in legal client and the equal block chain of one result cannot get according to identical block chain.
(3) the hash values of a upper block chain for new block chain are calculated.
Newblock.previousHash=prevblock.hash;
Wherein, the hash values of a upper block chain for new block chain are then the hash values of the upper block chain obtained.
(4) the block chain performance data of new block chain is calculated.
Newblock.data=prevblock.data;
The data data of new block chain are then generated at random by server, then filling is that data are that server issues The data of block chain, it in order to reach the new block chain value ultimately generated is one that why so design, which is, in the embodiment of the present invention Sample, if filling out room number or user uid, then the new block chain for eventually resulting in each client all differs Sample.
Certainly, in the embodiment of the present invention, server can also classify to different live rooms, such as according to plate To classify, different plates inserts different random value (block chain performance data), so carries out school to different versions Test, the block chain data of the client corresponding to each plate below room are then the same certainly, can so prevent for The fewer room of popularity, if the substantial amounts of false client of brush, can prevent this special circumstances.In some implementations of the present invention In example, block chain performance data can also all use a same random value to all rooms.
(5) the hash values of new block chain are calculated.
Newblock.hash=HASH (index+previousHash+timestamp+data);
Wherein, the hash values of new block chain be then have new block chain index fields and previousHash fields and Timestamp fields and data fields.
In the embodiment of the present invention, Hash corresponding to cryptographic Hash (HASH) algorithm is unified, and the HASH algorithms can be SHA-256 Algorithm, naturally it is also possible to be other HASH algorithms, such as SHA-1 etc., be not construed as limiting herein.
So far, the algorithm that a new block chain is generated by a block chain is achieved that by above-mentioned steps.And this In inventive embodiments, when client generates the second block chain by receiving the first block chain, i.e., realized using above-mentioned steps.
In addition, in the embodiment of the present invention, the data verification method can further include:If the server receives institute Have the second of the destination client transmission for not having the live platform target room in all second block chains of client return Block chain, and the destination client is current still in the target room, it is determined that the destination client is illegal client End.So it is due to that the client of the brush popularity having has not been aware of the verification of a newly-increased block chain, and normal client End then can all carry out reporting new block chain, therefore it is non-that can directly determine that this does not return to the destination client of the second block chain Method client.
In some embodiments of the invention, as shown in figure 3, above-mentioned steps S103 can specifically include:
S1031, server are using each second block chain in all second block chains as a numerical value;
S1032, server determine that the numerical value that quantity is most in all numerical value is Constant numerical values, by corresponding to Constant numerical values Two block chains are defined as the second legal block chain, other for the second illegal block chain.
In the present embodiment, after server issues the first block chain, the second new block that legal client is calculated Chain numerical value is the second new block chain the same, that server is reported by the client received, is obeyed by majority a small number of Principle, it is believed that the quantity of the second new block chain of identical it is maximum be correct second block chain, and measure and on the low side then recognize To be the second illegal block chain so that server and the second block chain that need not be reported to each client carries out legitimacy Verification, has greatly subtracted the calculating pressure of server, server need not be calculated, it is only necessary to the knot of the second block chain Fruit carries out distributed number to determine legal block, also utilizes the core concept of block chain, the minority is subordinate to the majority, goes to center The thought of change.
The embodiment of server in the embodiment of the present invention is described below.
Referring to Fig. 4, for one embodiment schematic diagram of server in the embodiment of the present invention, the server includes:
Sending module 401, it is every to cause for issuing the first block chain to the roomed all clients of live platform institute Individual client generates the second block chain after receiving the first block chain, and the second block chain is sent into the service Device;
Receiving module 402, for receiving all second block chains of all clients return;
First determining module 403, in all second block chains, determine identical second block chain quantity it is most be The second legal block chain, it is other for the second illegal block chain;
Second determining module 404, for determining that client corresponding to the second legal block chain is legitimate client, illegally The second block chain corresponding to client be illegitimate client.
Further, as shown in figure 5, the server also includes:
Generation module 405, it is roomed all to live platform institute for issuing the first block chain in the sending module Before client, the first block chain is generated.
Further, the first block chain and the second block chain have identical data structure;
The data structure include the block number of block chain, the cryptographic Hash of previous block chain, current time timestamp with And block chain performance data, the block chain performance data are the random data that the server generates at random, or it is generation Obtained data are filled after one fixed data encryption.
Further, second determining module 404 is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target The second block chain that the destination client in room is sent, and the destination client is current still in the target room, then really The fixed destination client is illegitimate client.
Further, second determining module 404 is specifically used for:
Using each second block chain in all second block chains as a numerical value, determine that quantity in all numerical value is most Numerical value is Constant numerical values, the second block chain corresponding to Constant numerical values is defined as to the second legal block chain, other is illegal Second block chain.
A kind of server is also provided in the embodiment of the present invention, refers to Fig. 6, the server includes:
Memory 601, processor 602 and is stored in the computer that can be run on the memory and on the processor Program 603, wherein, the processor 602 can realize above-mentioned data verification method when performing the computer program 603.
It should be noted that the server that the application is related to include but is not limited to be:Mobile terminal (mobile phone, smart mobile phone, PAD, notebook computer etc.), fixed terminal (computer).
For convenience of description, the part related to the embodiment of the present invention is illustrate only, particular technique details does not disclose, please With reference to present invention method part.Memory 601 can be used for storage computer program 603, and above computer program includes Software program, module and data, processor 602 perform the computer program 603 for being stored in memory 601 by running, so as to The various function application of execute server and data processing.
In specific implementation process, memory 601 can be used for storage software program and module, processor 602 to pass through Operation is stored in the software program and module of memory 601, at the various function application and data of execute server Reason.Memory 601 can mainly include storing program area and storage data field, wherein, storing program area can storage program area, extremely Application program (such as game class application program, chat class application program) needed for few One function etc.;Storage data field can deposit Storage uses created data (game configuration data, voice data) etc. according to server.In addition, memory 601 can wrap High-speed random access memory is included, nonvolatile memory, for example, at least disk memory, a flash memories can also be included Part or other volatile solid-state parts.Processor 602 is the control centre of server, is connected using various interfaces and circuit The various pieces of whole server are connect, by running or performing the software program and/or module that are stored in memory 601, with And the data being stored in memory 601 are called, the various functions and processing data of execute server, so as to be carried out to server Integral monitoring.Optionally, processor 602 may include one or more processing units;Preferably, processor 602 can integrate application Processor, wherein, application processor mainly handles operating system, user interface and application program etc..
The embodiment of the present invention also provides a kind of computer-readable recording medium, wherein, the computer-readable recording medium can Have program stored therein, the part or all of step including the data verification method described in the above method embodiment when program performs Suddenly.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.Above-mentioned integrated list Member can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art or all or part of the technical scheme can be in the form of software products Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (10)

1. a kind of data verification method, it is characterised in that methods described includes:
Server issues the first block chain to the roomed all clients of live platform institute, to cause each client to receive institute The second block chain is generated after stating the first block chain, and the second block chain is sent to the server;
The server receives all second block chains that all clients return;
The server in all second block chains, determine identical second block chain quantity it is most for the second legal block Chain, it is other for the second illegal block chain;
The server determines that client corresponding to the second legal block chain is legitimate client, the second illegal block chain pair The client answered is illegitimate client.
2. according to the method for claim 1, it is characterised in that issue the first block chain to live platform in the server Before the roomed all clients of institute, methods described also includes:
The server generates the first block chain.
3. according to the method for claim 1, it is characterised in that the first block chain and the second block chain have phase Same data structure;
The data structure includes the block number of block chain, the cryptographic Hash of previous block chain, the timestamp of current time and area Block chain performance data, the block chain performance data are the random data that the server generates at random, or are generation one Obtained data are filled after fixed data encryption.
4. according to the method for claim 1, it is characterised in that methods described also includes:
If the server, which is received in all second block chains that all clients return, does not have the live platform target room The second block chain for sending of destination client, and the destination client is current still in the target room, it is determined that institute It is illegitimate client to state destination client.
5. according to the method for claim 1, it is characterised in that the server determines phase in all second block chains With the second block chain quantity it is most for the second legal block chain, it is other for the second illegal block chain the step of, including:
The server is using each second block chain in all second block chains as a numerical value;
The server determines that the numerical value that quantity is most in all numerical value is Constant numerical values, by the second block corresponding to Constant numerical values Chain is defined as the second legal block chain, other for the second illegal block chain.
6. a kind of server, it is characterised in that the server includes:
Sending module, for issuing the first block chain to the roomed all clients of live platform institute, to cause each client End generates the second block chain after receiving the first block chain, and the second block chain is sent into the server;
Receiving module, for receiving all second block chains of all clients return;
First determining module, in all second block chains, determine identical second block chain quantity it is most to be legal Second block chain, it is other for the second illegal block chain;
Second determining module, for determining that client corresponding to the second legal block chain is legitimate client, illegal second Client corresponding to block chain is illegitimate client.
7. server according to claim 6, it is characterised in that the server also includes:
Generation module, for the sending module issue the first block chain to the roomed all clients of live platform institute it Before, generate the first block chain.
8. server according to claim 6, it is characterised in that the first block chain and the second block chain have Identical data structure;
The data structure includes the block number of block chain, the cryptographic Hash of previous block chain, the timestamp of current time and area Block chain performance data, the block chain performance data are the random data that the server generates at random, or are generation one Obtained data are filled after fixed data encryption.
9. server according to claim 6, it is characterised in that second determining module is additionally operable to:
If the server, which is received in all second block chains that all clients return, does not have the live platform target room The second block chain for sending of destination client, and the destination client is current still in the target room, it is determined that institute It is illegitimate client to state destination client.
A kind of 10. server, it is characterised in that including:Memory, processor and is stored on the memory and can be described The computer program run on processor, wherein, claim 1 can be realized described in the computing device during computer program To 5 any described methods.
CN201710882095.8A 2017-09-26 2017-09-26 A kind of data verification method and server Pending CN107528855A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201710882095.8A CN107528855A (en) 2017-09-26 2017-09-26 A kind of data verification method and server
PCT/CN2017/108051 WO2019061627A1 (en) 2017-09-26 2017-10-27 Data verification method, and server

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710882095.8A CN107528855A (en) 2017-09-26 2017-09-26 A kind of data verification method and server

Publications (1)

Publication Number Publication Date
CN107528855A true CN107528855A (en) 2017-12-29

Family

ID=60737340

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710882095.8A Pending CN107528855A (en) 2017-09-26 2017-09-26 A kind of data verification method and server

Country Status (2)

Country Link
CN (1) CN107528855A (en)
WO (1) WO2019061627A1 (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256353A (en) * 2018-01-11 2018-07-06 武汉斗鱼网络科技有限公司 A kind of data integrity verifying method, apparatus and client
CN108830088A (en) * 2018-04-26 2018-11-16 张莉 A kind of big data analysis method and system based on Internet of Things
CN108924089A (en) * 2018-05-29 2018-11-30 武汉斗鱼网络科技有限公司 A kind of client device recognition methods, device and client device
CN110147686A (en) * 2019-04-18 2019-08-20 阿里巴巴集团控股有限公司 A kind of storage method, system, device and the equipment of personal asset change record
CN110381375A (en) * 2018-04-13 2019-10-25 武汉斗鱼网络科技有限公司 A kind of determining method, client and server for stealing brush data

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160218879A1 (en) * 2015-01-23 2016-07-28 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
CN105959728A (en) * 2016-06-27 2016-09-21 武汉斗鱼网络科技有限公司 System and method for counting number of online users of live platform
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms
US20170243217A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for routing of process authorizations and settlement to a user in a process data network

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106385601B (en) * 2016-09-14 2019-04-05 武汉斗鱼网络科技有限公司 The statistical method and system of live streaming number are watched while based on multi-protocols verifying
CN106385593B (en) * 2016-09-14 2019-05-17 武汉斗鱼网络科技有限公司 The statistical method and system of live streaming number are watched while based on elliptic curve
CN106487801B (en) * 2016-11-03 2019-10-11 江苏通付盾科技有限公司 Information Authentication method and device based on block chain
CN106533696B (en) * 2016-11-18 2019-10-01 江苏通付盾科技有限公司 Identity identifying method, certificate server and user terminal based on block chain
CN107086909B (en) * 2017-03-07 2021-01-12 创新先进技术有限公司 Identity information generation method and device and identity verification method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160218879A1 (en) * 2015-01-23 2016-07-28 Daniel Robert Ferrin Method and apparatus for the limitation of the mining of blocks on a block chain
US20170243217A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for routing of process authorizations and settlement to a user in a process data network
CN105959728A (en) * 2016-06-27 2016-09-21 武汉斗鱼网络科技有限公司 System and method for counting number of online users of live platform
CN106534160A (en) * 2016-12-02 2017-03-22 江苏通付盾科技有限公司 Identity authentication method and system based on block chain
CN106789985A (en) * 2016-12-08 2017-05-31 武汉斗鱼网络科技有限公司 Client validation method and system based on GPU algorithms

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108256353A (en) * 2018-01-11 2018-07-06 武汉斗鱼网络科技有限公司 A kind of data integrity verifying method, apparatus and client
CN108256353B (en) * 2018-01-11 2021-01-01 武汉斗鱼网络科技有限公司 Data integrity checking method and device and client
CN110381375A (en) * 2018-04-13 2019-10-25 武汉斗鱼网络科技有限公司 A kind of determining method, client and server for stealing brush data
CN110381375B (en) * 2018-04-13 2022-06-21 武汉斗鱼网络科技有限公司 Method for determining data embezzlement, client and server
CN108830088A (en) * 2018-04-26 2018-11-16 张莉 A kind of big data analysis method and system based on Internet of Things
CN108924089A (en) * 2018-05-29 2018-11-30 武汉斗鱼网络科技有限公司 A kind of client device recognition methods, device and client device
CN108924089B (en) * 2018-05-29 2021-11-09 武汉斗鱼网络科技有限公司 Client device identification method and device and client device
CN110147686A (en) * 2019-04-18 2019-08-20 阿里巴巴集团控股有限公司 A kind of storage method, system, device and the equipment of personal asset change record
TWI724730B (en) * 2019-04-18 2021-04-11 開曼群島商創新先進技術有限公司 Storage method, system, device and equipment for personal asset change records

Also Published As

Publication number Publication date
WO2019061627A1 (en) 2019-04-04

Similar Documents

Publication Publication Date Title
CN107528855A (en) A kind of data verification method and server
CN107454110A (en) A kind of data verification method and server
CN107465698A (en) A kind of data verification method and server
CN107682328A (en) A kind of data verification method and client
CN109360100B (en) Transaction rapid confirmation method and device based on block chain technology
CN107801059B (en) A kind of method for authenticating and server
CN107239954B (en) Method and device for increasing block generation speed
CN107623865A (en) A kind of data verification method and server
CN107426253A (en) A kind of data verification method and client
CN108646983A (en) The treating method and apparatus of storage service data on block chain
CN107798538A (en) One kind transaction accounting method and client
CN104933207B (en) The acquisition methods and system of user behavior data in application program
CN109598598A (en) Transaction processing method and device, electronic equipment based on block chain
CN107480990A (en) Block chain bookkeeping methods and device
CN106815722A (en) Information processing method and device based on block chain
CN108241517A (en) A kind of method for upgrading software, client and electronic equipment
CN108256353A (en) A kind of data integrity verifying method, apparatus and client
CN109598504A (en) Transaction processing method and device, electronic equipment based on block chain
CN108764966A (en) Advertisement placement method, block chain node device and relevant device
CN107679149A (en) A kind of data processing method and server
CN110177124A (en) Identity identifying method and relevant device based on block chain
CN108847926A (en) A kind of client secure detection method, device and client device
CN108292994A (en) Information authentication
CN110264354A (en) It creates block chain account and verifies the method and device of block chain transaction
CN105791246A (en) Information verification method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171229