CN110213251A - It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium - Google Patents

It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium Download PDF

Info

Publication number
CN110213251A
CN110213251A CN201910430038.5A CN201910430038A CN110213251A CN 110213251 A CN110213251 A CN 110213251A CN 201910430038 A CN201910430038 A CN 201910430038A CN 110213251 A CN110213251 A CN 110213251A
Authority
CN
China
Prior art keywords
address
information
reward
report
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910430038.5A
Other languages
Chinese (zh)
Other versions
CN110213251B (en
Inventor
林敬
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201910430038.5A priority Critical patent/CN110213251B/en
Publication of CN110213251A publication Critical patent/CN110213251A/en
Application granted granted Critical
Publication of CN110213251B publication Critical patent/CN110213251B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/26Government or public services
    • G06Q50/265Personal security, identity or safety
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0407Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the identity of one or more communicating identities is hidden
    • H04L63/0421Anonymous communication, i.e. the party's identifiers are hidden from the other party or parties, e.g. using an anonymizer
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0863Generation of secret information including derivation or calculation of cryptographic keys or passwords involving passwords or one-time passwords

Abstract

The present invention, which provides one kind and reports an offender anonymously, to be rewarded distribution method and gets method, equipment and storage medium, this method comprises: the first public key is recorded on block chain, after obtaining the first public key for the user terminal of informer, report information and the first address are encrypted to generate encryption information by the first public key, and encryption information is recorded on block chain;Encryption information is obtained, the first private key pair encryption information by corresponding to the first public key is decrypted, and obtains report information and the first address;In response to confirming report information, transferred accounts to the first address to provide reward, so that user terminal transfers accounts the reward that the first address receives to the second address by privacy transaction contract.The present invention has ensured that the people that reports an offender anonymously will not blow one's cover in the link for getting reward.

Description

It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium
Technical field
This application involves Internet technical fields, and in particular to one kind report an offender anonymously reward distribution method and get method, Equipment and storage medium.
Background technique
In common offence reporting system, there are real name report and the two kinds of mechanism that report an offender anonymously, report an offender anonymously typically to protection Informer, for example, protecting the informer to public security bureau report wanted criminal.
In the mechanism of reporting an offender anonymously, the link for getting reward is easiest to expose the identity of informer, leads in informer It taking in the scheme of reward, informer may be recognized, and in the scheme for not getting reward such as transfer accounts to informer, also deposit The risk that informer is exposed in the collecting account information leakage of informer, causes the safety of informer to be unable to get guarantee.
It is existing to report an offender anonymously that reward granting form typically more concealed in addition, the safety in order to ensure the people that reports an offender anonymously, Without normal direction public, the opaque mechanism of information is unfavorable for reporting the public credibility construction of receiving party.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, it is intended to provide a kind of guarantee people that reports an offender anonymously and is getting reward What link will not blow one's cover, which report an offender anonymously, rewards distribution method and gets method, equipment and storage medium, and further it is expected The public credibility of enhancing report receiving party.
It reports an offender anonymously in a first aspect, the present invention provides one kind and rewards distribution method, comprising:
First public key is recorded on block chain, after obtaining the first public key for the user terminal of informer, passes through the first public affairs Key encrypts report information and the first address to generate encryption information, and encryption information is recorded on block chain;
Encryption information is obtained, the first private key pair encryption information by corresponding to the first public key is decrypted, and is reported Information and the first address;
In response to confirming report information, transferred accounts to the first address to provide reward, so that user terminal is by the first address The reward received is transferred accounts by privacy transaction contract to the second address.
Second aspect, the present invention provide one kind reward that reports an offender anonymously and get method, comprising:
Obtain the first public key;Wherein, the first public key is recorded on block chain by the terminal for receiving report side;
Report information and the first address are encrypted to generate encryption information by the first public key;
Encryption information is recorded on block chain, so that terminal obtains encryption information, by correspond to the first public key the One private key pair encryption information is decrypted, and obtains report information and the first address, and, in response to confirming report information, to the It transfers accounts to provide reward one address;
The reward that first address receives is transferred accounts by privacy transaction contract to the second address.
The third aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention The method that embodiment provides.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes the method that each embodiment provides according to the present invention.
What many embodiments of the present invention provided, which report an offender anonymously, rewards distribution method and to get method, equipment and storage medium logical It is recorded on block chain after crossing the public key encryption by report information and the first address by report receiving party, and in report receiving party After providing reward to the first address, reward is transferred accounts to the second address by privacy transaction contract, even if so that the first address is let out Dew can not also trace back to the second address, to ensure that the people that reports an offender anonymously will not blow one's cover in the link for getting reward;
Some embodiments of the invention provide report an offender anonymously reward distribution method and get method, equipment and storage medium into One step allows third party to verify the people that reports an offender anonymously and is recorded in block by disclosing private key on block chain after providing reward Report information on chain, the supervision that the transparence of report information is furthermore achieved and provides reward, enhances report and accepts The public credibility of side;
Some embodiments of the invention provide report an offender anonymously reward distribution method and get method, equipment and storage medium into One step makes third by disclosing private key on block chain after providing reward and providing the first address the transfer information of reward Side can verify the granting of report reward, and Information Visibility and the supervision provided reward that reward is provided is furthermore achieved, Further enhance the public credibility of report receiving party.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is that a kind of report an offender anonymously that one embodiment of the invention provides rewards the flow chart of distribution method.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.
Fig. 4 is that the flow chart of method is got in a kind of reward that reports an offender anonymously that one embodiment of the invention provides.
Fig. 5 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is that a kind of report an offender anonymously that one embodiment of the invention provides rewards the flow chart of distribution method.
As shown in Figure 1, in the present embodiment, the present invention, which provides one kind and reports an offender anonymously, rewards distribution method, comprising:
S12: the first public key is recorded on block chain, after obtaining the first public key for the user terminal of informer, by the One public key encrypts report information and the first address to generate encryption information, and encryption information is recorded on block chain;
S14: obtaining encryption information, and the first private key pair encryption information by corresponding to the first public key is decrypted, and obtains Report information and the first address;
S16: it in response to confirming report information, is transferred accounts to the first address to provide reward, so that user terminal is by first The reward that address receives is transferred accounts by privacy transaction contract to the second address.
The information that reports an offender anonymously is accepted with the publication of A organ below, citizen's first reports an offender anonymously, and A organ verifies citizen's first Reward is provided after report, and for citizen's first gets the reward, exemplary elaboration is carried out to the above method:
In step s 12, the terminal of A organ issued on block chain accept the information that reports an offender anonymously (can also be according to practical need Ask selection in one or more channels publication on block chain, on social networks, in media, the inferior multiple publication channels of line) when, By the first public key PAIt is recorded on block chain.Specifically, in the present embodiment, it accepts and hides configured with report contract on block chain Name report information and the first public key PAPublication can by report contract publication, so that each user terminal is passed through the contract Interface acquisition accepts report an offender anonymously information and the first public key PA;In more embodiments, this field can also be used on block chain The other configurations that technical staff is understood that are, it can be achieved that identical technical effect.
The user terminal of citizen's first get it is above-mentioned accept the information that reports an offender anonymously, when citizen's first decision report an offender anonymously when, Report information m and the first address add is submitted in user terminal1, the above-mentioned first public key P of user terminal acquisition of citizen's firstA, pass through First public key PATo report information m and the first address add1It is encrypted, generates encryption information M=PA(m,add1), and will encryption Information M is packaged into the contract address that transaction is sent to above-mentioned report contract, in block chain node by reporting that contract executes the pen After trading and passing through common recognition, encryption information M is recorded on block chain.
In step S14, after the terminal of A organ gets above-mentioned encryption information M, by corresponding to the first public key PA? One private key pAEncryption information M is decrypted, report information m and the first address add is obtained1
After obtaining report information m, A organ verifies report information m, judges whether the report is true effectively, and will Judging result input terminal:
If report is invalid, the terminal of A organ generates the invalid result feedback information of report information, and is packaged into transaction hair It send to the contract address of above-mentioned report contract, by the user terminal acquisition in result record of feedback information to block chain for citizen's first (in more embodiments, the different responders such as do nothing when can also be configured to report invalid according to actual needs Formula);
If report effectively, triggers step S16, the terminal of A organ is generated to the first address add1It transfers accounts to provide reward Transaction and be sent to block chain node, run succeeded and by common recognition after complete to the first address add1Transfer accounts.
The user terminal of citizen's first is detecting the first address add1After the reward for receiving the granting of A organ, the reward that will receive It transfers accounts to privacy transaction contract, and according to the second address add2Privacy transaction is generated, (specific method can by privacy method of commerce With reference to CN201810855516.2 patent document, details are not described herein again) reward is transferred accounts to the second address add2In.More In embodiment, can also by it will be appreciated by those skilled in the art that trade contract and privacy method of commerce of other privacies carry out Step S16's transfers accounts, as long as can not be traded according to privacy traces back to the second address add2, identical technical effect can be realized.
After the completion of transferring accounts of step S16, citizen's first can be according to itself demand by the second address add2In money Production such as is paid, consumed or is withdrawn deposit at the operation.Since (non-real name registration) address itself will not expose the identity of informer, only The identity of informer can just be exposed the links such as being withdrawn deposit or consumed by address by having, and make each side can only by the above method According to disclosed information tracing to the first address, and the second address can not be traced back to, therefore be paid, disappeared by the second address The identity of informer will not be exposed by the operations such as taking or withdraw deposit.
It is reported an offender anonymously above by organ A to citizen's first granting and example has been carried out to above-mentioned method shown in FIG. 1 for rewarding Property elaboration, in more embodiments, the above method can also be applied to different scenes in reporting an offender anonymously reward provide, without It is limited with above-mentioned example.
Above-described embodiment is recorded in area after the public key encryption by the way that report information and the first address to be passed through to report receiving party On block chain, and after report accepts the granting reward of the first address of direction, reward is transferred accounts to the second by privacy transaction contract Location, even if so that the leakage of the first address can not also trace back to the second address, to ensure that the people that reports an offender anonymously is getting reward Link will not blow one's cover.
Fig. 2 is a kind of flow chart of preferred embodiment of method shown in Fig. 1.As shown in Fig. 2, in a preferred embodiment In, after step S16 further include:
S17: the first private key is recorded on block chain, is solved after obtaining the first private key and encryption information for third party It is close and verify report information.
Specifically, it by taking the reward that B organ needs to supervise above-mentioned A organ is provided as an example, hides in order to avoid A organ makes use of granting Name report is rewarded and is embezzled funds, and whether B organ or other arbitrary third parties can supervise report such as A machine by step S17 Pass is confirmed true effective:
In step S17, the terminal of A organ is by the first private key pAIt is recorded on block chain.
The terminal of B organ or other arbitrary third-party terminals obtain encryption information M and the first private key p from block chainA Afterwards, pass through the first private key pAEncryption information M is decrypted, to obtain report information m and the first address add1, so as to test Whether the report content for demonstrate,proving report information m is true effectively.
It should be noted that in the present embodiment, the first private key and the first public key are only used for a report matters, that is, need Different public private key pairs is separately configured for each report matters, or, public and private in replacement system before executing step S17 Key pair, in case criminal executes certain illegal operations using the first private key.
Above-described embodiment further by disclosing private key on block chain after providing reward, verifies third party The people that reports an offender anonymously is recorded in the report information on block chain, the transparence of report information is furthermore achieved and to reward granting Supervision enhances the public credibility of report receiving party.
Fig. 3 is a kind of flow chart of preferred embodiment of method shown in Fig. 2.As shown in figure 3, in a preferred embodiment In, after step S17 further include:
S18: the transfer information transferred accounts to the first address is recorded on block chain, so that third party obtains according to decryption The first address obtained and transfer information verifying reward are provided.
Specifically, equally by taking the reward that B organ or other third parties need to supervise above-mentioned A organ is provided as an example, in addition to prison It superintends and directs A organ and whether makes use of granting and report an offender anonymously reward except embezzling funds, A organ can also be supervised whether to reward should be provided The behavior of reporting an offender anonymously provided reward:
In step S18, the terminal of A organ will be to the first address add1Block chain is recorded in the transfer information transferred accounts It is upper that (wherein, if above-mentioned report contract provides the query interface of transfer information, the terminal of A organ, which may not need, executes this Step).
The terminal of B organ or other arbitrary third-party terminals verify the report content of report information m in step S17 It is true effectively after, according to step S17 decryption obtain the first address add1With the transfer information verification machine being recorded on block chain A is closed whether to the first address add1Reward has been provided, so that the verifying that reward whether is provided A organ realized.
Above-described embodiment after providing reward on block chain further by disclosing private key and providing the first address The transfer information of reward allows third party to verify the granting of report reward, and the information transparency that reward is provided is furthermore achieved Change and to the supervision that reward is provided, further enhances the public credibility of report receiving party.
In another preferred embodiment, it will also be lifted while encryption information is recorded on block chain the user terminal of informer The cryptographic Hash of breath and the first address of notifying is recorded on block chain;The above method further include:
Report information and the first address are announced, so that third party verifies report information and the first address according to the cryptographic Hash.
Specifically, the difference of the embodiment and embodiment illustrated in fig. 2 is, and the cryptographic Hash being recorded on block chain The encryption information of non-first public key encryption verifies report information, so that handling of reports against wrongdoings side is without disclosing the first private key, thus nothing Public private key pair need to be separately configured for each report matters.
It is further preferred that the above method further include: block is recorded in the transfer information transferred accounts to the first address On chain, so that third party provides according to verifying reward.
Specifically, the difference of the embodiment and embodiment illustrated in fig. 3 is only that, method shown in Fig. 3 is based on according to encryption First address of Information Authentication carries out reward and provides verifying, and the embodiment is carried out based on the first address verified according to cryptographic Hash Verifying is provided in reward.
Fig. 4 is that the flow chart of method is got in a kind of reward that reports an offender anonymously that one embodiment of the invention provides.Side shown in Fig. 4 Method can cooperate method shown in Fig. 1-3 to execute.
As shown in figure 4, in the present embodiment, the present invention also provides one kind rewards that reports an offender anonymously to get method, comprising:
S22: the first public key is obtained;Wherein, the first public key is recorded on block chain by the terminal for receiving report side;
S24: report information and the first address are encrypted to generate encryption information by the first public key;
S26: encryption information is recorded on block chain, so that terminal obtains encryption information, by corresponding to the first public key The first private key pair encryption information be decrypted, obtain report information and the first address, and, in response to confirming report information, It is transferred accounts to the first address to provide reward;
S28: the reward that the first address receives is transferred accounts by privacy transaction contract to the second address.
Specifically, principle is got in the reward that reports an offender anonymously of method shown in Fig. 4 can refer to method shown in Fig. 1-3, herein not It repeats again.
Fig. 5 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in figure 5, present invention also provides a kind of equipment 500, including one or more centres as on the other hand Unit (CPU) 501 is managed, can be added according to the program being stored in read-only memory (ROM) 502 or from storage section 508 The program that is downloaded in random access storage device (RAM) 503 and execute various movements appropriate and processing.In RAM503, also deposit It contains equipment 500 and operates required various programs and data.CPU501, ROM502 and RAM503 pass through the phase each other of bus 504 Even.Input/output (I/O) interface 505 is also connected to bus 504.
I/O interface 505 is connected to lower component: the importation 506 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 507 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 508 including hard disk etc.; And the communications portion 509 of the network interface card including LAN card, modem etc..Communications portion 509 via such as because The network of spy's net executes communication process.Driver 510 is also connected to I/O interface 505 as needed.Detachable media 511, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 510, in order to read from thereon Computer program be mounted into storage section 508 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the method for any of the above-described embodiment description may be implemented as computer Software program.For example, embodiment of the disclosure includes a kind of computer program product comprising be tangibly embodied in machine readable Computer program on medium, the computer program include the program code for executing the above method.In such implementation In example, which can be downloaded and installed from network by communications portion 509, and/or from detachable media 511 It is mounted.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used to execute by one or more than one processor is described in the present processes.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can To be the software program being arranged in computer or intelligent movable equipment, it is also possible to the hardware device being separately configured.Wherein, this The title of a little units or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions Technical characteristic replaced mutually and the technical solution that is formed.

Claims (8)

1. one kind, which reports an offender anonymously, rewards distribution method characterized by comprising
First public key is recorded on block chain, after obtaining first public key for the user terminal of informer, passes through described the One public key encrypts report information and the first address to generate encryption information, and the area is recorded in the encryption information On block chain;
The encryption information is obtained, the encryption information is decrypted in the first private key by corresponding to first public key, Obtain the report information and first address;
In response to confirming the report information, transferred accounts to first address to provide reward, so that the user terminal will The reward that first address receives is transferred accounts by privacy transaction contract to the second address.
2. the method according to claim 1, wherein described in response to confirming the report information, to described the It transfers accounts after granting reward one address further include:
First private key is recorded on the block chain, so that third party obtains first private key and the encryption information After be decrypted and verify the report information.
3. according to the method described in claim 2, it is characterized by further comprising:
The transfer information transferred accounts to first address is recorded on the block chain, so that the third party is according to solution First address of close acquisition and transfer information verifying reward are provided.
4. the method according to claim 1, wherein institute is recorded in the encryption information by the user terminal of informer Also the cryptographic Hash of the report information and first address is recorded on the block chain while stating on block chain;
The method also includes: the report information and first address are announced, so that third party tests according to the cryptographic Hash Demonstrate,prove the report information and first address.
5. according to the method described in claim 4, it is characterized by further comprising: turning what is transferred accounts to first address Account information is recorded on the block chain, so that the third party provides according to verifying reward.
6. one kind reports an offender anonymously, method is got in reward characterized by comprising
Obtain the first public key;Wherein, first public key is recorded on the block chain by the terminal for receiving report side;
Report information and the first address are encrypted to generate encryption information by first public key;
The encryption information is recorded on the block chain, so that the terminal obtains the encryption information, by corresponding to The encryption information is decrypted in first private key of first public key, obtains the report information and first address, And it in response to confirming the report information, is transferred accounts to first address to provide reward;
The reward that first address receives is transferred accounts by privacy transaction contract to the second address.
7. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors Execute such as method of any of claims 1-6.
8. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-6.
CN201910430038.5A 2019-05-22 2019-05-22 Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium Active CN110213251B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910430038.5A CN110213251B (en) 2019-05-22 2019-05-22 Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910430038.5A CN110213251B (en) 2019-05-22 2019-05-22 Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110213251A true CN110213251A (en) 2019-09-06
CN110213251B CN110213251B (en) 2023-04-14

Family

ID=67788166

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910430038.5A Active CN110213251B (en) 2019-05-22 2019-05-22 Method for anonymously reporting reward distribution, method for obtaining reward, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110213251B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599334A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based bonus object determination method, block chain-based bonus object determination device, storage medium and equipment
CN110610322A (en) * 2019-09-19 2019-12-24 腾讯科技(深圳)有限公司 Clue data processing method, device and equipment based on block chain and storage medium
CN111680331A (en) * 2020-05-28 2020-09-18 北京理工大学 System and method for managing length-checking mailbox based on block chain
CN114338014A (en) * 2022-01-04 2022-04-12 内蒙古汉尔信息科技有限公司 Safety reporting method, device and system for environmental supervision and law enforcement

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063410A (en) * 2013-04-15 2014-09-24 腾讯科技(深圳)有限公司 Method and system for processing report information
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
US20160306982A1 (en) * 2015-04-14 2016-10-20 Manifold Technology, Inc. System and method for providing a cryptographic platform for exchanging information
CN107979584A (en) * 2016-11-22 2018-05-01 南京银链信息科技有限公司 Block chain information hierarchical sharing method and system
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN109034801A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce and system, equipment and can storage medium
CN109299790A (en) * 2018-08-21 2019-02-01 杭州复杂美科技有限公司 Garbage classification motivational techniques and device, equipment and storage medium
CN109299792A (en) * 2018-08-21 2019-02-01 杭州复杂美科技有限公司 Garbage classification motivational techniques and device, equipment and storage medium

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104063410A (en) * 2013-04-15 2014-09-24 腾讯科技(深圳)有限公司 Method and system for processing report information
US20160306982A1 (en) * 2015-04-14 2016-10-20 Manifold Technology, Inc. System and method for providing a cryptographic platform for exchanging information
CN105610578A (en) * 2016-01-25 2016-05-25 杭州复杂美科技有限公司 Block chain information archiving and privacy protection method
CN107979584A (en) * 2016-11-22 2018-05-01 南京银链信息科技有限公司 Block chain information hierarchical sharing method and system
CN107992923A (en) * 2017-12-22 2018-05-04 北京中星仝创科技有限公司 A kind of QR Quick Response Codes generation and the method read
CN108702287A (en) * 2018-04-16 2018-10-23 深圳前海达闼云端智能科技有限公司 Information publication based on block chain and acquisition methods, device and block chain node
CN109034801A (en) * 2018-07-31 2018-12-18 杭州复杂美科技有限公司 A kind of privacy method of commerce and system, equipment and can storage medium
CN109299790A (en) * 2018-08-21 2019-02-01 杭州复杂美科技有限公司 Garbage classification motivational techniques and device, equipment and storage medium
CN109299792A (en) * 2018-08-21 2019-02-01 杭州复杂美科技有限公司 Garbage classification motivational techniques and device, equipment and storage medium

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110599334A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based bonus object determination method, block chain-based bonus object determination device, storage medium and equipment
CN110610322A (en) * 2019-09-19 2019-12-24 腾讯科技(深圳)有限公司 Clue data processing method, device and equipment based on block chain and storage medium
CN111680331A (en) * 2020-05-28 2020-09-18 北京理工大学 System and method for managing length-checking mailbox based on block chain
CN111680331B (en) * 2020-05-28 2023-02-28 北京理工大学 System and method for managing length-checking mailbox based on block chain
CN114338014A (en) * 2022-01-04 2022-04-12 内蒙古汉尔信息科技有限公司 Safety reporting method, device and system for environmental supervision and law enforcement
CN114338014B (en) * 2022-01-04 2023-03-24 内蒙古汉尔信息科技有限公司 Safety reporting method, device and system for environmental supervision and law enforcement

Also Published As

Publication number Publication date
CN110213251B (en) 2023-04-14

Similar Documents

Publication Publication Date Title
US10824999B2 (en) Systems and methods for implementing hybrid public-private block-chain ledgers
CN110213251A (en) It reports an offender anonymously and rewards distribution method and get method, equipment and storage medium
Liu et al. Distributed ledger technology
Bader et al. Smart contract-based car insurance policies
Papa Use of blockchain technology in agribusiness: Transparency and monitoring in agricultural trade
Ross Nobody puts blockchain in a corner: The disruptive role of blockchain technology in the financial services industry and current regulatory issues
Godfrey-Welch et al. Blockchain in payment card systems
Nizioł The challenges of consumer protection law connected with the development of artificial intelligence on the example of financial services (chosen legal aspects)
Cousins et al. A value-sensitive design perspective of cryptocurrencies: a research agenda
El-Switi et al. Application of blockchain technology in used vehicle market: A review
Allen et al. Design choices for central bank digital currency
Baliker et al. On the applications of blockchain in FinTech: advancements and opportunities
Samsudeen et al. Behavioral analysis of bitcoin users on illegal transactions
Baker et al. The Emerald handbook of blockchain for business
Ross Nobody puts blockchain in a corner: The disruptive role of blockchain technology in the financial services industry and current regulatory issues
Weiss et al. Auditing IT infrastructures for compliance
US20230342849A1 (en) Method, apparatus, and computer-readable medium for compliance aware tokenization and control of asset value
Inbaraj et al. Need to know about combined technologies of blockchain and machine learning
Buja et al. Into the Look: Security Issues, Crypto-Hygiene, and Future Direction of Blockchain and Cryptocurrency for Beginners in Malaysia
Fink Can cryptocurrency be audited to Bank Secrecy Act and anti-money laundering regulations and normalized in the United States
US20240104521A1 (en) System and method for compliance-enabled digitally represented assets
Kaur et al. Secure Financial Market Infrastructures (S/FMI)
Norris The Effects of Person-To-Person Money Transfers on Consumers, Financial Institutions, and Regulations
Pandher et al. Blockchain risk assessment and mitigation
Johnson et al. Auditing IT Infrastructures for Compliance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant