CN107018146A - A kind of public sentiment detection platform building method based on block chain technology - Google Patents

A kind of public sentiment detection platform building method based on block chain technology Download PDF

Info

Publication number
CN107018146A
CN107018146A CN201710320746.4A CN201710320746A CN107018146A CN 107018146 A CN107018146 A CN 107018146A CN 201710320746 A CN201710320746 A CN 201710320746A CN 107018146 A CN107018146 A CN 107018146A
Authority
CN
China
Prior art keywords
internet information
user
block chain
public sentiment
public
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710320746.4A
Other languages
Chinese (zh)
Inventor
翁健
李明
杨安家
王醒
罗伟其
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jinan University
Original Assignee
Jinan University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jinan University filed Critical Jinan University
Priority to CN201710320746.4A priority Critical patent/CN107018146A/en
Publication of CN107018146A publication Critical patent/CN107018146A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/30Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
    • H04L63/302Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information gathering intelligence information for situation awareness or reconnaissance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3249Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using RSA or related signature schemes, e.g. Rabin scheme
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]

Abstract

The invention discloses a kind of public sentiment detection platform building method based on block chain technology, user's public sentiment monitoring center is initially set up, is personal user's distribution public private key pair, digital signature service, filtering and historical analysis is provided to internet information;Set up personal user's speech issue Infrastructure platform;Build the block chain basic platform of Internet information issue;Set up the internet information writing mechanism based on block chain;The internet data storage center based on cloud storage platform is built, initial data is stored to distal end cloud data center after client public key encryption.The present invention is detected to specification public sentiment, protects personal user not had in terms of infringement human rights, portraiture right, the right of privacy, intellectual property and its important meaning.

Description

A kind of public sentiment detection platform building method based on block chain technology
Technical field
The invention belongs to cyberspace security technology area, more particularly to a kind of public sentiment detection based on block chain technology are flat Platform building method.
Background technology
With developing rapidly for Internet technology, the mode and means of Information Communication are more and more diversified, are conducive to really The realization of the freedom of speech in cyberspace, but internet information is a double-edged sword, while it plays a positive role, The rights such as the personality of citizens power, portraiture right, the right of privacy, intellectual property are encroached on, social public order are upset, to the public credibility band of network Carry out serious impact.On the one hand, the Internet infrastructure lacks unified oversight mechanism, and Internet user spreads all over the world, respectively To internet, the supervision of this emerging medium faces unprecedented difficulty to government of state;On the other hand, in enterprise or LAN It is internal there is also the problem of illegal the Internet information overflow, what personal user can be harmful to enterprise or region with issue of anonymity Internet information.
In recent years, various countries start specification internet information, supervision management.China has set up centralized network security leader Group, emphasizes to promote socio-economic development according to innovation, coordination, green, open, shared idea of development.Meanwhile, network security Career development will also adapt to this trend, promote the network power of China to build.The Supreme People's Court, the Supreme People's Procuratorate, The Ministry of Public Security, which combines, to put into effect《The regulation extracted with censorship electronic data some problem is collected on handling criminal case》, it is bright The information of the network platforms such as true specified web page, blog, circle of friends issue, the network such as SMS, Email, instant messaging should With the communication information of service, the information such as user's registration information, authentication information, electronic transaction record, document, picture, sound are regarded The e-files such as frequency belong to electronic data.That is in the future when giving criminal sanctions, these electronic data, which can turn into, is in Hall testimony, the control to specification internet information plays positive effect.In addition, increasing service platform starts from technology Means filtering is sensitive, have the vocabulary of harm speech to citizen.
But, several big features such as the non-stop layer of internet information, anonymity, interactive result in the complexity of management and control. In addition, the issue of all internet informations at this stage is dependent on third party's service platform, domestic third party's service platform is for example micro- Letter, microblogging, blog, forum etc., the common trait existed between them are, based on the centralized management under trust model, though Right internet information, which is delivered, to be started to move towards non-anonymous, but due to the centralization of database so that data be subject to physics or Person is by assault, if DBA has malicious act, modification speech or owner information, the danger brought in addition Evil will be bigger.
Block chain is the emerging technology risen with digital cash such as bit coin, possesses decentralization and can not usurp The characteristic such as change, it into block, links together the information record in a period of time by Hash before adjacent block, formed One distribution that can not be distorted keeps accounts this.The cryptographic Hash of the internet information of personal user is write into block chain, by Data in block chain can not be distorted and with this retrospective characteristic, be especially advantageous for follow-up internet information and called to account.
The content of the invention
It is an object of the present invention to provide a kind of public sentiment detection platform building method based on block chain technology, it is intended to solves existing Internet information issue flow in, data are easily tampered, the technical problem that anonymization can not call to account.
To achieve the above object, the present invention is adopted the following technical scheme that:A kind of public sentiment detection based on block chain technology is flat Platform building method, comprises the following steps:
Step 1, user's public sentiment monitoring center is set up, provide public private key pair for personal user's distribution, internet information is carried For digital signature service, filtering and historical analysis;
Step 2, set up personal user's speech issue Infrastructure platform, personal user, which issues speech, needs user's public sentiment Monitoring center just can formally enter row information issue after being verified;
Step 3, the block chain basic platform for building the issue of Internet information;
Internet information data are carried out Hash dimensionality reduction by step 4, internet information writing mechanism of the foundation based on block chain Processing, the internet information that personal user edits is signed by digitlization, recycles hash algorithm to be dropped internet information Dimension processing, obtains the cryptographic Hash of internet information, and the personal address by the cryptographic Hash of the internet information together with the owner is believed Cease, deliver in time write-in block chain;
Step 5, build public sentiment detection data storage center, by initial data by client public key encryption after store to Distal end cloud data center.
Preferably, the function for user's public sentiment monitoring center that the step 1 is set up includes:1) registration management, for user The information distribution of public private key pair, personal effective information registration;2) digital signature service, for carrying out digital label to internet information Name and signature verification;3) speech is filtered, for being filtered to sensitivity, non-legally speech vocabulary, language and article;4) history is sayed By analysis, for carrying out retrospective analysis to historical internet information.
Preferably, user's public sentiment monitoring center described in step 1 to set up process as follows:
First, public-key cryptography public sentiment monitoring center is set up, all public private key pairs, the log-on message of user is responsible for;
Secondly, digital signature service center is set up, speech is after personal user's digital signature, and the user possesses and the speech By related intellectual property;
Then, public sentiment inspection center is set up, to ensure the security of internet information issue, all speeches issue to merchandise Form write-in block chain, internet information that user's public sentiment monitoring center issue to personal user carries out Screening, confirmation The internet information of errorless rear personal user's issue just can be issued formally;
Finally, set up internet information and compare analysis center, tracing management is carried out to history harm speech.
Preferably, in step 4 said write mechanism, internet information data write block after Hash dimension-reduction treatment, Chain structure is formed, can effectively be reviewed and can not be distorted by single people.
Preferably, the initial data after being encrypted described in step 5 by client public key can only be entered by user to data Row decryption.
Compared with prior art, the invention has the advantages that and beneficial effect:
Public sentiment detection platform building method of the present invention is based on miner in block chain technology, this method and is related to two kinds of roles:Carriage Feelings monitoring center and personal user, public sentiment monitoring center serve as PKIX (Public Key Infrastructure, Hereinafter referred to as PKI) role, personal user just can by its trade confirmation and in a network progress speech hair after being registered in core Cloth, published information is written into block chain.Meanwhile, for protection personal user's privacy, only public sentiment monitoring center can just position The publisher of information, unless publisher's public identity, otherwise other users can not know, it is ensured that user's freedom of speech. The present invention is detected to specification public sentiment, protects personal user not by terms of infringement human rights, portraiture right, the right of privacy, intellectual property Have and its important meaning.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of public sentiment detection platform building method of the present invention;
Fig. 2 is public sentiment detecting system block schematic illustration of the present invention;
Fig. 3 is that personal user's internet information of the present invention issues schematic flow sheet.
Embodiment
Below in conjunction with the accompanying drawings and technical scheme is described in detail embodiment, but embodiments of the present invention Not limited to this.
Embodiment
Reference picture 1, the present invention is full of for network pornography content in internet world, junk information is caused disaster, humiliation property letter The problems such as breath is wreaked havoc, proposes a kind of public sentiment detection platform building method based on block chain technology, specifically includes following steps:
Step 1, user's public sentiment monitoring center (being also user management center PKI) is set up, public sentiment monitoring center sets up public key Infrastructure management services PKI, is personal user's distribution public private key pair.In addition, when user needs to authorize and logged in, to user's body Part is managed.
The function of user's public sentiment monitoring center includes:1) registration management, information distribution, individual for user's public private key pair Effective information is registered;2) digital signature service, for being digitally signed to internet information and signature verification;3) speech Filter, for being filtered to the information speech such as sensitivity, non-legally speech vocabulary, language, article;4) history speech is analyzed, and is used for Retrospective analysis is carried out to historical internet information.
The user's public sentiment monitoring center set up can be distributed in different regions.PKI to set up process as follows:
First, public-key cryptography public sentiment monitoring center is set up.Public-key cryptography management is PKI core, is responsible for the structure All public private key pairs, the log-on message of user;
Secondly, digital signature service center is set up.To ensure copyright that personal user releases news, digital signature clothes are set up Business center, speech is after personal user's digital signature, and the user possesses the intellectual property related to the speech;
Then, public sentiment inspection center is set up, to ensure the security of internet information issue, all speeches issue to merchandise Form write-in block chain, internet information that public sentiment monitoring center issue to personal user carries out Screening, and confirmation is errorless The internet information of personal user's issue just can be issued formally afterwards.
Finally, set up internet information and compare analysis center, tracing management is carried out to history harm speech.
Step 2, personal user's speech issue Infrastructure platform (also cry network speech issue open platform) is set up, it is personal User, which issues speech, needs public sentiment monitoring center just can formally enter row information issue after being verified.Function includes:1) support Personal user's speech is delivered safely.The client is delivered information and can docked with user management center PKI, it is ensured that individual subscriber The accuracy of identity information;2) personal user's speech security update is supported, support personal user to be modified to having delivered information, The operations such as renewal, deletion;3) personal user's speech access queries are supported.Personal domestic consumer is supported to visit delivering information Ask, check, comment on;4) personal user's registration is supported.Based on personal user's real name information, user management center PKI divides after confirming With public private key pair.
Step 3, algorithm of being known together based on efficient block chain, build the block chain basic platform of Internet information issue (i.e. network research and development issue block platform chain).Because speech issue has the characteristics such as real-time, big data quantity, it is necessary to using a kind of Efficient block chain common recognition mechanism, such as equity proves mechanism (PoS), to set for this platform.
Block chain is covered to historical transactional information in a period of time by being constituted comprising mutually isostructural block inside block Record, miner produces new block by the various ore deposit algorithms that dig such as proof of work, and previous piece of cryptographic Hash is as next One of block head data structure component, together, forming one can not distort for all block chain in this way Distribution book keeping operation is originally.
In addition, towards internal speech control privately owned chain form can be based on, the whole network node all by privately owned server group into, Individual server failure does not interfere with the operation entirely serviced, solves the real time problems during speech is delivered.
Step 4, internet information writing mechanism of the foundation based on block chain.User management center PKI is each user point Public private key information is matched somebody with somebody, by public key can obtain the address information of user after Hash calculation, what other users were seen is The address information of user, the cryptographic Hash and issuing time released news, publisher's address information are included in block chain.
Writing mechanism is too big and cause asking for common recognition time length between node mainly for each block capacity in block chain Internet information data are carried out Hash dimension-reduction treatment by topic, and the internet information that personal user edits is signed by digitlization, then Internet information is subjected to dimension-reduction treatment using hash algorithm, a string of simple character string information (Kazakhstan of internet information are obtained Uncommon value), by the cryptographic Hash of the internet information together with the owner personal address information, deliver in time write-in block chain.
The data that all process writing mechanisms are handled and sent all are signed by individual digital, and only user manages Reason center PKI just has the right to analyze and process issue data, and all other men can not inquire about the true of the information publisher Identity;In addition, internet information data write block after Hash dimension-reduction treatment, chain structure is formd, can be carried out effectively Review and can not be distorted by single people.
Step 5, the data storage center of public sentiment detection is built.Internet information data volume is huge, and the present invention sets up a kind of The data storage mechanism being combined based on cloud platform with block chain, prevents high in the clouds data to be stolen, and the data of storage beyond the clouds are all It is encrypted by personal user's public key, only data could be decrypted by user.
In addition, the present invention goes back encapsulation of data read-write interface, to meet the throughput demand when high customer volume is accessed;Set up The high amount of reading caching mechanism of internet information, can carry out data analysis for the big data of user's visit capacity, not pass through during reading High in the clouds, instant to data can also read, prevents network congestion and occur can not check problem.
Framework after platform building is completed is shown in Fig. 3 as shown in Fig. 2 flow chart is delivered in personal user's speech.
The above-mentioned description to embodiment is it will be appreciated that and application invention for ease of those skilled in the art. The foregoing is merely illustrative of the preferred embodiments of the present invention, is not intended to limit the invention, all in the spirit and principles in the present invention Within any modifications, equivalent substitutions and improvements for being made etc., should be included in the scope of the protection.

Claims (6)

1. a kind of public sentiment detection platform building method based on block chain technology, it is characterised in that comprise the following steps:
Step 1, user's public sentiment monitoring platform is set up, be personal user's distribution public private key pair, numeral label are provided internet information Name is serviced, filtered and historical analysis, and the platform is docked with block platform chain, effectively can review and prevent that initial data from being usurped Change;
Step 2, set up personal Internet information issue Infrastructure platform, personal user issue internet information needs pass through Block chain basic platform;
Step 3, the block chain basic platform for building the issue of Internet information;
Internet information data are carried out at Hash dimensionality reduction by step 4, internet information writing mechanism of the foundation based on block chain Reason, the internet information that personal user edits is signed by digitlization, recycles hash algorithm that internet information is carried out into dimensionality reduction Processing, obtain the cryptographic Hash of internet information, by the cryptographic Hash of the internet information together with the owner personal address information, Deliver in time write-in block chain;
Step 5, the data storage center for building public sentiment detection, initial data is stored after client public key encryption to distal end Cloud data center.
2. a kind of public sentiment detection platform building method based on block chain technology according to claim 1, it is characterised in that The function for user's public sentiment monitoring center that the step 1 is set up includes:1) registration management, the information point for user's public private key pair Hair, personal effective information registration;2) digital signature service, for being digitally signed to internet information and signature verification;3) Speech is filtered, for being filtered to sensitivity, non-legally speech vocabulary, language and article;4) historical data analysis, for going through History internet information carries out retrospective analysis.
3. a kind of public sentiment detection platform building method based on block chain technology according to claim 1, it is characterised in that User's public sentiment monitoring center described in step 1 to set up process as follows:
First, public-key cryptography public sentiment monitoring center is set up, all public private key pairs, the log-on message of user is responsible for;
Secondly, digital signature service center is set up, speech is after personal user's digital signature, and the user possesses and the speech phase The intellectual property of pass;
Then, public sentiment inspection center is set up, to ensure the security of internet information issue, the shape to merchandise is issued in all speeches Formula writes block chain, and the internet information that user's public sentiment monitoring center issues to personal user carries out Screening, confirms errorless The internet information of personal user's issue just can be issued formally afterwards;
Finally, set up internet information and compare analysis center, tracing management is carried out to history harm speech.
4. a kind of public sentiment detection platform building method based on block chain technology according to claim 1, it is characterised in that The function of personal Internet information issue Infrastructure platform includes described in step 2:1) personal user's speech is supported to deliver safely; 2) personal user's speech security update is supported;3) personal user's speech access queries are supported;4) personal user's registration is supported.
5. a kind of public sentiment detection platform building method based on block chain technology according to claim 1, it is characterised in that In step 4 said write mechanism, internet information data write block after Hash dimension-reduction treatment, form chain structure, can Effectively reviewed and can not be distorted by single people.
6. a kind of public sentiment detection platform building method based on block chain technology according to claim 1, it is characterised in that Initial data after being encrypted described in step 5 by client public key data can only be decrypted by user.
CN201710320746.4A 2017-05-09 2017-05-09 A kind of public sentiment detection platform building method based on block chain technology Pending CN107018146A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710320746.4A CN107018146A (en) 2017-05-09 2017-05-09 A kind of public sentiment detection platform building method based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710320746.4A CN107018146A (en) 2017-05-09 2017-05-09 A kind of public sentiment detection platform building method based on block chain technology

Publications (1)

Publication Number Publication Date
CN107018146A true CN107018146A (en) 2017-08-04

Family

ID=59450386

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710320746.4A Pending CN107018146A (en) 2017-05-09 2017-05-09 A kind of public sentiment detection platform building method based on block chain technology

Country Status (1)

Country Link
CN (1) CN107018146A (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108023893A (en) * 2017-12-18 2018-05-11 王松山 A kind of method of block chain data recognizing system
CN109286613A (en) * 2018-08-28 2019-01-29 刘琦 Control system is led in a kind of monitoring of network public-opinion
CN109995509A (en) * 2019-05-08 2019-07-09 西安电子科技大学 Authentication key based on message recovery signature exchanges method
CN110113310A (en) * 2019-04-04 2019-08-09 国美金控投资有限公司 One kind is based on monitoring system alliance's chain common recognition system
CN110119602A (en) * 2018-02-06 2019-08-13 百度在线网络技术(北京)有限公司 Man-machine recognition methods, device, server, client and storage medium
CN110866172A (en) * 2019-11-07 2020-03-06 博雅正链(北京)科技有限公司 Data analysis method for block chain system
CN110992219A (en) * 2019-11-29 2020-04-10 重庆摩托车(汽车)知识产权信息中心 Intellectual property protection method and system based on block chain technology
CN112529696A (en) * 2020-12-24 2021-03-19 潍坊信至科技发展有限公司 Financial wind control system based on block chain and public sentiment

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751458A (en) * 2009-12-31 2010-06-23 暨南大学 Network public sentiment monitoring system and method
US9374373B1 (en) * 2015-02-03 2016-06-21 Hong Kong Applied Science And Technology Research Institute Co., Ltd. Encryption techniques for improved sharing and distribution of encrypted content
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
US20160344737A1 (en) * 2014-06-30 2016-11-24 CloudMode, LLC Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history
CN106341493A (en) * 2016-11-01 2017-01-18 北京金股链科技有限公司 Entity rights oriented digitalized electronic contract signing method

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101751458A (en) * 2009-12-31 2010-06-23 暨南大学 Network public sentiment monitoring system and method
US20160344737A1 (en) * 2014-06-30 2016-11-24 CloudMode, LLC Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history
US9374373B1 (en) * 2015-02-03 2016-06-21 Hong Kong Applied Science And Technology Research Institute Co., Ltd. Encryption techniques for improved sharing and distribution of encrypted content
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106341493A (en) * 2016-11-01 2017-01-18 北京金股链科技有限公司 Entity rights oriented digitalized electronic contract signing method

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108023893A (en) * 2017-12-18 2018-05-11 王松山 A kind of method of block chain data recognizing system
CN110119602A (en) * 2018-02-06 2019-08-13 百度在线网络技术(北京)有限公司 Man-machine recognition methods, device, server, client and storage medium
CN110119602B (en) * 2018-02-06 2021-06-11 百度在线网络技术(北京)有限公司 Man-machine recognition method, device, server, client and storage medium
CN109286613A (en) * 2018-08-28 2019-01-29 刘琦 Control system is led in a kind of monitoring of network public-opinion
CN110113310A (en) * 2019-04-04 2019-08-09 国美金控投资有限公司 One kind is based on monitoring system alliance's chain common recognition system
CN109995509A (en) * 2019-05-08 2019-07-09 西安电子科技大学 Authentication key based on message recovery signature exchanges method
CN109995509B (en) * 2019-05-08 2021-07-06 西安电子科技大学 Authentication key exchange method based on message recovery signature
CN110866172A (en) * 2019-11-07 2020-03-06 博雅正链(北京)科技有限公司 Data analysis method for block chain system
CN110992219A (en) * 2019-11-29 2020-04-10 重庆摩托车(汽车)知识产权信息中心 Intellectual property protection method and system based on block chain technology
CN112529696A (en) * 2020-12-24 2021-03-19 潍坊信至科技发展有限公司 Financial wind control system based on block chain and public sentiment
CN112529696B (en) * 2020-12-24 2021-06-25 优观融资租赁(中国)有限公司 Financial wind control system based on block chain and public sentiment

Similar Documents

Publication Publication Date Title
CN107018146A (en) A kind of public sentiment detection platform building method based on block chain technology
US10484178B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
US20190268165A1 (en) Cryptoasset custodial system with different rules governing access to logically separated cryptoassets
US10749681B2 (en) Systems and methods for providing a universal decentralized solution for verification of users with cross-verification features
EP3982281A1 (en) Digital asset custodial system
US10891689B2 (en) Consent management service system
US11411730B2 (en) Cryptoasset custodial system with different rules governing access to logically separated cryptoassets and proof-of-stake blockchain support
CN109417549A (en) The method and apparatus of information proof is provided using centralization or distributed ledger
TWI764037B (en) Interaction method and system across blockchain, computer equipment and storage medium
JP2018537022A (en) System and method for managing digital identities
US11438174B2 (en) Cryptoasset custodial system with different cryptographic keys controlling access to separate groups of private keys
CN107637015A (en) Digital identity system
US20120066773A1 (en) Information safeguard tool
US11301845B2 (en) Cryptoasset custodial system with proof-of-stake blockchain support
US20190334724A1 (en) Authentication through verification of an evolving identity credential
CN108875407A (en) For the sensitive information processing method and processing device of financial business, client, data framework
CN109034987A (en) A kind of tax administration method and system based on block chain
US20220188817A1 (en) Risk mitigation for a cryptoasset custodial system using a hardware security key
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
CN105635156A (en) Large distributed financial terminal system
US20210056539A1 (en) Cryptoasset custodial system using encrypted and distributed client keys
Ardina et al. Design of A Blockchain-based Employee Attendance System
US20210056548A1 (en) Cryptoasset custodial system with custom logic
Fathiyana et al. An Integration of National Identity towards Single Identity Number with Blockchain
TWM592572U (en) System for contracts signing and identity verification

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20170804