CN108964901A - Information Authentication method, system, device - Google Patents

Information Authentication method, system, device Download PDF

Info

Publication number
CN108964901A
CN108964901A CN201810737301.0A CN201810737301A CN108964901A CN 108964901 A CN108964901 A CN 108964901A CN 201810737301 A CN201810737301 A CN 201810737301A CN 108964901 A CN108964901 A CN 108964901A
Authority
CN
China
Prior art keywords
equipment
server
information
calculated result
batch
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810737301.0A
Other languages
Chinese (zh)
Other versions
CN108964901B (en
Inventor
周志刚
张文明
陈少杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Douyu Network Technology Co Ltd
Original Assignee
Wuhan Douyu Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Douyu Network Technology Co Ltd filed Critical Wuhan Douyu Network Technology Co Ltd
Priority to CN201810737301.0A priority Critical patent/CN108964901B/en
Publication of CN108964901A publication Critical patent/CN108964901A/en
Application granted granted Critical
Publication of CN108964901B publication Critical patent/CN108964901B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/431Generation of visual interfaces for content selection or interaction; Content or additional data rendering
    • H04N21/4312Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations
    • H04N21/4314Generation of visual interfaces for content selection or interaction; Content or additional data rendering involving specific graphical features, e.g. screen layout, special fonts or colors, blinking icons, highlights or animations for fitting data in a restricted space on the screen, e.g. EPG data in a rectangular grid
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/4788Supplemental services, e.g. displaying phone caller identification, shopping application communicating with other users, e.g. chatting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/488Data services, e.g. news ticker
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/488Data services, e.g. news ticker
    • H04N21/4882Data services, e.g. news ticker for displaying messages, e.g. warnings, reminders

Abstract

The invention discloses a kind of Information Authentication methods, system, device, are related to Information Authentication field, and method is the following steps are included: obtain the computing capability grade L of equipment;M batch is divided to notify multiple equipment in different moments, the notification information of corresponding each equipment includes the batch sequence D of corresponding computing capability grade L, inspection field and the notification information relative to earliest first batch;Equipment and server, which are established, to be communicated and generates shared key;The equipment receives the corresponding notification information, and the inspection field is input in preset algorithm, calculated result is calculated, and enters when the number N of the predetermined value in calculated result meets N=L+M-D in next step;By calculated result using shared key encrypting and transmitting to server, and whether matched by the server authentication calculated result with pre-stored result, is verified if matching.It is corresponding that the present invention also provides corresponding system and devices.

Description

Information Authentication method, system, device
Technical field
The present invention relates to client devices in a kind of network communication and server to carry out when carrying out the communication of specific occasion Method, system and the storage medium of verifying, belong to the communications field.
Background technique
Currently, live streaming platform releases various playing methods constantly also to improve as live streaming is increasingly liked by everybody Spectators interact degree of participation with main broadcaster's.It is existing live streaming platform in there are a kind of barrage interaction mode: spectators by When viewing, comment or text information are sent to be shown on the video played in real time and carries out interaction with main broadcaster.
In view of public psychology: all spectators like prize drawing, therefore platform is broadcast live and is proposed main broadcaster's sending " pumping Prize " information, and spectators are then drawn a lottery by sending barrage information.When some direct broadcasting room spectators are more, if Main broadcaster opens sweepstake and has issued lottery information, then all spectators can receive prize drawing letter in the same time Breath, and barrage is sent within shorter time of concentration to participate in drawing a lottery, then live streaming Platform Server will be same at this time A large amount of barrages are received in time, this meeting is so that the pressure of the short time processing information of server becomes very greatly, to be easy to appear delay Or other failures.
In addition, there is also some hackers or " robotic user " are (illegal to use in the same direct broadcasting room under actual conditions Family), by writing script, the illegal user of these camouflages constantly automatically switches to different rooms, and sends in the short time A large amount of barrage participates in drawing a lottery.On the one hand, since client uses different client devices, calculating reaction speed is different, The chance for being extracted into prize also can be different, for users and inequitable;On the other hand, hacker or " robotic user " usually make Carried out with relatively good computer or work station even calculating center it is above operate, thus they can obtain in sweepstake Advantage is taken, is more got the winning number in a bond, and this has deviated from the fairness of dependence barrage prize drawing obviously to enhance the original intention of living broadcast interactive. Moreover, the behavior for largely sending barrage can more aggravate the burden of server, it is easier to so that system breaks down.
However increases for server short time pressure in the prize drawing of the above barrage and be easy to bore loophole by illegal user Defect, the method that targetedly the transmission lottery information of user is not verified in the prior art.
Summary of the invention
The present invention and is easy by illegal user to solve server short time pressure in the prize drawing of above-mentioned barrage and increase Bore this problem of defect of loophole and carry out, and it is an object of the present invention to provide a kind of when server issues lottery information, to client The barrage information of transmission carries out method, system and the device of Information Authentication.
Inventive concept of the invention are as follows:
In design of the invention, when main broadcaster at main broadcaster end issues lottery information and after be sent to server, the server It can (obviously, these clients be all in the main broadcaster room of the main broadcaster, with the main broadcaster to all clients for communicating connection In corresponding relationship) notification message transmission inform the main broadcaster in the room start carry out barrage draw a lottery.
Prize drawing message bring server stress so is issued to all clients in the same time in order to prevent, while All spectators for participating in prize drawing are drawn a lottery by client to send barrage simultaneously in order to prevent, then server of the invention Can issue in client of the random time to spectators: random issuing starts the message of prize drawing such as in 1 second, then In this 1 second, some clients can first receive the notification information of barrage prize drawing, and some client devices can receive barrage pumping evening The notification information of prize, so that flashy prize drawing barrage message is divided into 1 second period to issue by server, that Spectators when operating client device and carrying out barrage prize drawing, the barrage that reports as the time difference and be distributed, thus It avoids server while receiving a large amount of concurrent prize drawing barrage and lead to the instantaneous pressure of server.
Hacker brushes prize drawing barrage by writing script in order to prevent simultaneously, the notification message that can then draw a lottery herein in barrage Middle increase check field, check field can by consuming the cpu resource of client by corresponding calculation times, and in order to More fair draw a lottery, and eliminates the computing capability difference of the client of user, and check field can be according to the equipment of client At the time of type and server issue barrage prize drawing notification information, to control the calculation times of client, that is, barrage is issued Early at the time of prize drawing notification information, the calculation times of the check field of the strong client of the computing capability of client will be more, from And the difference of the computing capability of client device is counteracted, also fundamentally prevent hacker and passes through the agreement generation " machine write Device people user " come brush prize drawing chance (because he equipment it is good but he calculation times it is more, the time is long, so can not largely send out Send lottery information), so, present invention also improves the fairness of prize drawing.
Inventive concept of the invention above, be extended on the basis of basic inventive concept of the invention obtain with Under technical solution:
A kind of Information Authentication method, it is including following for carrying out the verifying of information when equipment sends information to server Step:
Obtain the computing capability grade L of equipment;
M batch is divided to notify multiple equipment in different moments, the notification information of corresponding each equipment includes corresponding meter The batch sequence D for calculating ability rating L, examining field and the notification information relative to earliest first batch;
Equipment and server, which are established, to be communicated and generates shared key;
The equipment receives the corresponding notification information, and the inspection field is input in preset algorithm and is calculated Calculated result is obtained, is entered when the number N of the predetermined value in calculated result meets N=L+M-D in next step;
By calculated result using shared key encrypting and transmitting to server, and by the server authentication calculated result and in advance Whether the result first stored matches, and is verified if matching.
Information Authentication method provided by the invention, can also have the feature that, wherein obtain computing capability grade L Process are as follows: the facility information for acquiring equipment compares pre-stored equipment and computing capability according to collected facility information Grade corresponding informance determines the computing capability grade L of the equipment.
Information Authentication method provided by the invention, can also have the feature that, wherein the specific step notified in batches Suddenly include:
Selected time T is divided into M parts;
The corresponding all equipment of server is also divided into M parts;
Within first T/M time, the equipment that the notification information is sent to first part of first batch, then according to batch Secondary sequence is sent to other equipment until being sent.
Information Authentication method provided by the invention, can also have the feature that, wherein establish and communicate and generate shared The process of key includes following sub-step:
When equipment logs on to server, server generates a pair of of public key and private key according to the user information of the equipment;
When equipment logs on to server, equipment is according to examining timestamp next life of field and login time public key in a pair And private key;
Server and each equipment intercourse public key and realize that key is shared and establishes communication.
Information Authentication method provided by the invention, can also have the feature that, wherein the server is that live streaming is flat Platform server, the equipment are that the equipment of platform used for spectators user is broadcast live,
The notification information is the notification information of barrage prize drawing, and the inspection field is random data.
Information Authentication method provided by the invention, can also have the feature that, wherein the preset algorithm is inspection The hash value for testing field calculates, and the number of corresponding predetermined value is the number that hash value is calculated that beginning is 0.
Information Authentication method provided by the invention, can also have the feature that, wherein obtain when carrying out specific calculation The number N of predetermined value when being unsatisfactory for N=L+M-D, then equipment can add the data of a multidigit again before examining field It is calculated until meeting condition.
Information Authentication method provided by the invention, can also have the feature that, wherein the server authentication calculating knot The whether matched process of fruit includes following sub-step:
The notification information received from equipment is decrypted using public keys;
It is checked whether there is from the obtained data of decryption and examines field and calculated result, if determining that the data are without if Invalid, verifying cannot be passed through, if any, enter in next step;
Further judge the inspection field and the calculated result inspection field for issuing the equipment whether corresponding with server, meter It calculates result to match, if matching, is verified, otherwise cannot pass through verifying.
The present invention also provides a kind of verifying systems of information, for carrying out information when equipment sends information to server Verifying characterized by comprising
Computing capability obtains module, for obtaining the computing capability grade L of equipment;
Notification module in batches, for dividing M batch that multiple equipment, corresponding each equipment is notified to lead in different moments Know that information includes corresponding computing capability grade L, examines field and the notification information criticizing relative to earliest first batch Minor sort D;
Shared key generation module is established for equipment and server and communicates and generate shared key;
Predetermined value calculates judgment module, for obtaining calculated result to inspections field progress predetermined computation, goes forward side by side one Step judges whether the number N of the predetermined value in calculated result meets N=L+M-D;
Matching judgment module, for by the calculated result of predetermined computation using shared key encrypting and transmitting to server, And verify whether the calculated result matches with pre-stored result, it is verified if matching.
The present invention also provides a kind of verifying device of information, including memory and processor, stores and locating on memory The computer program run on reason device, it is characterised in that: processor realizes above-mentioned method when executing computer program.
The effect of invention and effect are: the verification method of information involved according to the present invention, because it is with following The step of: obtain and determine the computing capability grade L of client device;It is multiple to notify in batches to divide M batch in different moments The client device, the notification information of corresponding each client include corresponding computing capability grade L, random data and are somebody's turn to do Batch sequence D of the notification information relative to earliest first batch;Client device and server, which are established, to be communicated and generates shared Key;The client device receives the corresponding notification information, and carries out specific calculation to the random data and obtain Predetermined value enters in next step when the number N for carrying out the predetermined value that specific calculation obtains meets N=L+M-D;By specific calculation Using shared key encrypting and transmitting, to server, and by server authentication, whether the calculated result matches calculated result, if Matching is then verified, so
The client for notifying multiple client devices to enable in batches using M batch is divided in different moments The notification information of barrage prize drawing is first received, some client device evenings receive the notification information of barrage prize drawing, so that server will Flashy prize drawing barrage message is divided into multiple periods to be issued, then spectators carry out bullet in operation client device When curtain prize drawing, the barrage that reports as the time difference and be distributed, received simultaneously so as to avoid server it is a large amount of simultaneously The prize drawing barrage of hair and the instantaneous pressure for leading to server;
Calculation times (meter is carried out using whether the number N for carrying out the predetermined value that specific calculation obtains meets N=L+M-D Evaluation time) adjusting come eliminate user client computing capability difference: as check field random data can according to visitor At the time of the device type and server at family end issue barrage prize drawing notification information, to control the calculation times of client, i.e., Early, the calculation times of the check field of the strong client of the computing capability of client at the time of issued barrage prize drawing notification information Will be more, to counteract the difference of the computing capability of client device, also fundamentally prevents hacker and passed through the association write View generate " robotic user " come brush prize drawing chance (because he equipment it is good but he calculation times it is more, the time is long, so nothing Method largely sends lottery information), so, present invention also improves the fairness of prize drawing.
Detailed description of the invention
Fig. 1 is the step schematic diagram of the Information Authentication method in the embodiment of the present invention.
Fig. 2 is that the detailed process schematic diagram for communicating and generating shared key is established in the embodiment of the present invention;
Fig. 3 is the detailed process schematic diagram that the present invention is Information Authentication step in embodiment;And Fig. 4 is reality of the invention Apply the structural schematic diagram of the information authentication system in example.
Specific embodiment
It is real below in order to be easy to understand the technical means, the creative features, the aims and the efficiencies achieved by the present invention Example combination attached drawing is applied to Information Authentication method of the invention, system, the composition of storage medium, structure, connection relationship, specific works Process and working principle, effect and effect are specifically described and are specifically addressed.
Below with the main broadcaster in background technique by server issue lottery information, and it is corresponding connect with server set Standby actual conditions for receiving the lottery information and being verified are described in detail.
Fig. 1 is the step schematic diagram of the Information Authentication method in the embodiment of the present invention.
As shown in Figure 1, the Information Authentication method of the present embodiment has step S1-S
Step S1 obtains the computing capability grade L of equipment, by following two process:
Step S1-1 acquires the facility information of client.Firstly the need of the facility information of acquisition client, mainly it is to look at Active client is what equipment to be belonged to, such as mobile device, what mobile phone model is, by model we then It is known that the computing capability of the equipment, to prepare for the calculation times that subsequent server issues verifying field.So The better equipment of computing capability, then calculation times identical for verifying field, then the better equipment of ability then calculates more Fastly.After client logs on live streaming Platform Server, then facility information deviceinfo can be recorded.This implementation Example is illustrated by taking the acquisition of Apple Inc.'s ios device information as an example, specific as follows:
struct utsname systemInfo;
The structure variable for defining a systemInfo first, for storing the facility information obtained.
Then the facility information of IOS is obtained by the interface function uname of calling system offer, wherein interface uname It is defined as follows:
uname(struct utsname*name)
It is passed to parameter utsname wherein to obtain the information of equipment.
It is implemented as follows:
Uname(&systemInfo);
The present embodiment stores the letter got by calling Uname and the incoming variable systemInfo defined before Breath.Then the information that its corresponding character string systemInfo.machine stores equipment is obtained.
NSString*deviceString=[NSString stringWithCString:systemInfo.machine encoding:NSUTF8StringEncoding];
The categorical data of a character string is converted it by the interface stringWithCString of NSString DeviceString is then ultimately stored in deviceString.
Such as it obtains Iphone6 equipment then, and that deviceString is obtained is iPhone6,1, if equipment is Iphone7, the then facility information that gets are stored into deviceString, and that obtain is iPhone7, and 1.
So far, the type information of client device is just completed by the step.
Step S1-2, live streaming platform define the level to the computing capability of equipment.Live streaming platform can collect most of set Standby information, and each facility information is classified according to its calculated performance, then calculated performance it is relatively high equipment it is then fixed Justice be it is high-grade, calculated performance it is low be then defined as inferior grade, such as can calculated performance to equipment according to 5 grades points Class, such as ios equipment, iphonex is the equipment that calculated performance is best instantly, then is defined as 5 grades, for Iphone8 then performance can a poor line, then be defined as 4 grades, 3 grades be then defined as iphone7, iphone6 can then be determined Justice is 2 grades, for iphone5 and following, is defined as 1 grade.Similarly the equipment of android can also be carried out similarly Classification.A classification table to ios and android equipment finally so is store in server, corresponding by the table is closed System, arbitrary equipment can obtain the corresponding computing capability grade L of the equipment.
So far, just completed by the step server equipment is classified and obtained a device signal with The correspondence table of computing capability grade L.
Step S2 divides M batch to notify multiple equipment in different moments, and the notification information of corresponding each equipment includes pair The computing capability grade L answered, the batch sequence D for examining field and the notification information relative to earliest first batch.
When main broadcaster starts prize drawing, then server needs the equipment held to all users of direct broadcasting room transmission to announce the winners in a lottery Message, in order not to cause same time owner to receive barrage prize drawing while sending prize drawing message, then server can be at one Between notify all users in batches in section, rather than notified simultaneously.
The specific steps notified in batches include:
Selected time T is divided into M parts;
The corresponding all equipment of server is also divided into M parts;
Within first T/M time, the equipment that the notification information is sent to first part of first batch, then according to batch Secondary sequence is sent to other equipment until being sent.
Specifically in the present embodiment, all users are notified within 1 second total time:
Server can divide room user equally first, and every 200 milliseconds are spaced as one, then 1 second is then 1000 milliseconds, user is divided into 5 equal portions, is identical number if it is 1-4 equal portions, and the 5th deficiency, is also still divided into 5 Part.
User in first 200 milliseconds is not delayed, user receive server announce the winners in a lottery notice message when, Delay field in message field is 0, if user is notified at second 200 milliseconds, delay field is then It is 1, similarly if it is what is notified at the 5th 200 milliseconds, delay field is then 4.It can finally lead in 1 second server Know that all clients room main broadcaster has issued message of announcing the winners in a lottery.And it is opposite that its notification information can be carried in message field In the batch sequence D of earliest first batch.
Specifically, notifying that the message announced the winners in a lottery is in the present embodiment:
@=2/ type@=lotterystart/rid@=345/timedelay
Such as type@=lotterystart/ mark is to start the message of prize drawing in text message.
@=345 item message field rid identify room number.
@=2 item message field timedelay identify batch sequence D of the prize drawing message relative to earliest first batch, I.e. the information is in the 3rd 200 milliseconds of notices, and the batch relative to earliest first batch is ordered as 2.
In order to avoid hacker by design code robot or relies on the equipment of function admirable come the prize drawing of brush barrage, service Device can also issue some data, to improve the safety and randomness of algorithm, server, which issues data, can then accomplish each use Family is different, and each moment is replaced.
In addition, the present embodiment uses for reference the proof of work algorithm in block chain: in block chain, the life of each new block Chengdu be have certain workload calculate correctly as a result, who first calculates correct result who then generates new block, To be awarded.The present invention also verifies client using the algorithm of workload, so that each prize drawing barrage is all It is the proof for needing to carry out workload, to avoid the script of hacker a large amount of and send the justice of prize drawing and influence prize drawing user Property, the proof of work of notification information can also adjust according to delay.It is implemented as follows:
A, increase random data in message of announcing the winners in a lottery.
In order to ensure client each time proof of work algorithm safety, prevent it from getting by enumerating Correctly it is worth, increases a random data in the message of announcing the winners in a lottery that the present embodiment issues each by server, this data is The character string of 32 bit lengths, and each user can be different random data, each moment also can be it is different with Machine data, so that client is unable to get the rule of data generation, so that result can not be directly obtained around calculating.
It is implemented as follows:
ServerRandData [32]=rand ();
Wherein then calling system function rand () generates random number data herein.
The message of announcing the winners in a lottery for wherein starting prize drawing is:
@=2/ type@=lotterystart/rid@=345/timedelay
Then become after then adding random data:
Type@=lotterystart/rid@=345/timedelay@=2/ServerRandData= ac2536bcac84523697412acdeabdabc123
To increase random data field: ServerRandData= ac2536bcac84523697412acdeabdabc123。
B, increase device levels data in message of announcing the winners in a lottery.
When client logs on to live streaming Platform Server, current facility information can be reported, server foundation reports Facility information inquires the grade of the equipment, so that computing capability grade L is handed down to client.These level information then corresponds to The calculated performance of equipment.Why consider that the computing capability grade of equipment is that fairness, better equipment calculate more in order to balance Fastly, so server issues different difficulty in computation according to device levels.
Type@=lotterystart/rid@=345/timedelay@=2/ServerRandData= @=2/ ac2536bcac84523697412acdeabdabc123/level
To increase@=2 computing capability grade L:level of equipment.
So far, just completed by the step server client prize drawing message in carry out at times notify client End, and increase interval field i.e. notification information of delay in the message relative to the batch sequence D of earliest first batch, inspection Test the computing capability grade L of field and equipment.
Step S3, equipment and server, which are established, to be communicated and generates shared key.
Fig. 2 is that the detailed process schematic diagram for communicating and generating shared key is established in the embodiment of the present invention.
Establishing communication and generating the process of shared key includes following sub-step:
S3-1, when equipment logs on to server, server generates a pair of of public key and private according to the user information of the equipment Key.
When client logs on to live streaming platform, Platform Server is broadcast live at this time then can generate one according to the user information To code key.Simultaneously in order to which the key information for ensureing each user is inconsistent, improve the threshold cracked, then by the account of user and Random data is as private key information, to ensure that each private key for user is inconsistent.The present embodiment then uses asymmetric rsa encryption Algorithm next life public key and private key in a pair.Generating random number can be used in specific then private key, and public key then calls RSA cryptographic algorithms Corresponding public key can be generated in interface function, and private key and public key are the relationships uniquely matched, and actual operating process includes:
A generates random data
Randdata=rand ();
One section of random data Randdata is generated by calling system function rand.
B is according to room number and generating random number its Md5 value as private key
ClientPrivatekey=Md5.Create (UserId+TimeStamp+randdata)
By call the interface Md5.Create of Md5 function come to User ID and random data and current time stamp information with And random number is spliced together and calculates its Md5 value, to obtain private key data.
C calculates public key
ClientPublickey=RSA.CreatePair (ClientPrivatekey);
Public key then calls the generation of RSA to match key interface RSA.CreatePair to generate.
To which final server then generates a pair of of public key and private key information.
So far, just completed by the step the user that live streaming Platform Server is each login generate a pair of of private key and Public key information.
S3-2, when equipment logs on to server, equipment generates one according to the timestamp of field and login time is examined To public key and private key.
When client logs on to live streaming Platform Server, server client can generate a pair of of public, private key letter thus Breath, while client also oneself can generate a set of public, private key information, client then will use random data and timestamp next life At private key, to ensure that different clients are different private key and public key as far as possible.Actual operating process includes:
A generates random data
Randdata=rand ();
One section of random data Randdata is generated by calling system function rand.
B timestamp and generating random number its Md5 value are as private key
The interface that ServerPrivatekey=Md5.Create (Randdata+timestamp) passes through calling Md5 function Md5.Create calculates its Md5 value to be spliced together to random data and current time stamp information, to obtain private key number According to.
C calculates public key
ServerPublickey=RSA.CreatePair (ServerPrivatekey);
Public key then calls the generation of RSA to match key interface RSA.CreatePair to generate.
To which End-Customer end then generates a pair of of public key and private key information.
After receiving the public key information that live streaming Platform Server issues at this time, then it is flat the public key information of oneself to be sent to live streaming Platform server.
So far, it is achieved that client generates a pair of of public key and private key information by the step.
S3-3, server and each equipment intercourse public key and realize that key is shared and establishes communication.
Platform Server is broadcast live and client exchanges respective public key information, to generate a shared code key, and visitor The shared code key that family end and server generate is the same value.Actual operating process includes:
A exchanges public key
Platform Server is broadcast live, the public key ServerPublickey of server is sent to client.Client by oneself Public key ClientPublickey be sent to live streaming Platform Server.
B is broadcast live platform and generates shared code key
Use ShareKey=RSA.CreateShareKey (ClientPublickey, ServerPrivatekey) generation Code is realized;
C client generates shared code key.
Use ShareKey=RSA.CreateShareKey (ServerPublickey, ClientPrivatekey) generation Code is realized;
It with the value for 2 ShareKey of shared key that client generates is consistent to which the shared key of platform generation be broadcast live 's.
By these three sub-steps of S3-1 to S3-3, equipment and server are established and communicate and generate shared key.
Step S4, the equipment receives the corresponding notification information, and the inspection field is input to preset calculation Calculated result is calculated in method, enters when the number N of the predetermined value in calculated result meets N=L+M-D in next step.
Client receives the notification information of corresponding lottery information, and calculates verifying field.
When client receive server issue start prize drawing announce the winners in a lottery message after, need first to calculate verifying field, lead to Certain algorithm is crossed, the message drawn a lottery could be sent after being verified field.The algorithm of proof of work is then used herein.
The present embodiment is to need to calculate HASH value to random data, while calculating HASH after client receives random data The data that client can generate one 32 when value, which are spliced together, to be calculated, and needs to ensure the HASH result of calculating In, start and must satisfy the requirement of server for 0 number N, then 0 number is more, then the calculative time can also get over It is more.
If the requirements are not met, then client can change 32 data generated again, until meeting the requirements. So in the message that starts to draw a lottery that server issues, the grade of equipment the high, and the performance calculated is better, and client then needs The number N that the beginning of corresponding calculating is 0 is more, while when message of announcing the winners in a lottery issues, the time of delay is longer, then beginning is 0 It is fewer to calculate number.
Calculate the calculation formula that client (equipment connecting with server) needs to calculate the number N that HASH result is 0 Are as follows:
N=L+M-D;
Wherein L is the computing capability grade of equipment, and higher grade, and the number that required calculating hash value is 0 is more.
Wherein M is the number that the total time T sent in batches that will be selected is divided into.
D is that the notification information sorts relative to the batch of earliest first batch, and embodiment is the lottery information issued Delay is divided into M grade, is delayed more, then its calculative 0 number is fewer.
The method operation that scheduled hash is calculated is as follows:
Clientdata=00000000000000000000000000000001
Hashresult=Md5.Create (Clientdata+ServerRandData);
After obtaining calculated result, whether has to the beginning of result judgement hashresult and meet the number that HASH result is 0 N, if conditions are not met, then need to convert Clientdata, the algorithm of transformation be carry out it is incremental.
Clientdata=00000000000000000000000000000002
Hashresult=Md5.Create (Clientdata+ServerRandData);
This determines again, if meet, and so on, until the result of calculating meets the number of N.
Fig. 3 is the detailed process schematic diagram that the present invention is Information Authentication step in embodiment.
Step S5, by calculated result using shared key encrypting and transmitting to server, and by the server authentication calculating As a result whether match with pre-stored result, be verified if matching.Specifically include sub-step below:
Calculated result is generated prize drawing message by step S5-1, client device.
The Hashresult result for needing to increase Clientdata and calculating in the prize drawing message field of client occurs To server, server can then verify the whether correct of client calculating.
The lottery information of transmission are as follows:
Type@=lottery/rid@=345/Clientdata@= 00000000000000000000000000000002/ashresult@=/ 00ac23d6a5c14e2a3acbe32125478993/ wherein, ashresult@=/ 00ac23d6a5c14e2a3acbe32125478993/ is to calculate result.
Step S5-2, client are reported to server after being encrypted lottery information.
Client is reported to server after generating lottery information again after encrypting data using sharekey, and It will use safer Encryption Algorithm herein, in above-mentioned these three steps of step S3-1 to S3-3, equipment and server It establishes and communicates and generate shared key sharekey.
Client is reported to server after being encrypted the message of prize drawing, this reports process real by code below It is existing:
EncryptData=Aes.Ecnrypt (" type@=lottery/rid@=345/Clientdata@= 00000000000000000000000000000002/Hashresult@=/ 00ac23d6a5c14e2a3acbe32125478993/",sharekey);
The data wherein encrypted are then the message of announcing the winners in a lottery that client reports, wherein the key encrypted is then being total to using negotiation Enjoy sharekey.
So far, client is just completed by the step report encrypted result.
Step S5-3, server authentication client calculated result.
After server receives the calculated result that client reports, then result can be decrypted and be verified, verify client Whether the calculated result at end is correct, if can correctly participate in prize drawing, otherwise server is considered an illegal request To brush prize drawing.Specific verification process is as follows:
The notification information received from equipment is decrypted using public keys by step S5-3-1.Server is to data It is decrypted, is completed using following code:
Data=Aes.decrypt (EncryptData, sharekey).
Step S5-3-2 is checked whether there is from the data that decryption obtains and is examined field and calculated result, if without if Determine the data be it is invalid, verifying cannot be passed through, if any, enter in next step.Particularly as being server from decryption It has seen whether there is Clientdata and Hashresult in obtained data data, has been considered illegal if not, verified Not pass through.
Step S5-3-3 further judges the inspection field and whether corresponding with the server equipment of issuing of calculated result Field, calculated result is examined to match, if matching, is verified, otherwise cannot pass through verifying.
Server will record the random data issued to each client, then server also has recorded client quilt simultaneously Batch sequence D of the delay delay i.e. notification information of the i.e. lottery information of information of issuing a notice relative to earliest first batch, To which server can calculate in the hash result of client 0 number N according to N=L+M-D, then server then judges Whether 0 number N meets the requirements in Hashresult, is considered illegal if being unsatisfactory for, if it is satisfied, further clothes Whether the calculated result that business device can calculate client is correct.
Serverhashresult=md5.create (Clientdata+ServerRandData);
Judge what the pre-stored result serverhashresult of server and client were reported by the above code Whether hashresult is consistent, and explanation is illegal if inconsistent.
From algorithm as can be seen that this paper server only needs once to be calculated, and client is wanted to calculate satisfaction 0 number asked needs constantly to convert Clientdata and repeatedly calculates hashresult.
So far, it includes to calculate what is made according to lottery information to client that server is just completed by the step As a result request lottery information carries out the power process of legitimate verification judgement.
In above-described embodiment, preset algorithm is the hash value for calculating random data, and the predetermined value in calculated result is 0, By the number of setting predetermined value 0 come the calculating time of adjustment equipment, to eliminate the computing capability between various distinct devices Difference the hash value for calculating some random data can also be used for the number of other numerical value such as 1,2,3 as a kind of substitution To be adjusted.
In above-described embodiment, inspection field is random data, is also possible to other longer characters.
Fig. 4 is the structural schematic diagram of the information authentication system in the embodiment of the present invention.
Information authentication system 100 is discussed in detail below according to attached drawing 4, for carrying out when equipment sends information to server The verifying of information characterized by comprising
Computing capability obtains module 101, for obtaining the computing capability grade L of equipment;
Notification module 102 in batches, for dividing M batch to notify multiple equipment, corresponding each equipment in different moments Notification information include corresponding computing capability grade L, examine field and the notification information relative to earliest first batch Batch sort D;
Shared key generation module 103 is established for equipment and server and communicates and generate shared key;
Predetermined value calculates judgment module 104, obtains calculated result for carrying out predetermined computation to the inspection field, goes forward side by side One step judges whether the number N of the predetermined value in calculated result meets N=L+M-D;
Matching judgment module 105, for the calculated result of predetermined computation to be used shared key encrypting and transmitting to service Device, and verify whether the calculated result matches with pre-stored result, it is verified if matching.
Recommended information verifies device, including memory and processor further below, stores on memory in processor The computer program of upper operation, it is characterised in that: processor realizes the following method when executing computer program:
S1 obtains the computing capability grade L of equipment;
S2 divides M batch to notify multiple equipment in different moments, and the notification information of corresponding each equipment includes corresponding Computing capability grade L, the batch sequence D of field and the notification information relative to earliest first batch is examined;
S3, equipment and server, which are established, to be communicated and generates shared key;
S4, the equipment receives the corresponding notification information, and the inspection field is input in preset algorithm Calculated result is calculated, enters when the number N of the predetermined value in calculated result meets N=L+M-D in next step;
S5, by calculated result using shared key encrypting and transmitting to server, and by the server authentication calculated result Whether match with pre-stored result, is verified if matching.
The effect of embodiment and effect are: according to the present invention involved in information verification method because its have with Under step: obtain and determine client device computing capability grade L;It is more to notify in batches to divide M batch in different moments A client device, the notification information of corresponding each client include corresponding computing capability grade L, random data and Batch sequence D of the notification information relative to earliest first batch;Client device and server, which are established, to be communicated and generates altogether Enjoy key;The client device receives the corresponding notification information, and carries out specific calculation to the random data and obtain To predetermined value, enter when the number N for carrying out the predetermined value that specific calculation obtains meets N=L+M-D in next step;By specific calculation Calculated result to server, and by server authentication, whether the calculated result is matched using shared key encrypting and transmitting, such as Fruit matching is then verified, so
The client for notifying multiple client devices to enable in batches using M batch is divided in different moments The notification information of barrage prize drawing is first received, some client device evenings receive the notification information of barrage prize drawing, so that server will Flashy prize drawing barrage message is divided into multiple periods to be issued, then spectators carry out bullet in operation client device When curtain prize drawing, the barrage that reports as the time difference and be distributed, received simultaneously so as to avoid server it is a large amount of simultaneously The prize drawing barrage of hair and the instantaneous pressure for leading to server;
Calculation times (meter is carried out using whether the number N for carrying out the predetermined value that specific calculation obtains meets N=L+M-D Evaluation time) adjusting come eliminate user client computing capability difference: as check field random data can according to visitor At the time of the device type and server at family end issue barrage prize drawing notification information, to control the calculation times of client, i.e., Early, the calculation times of the check field of the strong client of the computing capability of client at the time of issued barrage prize drawing notification information Will be more, to counteract the difference of the computing capability of client device, also fundamentally prevents hacker and passed through the association write View generate " robotic user " come brush prize drawing chance (because he equipment it is good but he calculation times it is more, the time is long, so nothing Method largely sends lottery information), so, present invention also improves the fairness of prize drawing.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the present invention Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the present invention, which can be used in one or more, The shape for the computer program product implemented in usable storage medium (including but not limited to magnetic disk storage and optical memory etc.) Formula.
The present invention be referring to according to the method for the embodiment of the present invention, the process of equipment (system) and computer program product Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
Obviously, various changes and modifications can be made to the invention without departing from essence of the invention by those skilled in the art Mind and range.In this way, if these modifications and changes of the present invention belongs to the range of the claims in the present invention and its equivalent technologies Within, then the present invention is also intended to include these modifications and variations.
The present invention is not limited to the above-described embodiments, for those skilled in the art, is not departing from Under the premise of the principle of the invention, several improvements and modifications can also be made, these improvements and modifications are also considered as protection of the invention Within the scope of.The content being not described in detail in this specification belongs to the prior art well known to professional and technical personnel in the field.

Claims (10)

1. a kind of Information Authentication method, for carrying out the verifying of information, including following step when equipment sends information to server It is rapid:
Obtain the computing capability grade L of equipment;
M batch is divided to notify multiple equipment in different moments, the notification information of corresponding each equipment includes corresponding calculating energy Power grade L, the batch sequence D of field and the notification information relative to earliest first batch is examined;
Equipment and server, which are established, to be communicated and generates shared key;
The equipment receives the corresponding notification information, and the inspection field is input in preset algorithm and is calculated Calculated result enters in next step when the number N of the predetermined value in calculated result meets N=L+M-D;
By calculated result using shared key encrypting and transmitting to server, and by the server authentication calculated result with deposit in advance Whether the result of storage matches, and is verified if matching.
2. Information Authentication method according to claim 1, it is characterised in that: wherein, obtain the process of computing capability grade L Are as follows:
The facility information for acquiring equipment compares pre-stored equipment and computing capability grade pair according to collected facility information Information is answered to determine the computing capability grade L of the equipment.
3. Information Authentication method according to claim 1, it is characterised in that:
Wherein, the specific steps notified in batches include:
Selected time T is divided into M parts;
The corresponding all equipment of server is also divided into M parts;
Within first T/M time, the equipment that the notification information is sent to first part of first batch is then suitable according to batch Sequence is sent to other equipment until being sent.
4. Information Authentication method according to claim 1, it is characterised in that:
Wherein, establishing communication and generating the process of shared key includes following sub-step:
When equipment logs on to server, server generates a pair of of public key and private key according to the user information of the equipment;
When equipment logs on to server, equipment is according to timestamp next life public key and the private in a pair for examining field and login time Key;
Server and each equipment intercourse public key and realize that key is shared and establishes communication.
5. Information Authentication method according to claim 1, it is characterised in that:
Wherein, the server is live streaming Platform Server, and the equipment is that the equipment of platform used for spectators user is broadcast live,
The notification information is the notification information of barrage prize drawing, and the inspection field is random data.
6. Information Authentication method according to claim 1, it is characterised in that:
Wherein, the preset algorithm is that the hash value of field is examined to calculate, and the number of corresponding predetermined value is the calculating of hash value Obtain the number that beginning is 0.
7. Information Authentication method according to claim 1, it is characterised in that:
When the number N for carrying out the predetermined value that specific calculation obtains is unsatisfactory for N=L+M-D, equipment can add before examining field Then the data of one multidigit are calculated until meeting condition again.
8. Information Authentication method according to claim 1, it is characterised in that:
Wherein, the whether matched process of the server authentication calculated result includes following sub-step
The notification information received from equipment is decrypted using public keys;
It is checked whether there is from the obtained data of decryption and examines field and calculated result, if determining that the data are invalid without if , verifying cannot be passed through, if any, enter in next step;
Further judge the inspection field and the calculated result inspection field for issuing the equipment whether corresponding with server, calculate knot Fruit matches, if matching, is verified, otherwise cannot pass through verifying.
9. a kind of information authentication system, for carrying out the verifying of information when equipment sends information to server, which is characterized in that Include:
Computing capability obtains module, for obtaining the computing capability grade L of equipment;
Notification module in batches, for dividing M batch to notify multiple equipment, the notice letter of corresponding each equipment in different moments Breath includes corresponding computing capability grade L, field and the notification information is examined to arrange relative to the batch of earliest first batch Sequence D;
Shared key generation module is established for equipment and server and communicates and generate shared key;
Predetermined value calculates judgment module, obtains calculated result for carrying out predetermined computation to the inspection field, and further sentence Whether the number N of the predetermined value in disconnected calculated result meets N=L+M-D;
Matching judgment module for using shared key encrypting and transmitting to server the calculated result of predetermined computation, and is tested It demonstrate,proves whether the calculated result matches with pre-stored result, is verified if matching.
10. a kind of Information Authentication device, including memory and processor, the calculating run on a processor is stored on memory Machine program, it is characterised in that: processor realizes the described in any item methods of claim 1 to 7 when executing computer program.
CN201810737301.0A 2018-07-06 2018-07-06 Information verification method, system and device Active CN108964901B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810737301.0A CN108964901B (en) 2018-07-06 2018-07-06 Information verification method, system and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810737301.0A CN108964901B (en) 2018-07-06 2018-07-06 Information verification method, system and device

Publications (2)

Publication Number Publication Date
CN108964901A true CN108964901A (en) 2018-12-07
CN108964901B CN108964901B (en) 2021-05-28

Family

ID=64482480

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810737301.0A Active CN108964901B (en) 2018-07-06 2018-07-06 Information verification method, system and device

Country Status (1)

Country Link
CN (1) CN108964901B (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905395A (en) * 2019-03-07 2019-06-18 武汉斗鱼鱼乐网络科技有限公司 A kind of believable method of verifying client and relevant apparatus
CN110147658A (en) * 2019-04-16 2019-08-20 平安科技(深圳)有限公司 User information encipher-decipher method, system and computer equipment
CN110415031A (en) * 2019-07-22 2019-11-05 广州虎牙科技有限公司 Interact lottery drawing method, device, electronic equipment and computer readable storage medium
CN111245600A (en) * 2019-12-03 2020-06-05 江苏艾佳家居用品有限公司 Authentication method and system based on block chain technology
CN112312152A (en) * 2020-10-27 2021-02-02 浙江集享电子商务有限公司 Data processing system in network live broadcast

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101674318A (en) * 2008-09-11 2010-03-17 北大方正集团有限公司 Method for pushing data to mobile equipment at regular time
US20130116032A1 (en) * 2008-08-20 2013-05-09 Cfph, Llc Game of chance systems and methods
US20160198203A1 (en) * 2011-06-23 2016-07-07 Ericsson Ab Method and System for Secure Over-the-Top Live Video Delivery
CN106060057A (en) * 2016-06-17 2016-10-26 武汉斗鱼网络科技有限公司 System and method for video live broadcast website to generate white list based on user barrage behavior
CN107529078A (en) * 2017-09-08 2017-12-29 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN108230047A (en) * 2018-02-05 2018-06-29 武汉斗鱼网络科技有限公司 Data processing method of drawing a lottery and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130116032A1 (en) * 2008-08-20 2013-05-09 Cfph, Llc Game of chance systems and methods
CN101674318A (en) * 2008-09-11 2010-03-17 北大方正集团有限公司 Method for pushing data to mobile equipment at regular time
US20160198203A1 (en) * 2011-06-23 2016-07-07 Ericsson Ab Method and System for Secure Over-the-Top Live Video Delivery
CN106060057A (en) * 2016-06-17 2016-10-26 武汉斗鱼网络科技有限公司 System and method for video live broadcast website to generate white list based on user barrage behavior
CN107529078A (en) * 2017-09-08 2017-12-29 武汉斗鱼网络科技有限公司 Prevent the verification method and device brushed
CN108230047A (en) * 2018-02-05 2018-06-29 武汉斗鱼网络科技有限公司 Data processing method of drawing a lottery and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杜星宇: "从斗鱼TV,Twitch TV看网络直播平台的传播模式", 《中国优秀硕士学位论文全文数据库.信息科技辑》 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905395A (en) * 2019-03-07 2019-06-18 武汉斗鱼鱼乐网络科技有限公司 A kind of believable method of verifying client and relevant apparatus
CN109905395B (en) * 2019-03-07 2021-09-07 武汉斗鱼鱼乐网络科技有限公司 Method and related device for verifying credibility of client
CN110147658A (en) * 2019-04-16 2019-08-20 平安科技(深圳)有限公司 User information encipher-decipher method, system and computer equipment
CN110415031A (en) * 2019-07-22 2019-11-05 广州虎牙科技有限公司 Interact lottery drawing method, device, electronic equipment and computer readable storage medium
CN111245600A (en) * 2019-12-03 2020-06-05 江苏艾佳家居用品有限公司 Authentication method and system based on block chain technology
CN112312152A (en) * 2020-10-27 2021-02-02 浙江集享电子商务有限公司 Data processing system in network live broadcast

Also Published As

Publication number Publication date
CN108964901B (en) 2021-05-28

Similar Documents

Publication Publication Date Title
CN108964901A (en) Information Authentication method, system, device
CN103685311B (en) A kind of login validation method and equipment
CN110825810B (en) Block chain-based crowd sensing dual privacy protection method
Wang et al. Distributed security architecture based on blockchain for connected health: Architecture, challenges, and approaches
CN113127916A (en) Data set processing method, data processing device and storage medium
CN104282049B (en) Attendance checking through facial recognition terminal and attendance process Verification System and authentication method
CN107135061B (en) A kind of distributed secret protection machine learning method under 5g communication standard
CN109300038A (en) A kind of transaction system of resource flow
CN112540926A (en) Resource allocation fairness federal learning method based on block chain
CN104754570B (en) Key distribution and reconstruction method and device based on mobile internet
CN113191863B (en) Bid method, third party device, bid issuing party device and bid issuing party device
CN108805571A (en) Data guard method, platform, block chain node, system and storage medium
CN101908961B (en) Multi-party secret handshaking method in short key environment
CN110035058A (en) Resource request method, equipment and storage medium
CN108881966A (en) A kind of information processing method and relevant device
CN110163008A (en) A kind of method and system of the security audit of the Encryption Model of deployment
CN107679149A (en) A kind of data processing method and server
Xu et al. Multi-candidate voting model based on blockchain
CN101547096A (en) Net-meeting system and management method thereof based on digital certificate
CN110300400A (en) One kind is registered method, apparatus, electronic equipment and storage medium
CN113988318A (en) Federal learning method, apparatus, electronic device, and medium
CN110222142A (en) A kind of topic distribution method and device
CN109600357A (en) A kind of distributed identity authentication system, method and server
CN109788349B (en) Method and related device for detecting computing capability
CN110232283A (en) The method and relevant apparatus of blacklist cloud shared authentication based on homomorphic cryptography

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant