CN109102358A - A kind of Information Authentication method, server and storage medium - Google Patents
A kind of Information Authentication method, server and storage medium Download PDFInfo
- Publication number
- CN109102358A CN109102358A CN201810685213.0A CN201810685213A CN109102358A CN 109102358 A CN109102358 A CN 109102358A CN 201810685213 A CN201810685213 A CN 201810685213A CN 109102358 A CN109102358 A CN 109102358A
- Authority
- CN
- China
- Prior art keywords
- information
- party
- mentioned
- block chain
- user side
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0609—Buyer or seller confidence or verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0645—Rental transactions; Leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/16—Real estate
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Tourism & Hospitality (AREA)
- Health & Medical Sciences (AREA)
- General Health & Medical Sciences (AREA)
- Human Resources & Organizations (AREA)
- Primary Health Care (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The embodiment of the present application discloses a kind of Information Authentication method, server and storage medium, and wherein method includes: to receive from the third-party first information, and the first information includes user identifier;The user identifier in the first information is obtained, the first user side is determined according to the user identifier;The confirmation request comprising the first information content is sent to first user side, verifies that first user side to the first information content;Receive the confirmation message from first user side, the first information is uploaded to the block chain, the confirmation message is for confirming that the first information content by verifying, can ensure information authenticity, and Information Authentication and the safety of subsequent transaction can be improved, improve public credibility.
Description
Technical field
This application involves block chain application field more particularly to a kind of Information Authentication methods, server and storage medium.
Background technique
In the quick urbanization process in China, people are very high for the dealing in house and lease demand, about room
The transaction in room is also more and more, since more populations pour into growth area, so that housing need problems demand solves.One
As for, house-owner and tenant hire out and rent a house as third party, by intermediary upload information of real estate, facilitate transaction.
Letting agency's industry is the important component of real estate, among the overall process of real estate economic transactions
It plays a crucial role, provides the intermediary sevices of diversification for the production, circulation and consumption of real estate.But
In the huge environment of house transaction information content, the actual situation of the information of many intermediary's publications can not be verified, the void of some intermediary's publications
False information or the lease demand for violating customers wishes, result in house-owner and tenant's benefit damage.
Summary of the invention
The embodiment of the present application provides a kind of Information Authentication method, server and storage medium, it is ensured that Information Authentication
The safety of reliability and subsequent transaction improves public credibility.
In a first aspect, the embodiment of the present application provides a kind of Information Authentication method, this method comprises:
It receives and comes from the third-party first information, the first information includes user identifier;
The user identifier in the first information is obtained, the first user side is determined according to the user identifier;
The confirmation request comprising the first information content is sent to first user side, makes first user side couple
The first information content is verified;
The confirmation message from first user side is received, the first information is uploaded to the block chain, it is described
Confirmation message is for confirming that the first information content passes through verifying.
As a kind of possible embodiment, it is described the first information is uploaded to the block chain after, the side
Method further include:
The investigation for first information content from second user side is sent to the third party to request;
After the third party confirms the investigation request, receive from the second user side to the first information
The evaluation information of content is recorded in the block chain;
The third-party prestige is assessed according to the evaluation information, obtains and stores the third-party prestige
Assess information.
As a kind of possible embodiment, the third-party credit assessment information is prestige scoring;
In the case where prestige scoring is lower than scoring threshold value, punitive measures, the punishment are executed to the third party
Measure includes:
It limits the information that the third party investigated in the time and uploads number, the invalid third-party first information content,
Or the third party is recorded in blacklist, forbid third party's upload information.
As a kind of possible embodiment, described to receive after the third-party first information, described in the acquisition
Before the user identifier in the first information, the method also includes:
Detect whether the third-party prestige scoring is higher than the scoring threshold value;
If the prestige scoring is higher than the scoring threshold value, the user mark obtained in the first information is executed
The step of knowledge.
As a kind of possible embodiment, the method also includes:
If receiving the confirmation invalid information from first user side, the first information is forbidden to be uploaded to the area
Block chain, the confirmation invalid information indicate that the first information content is unverified.
Second aspect, the embodiment of the present application provide a kind of block chain server, comprising: transmission module, user confirm mould
Block and uploading module, in which:
The transmission module comes from the third-party first information for receiving, and the first information includes user identifier;
User's confirmation module is marked for obtaining the user identifier in the first information according to the user
Know and determines the first user side;
The transmission module is also used to, and is sent the confirmation comprising the first information content to first user side and is asked
It asks, verifies that first user side to the first information content;
The transmission module is also used to, and receives the confirmation message from first user side, and the confirmation message is used for
Confirm that the first information content passes through verifying;
The uploading module, for the first information to be uploaded to the block chain.
As a kind of possible embodiment, the block chain server further includes evaluation module;
The transmission module is also used to, to the third party send from second user side for first information content
Investigate request;
The transmission module is also used to, and after the third party confirms the investigation request, is received and is come from second user
Side is to the evaluation information of the first information content, and the uploading module is also used to, by the second user side to described first
The evaluation information of the information content is recorded in the block chain;
The evaluation module, for assessing according to the evaluation information the third-party prestige, described in acquisition
The third-party credit assessment information is stored in the block chain by third-party credit assessment information, the uploading module
In.
As a kind of possible embodiment, the transmission module is also used to, and is received from first user side really
Recognize invalid information, the confirmation message is for confirming that the first information content passes through verifying;
The uploading module, for prohibiting in the case where receiving from the confirmation invalid information of first user side
Only the first information is uploaded to the block chain.
The third aspect, the embodiment of the present application also provides a kind of block chain server, which includes: including processing
Device, input equipment, output equipment and memory, the processor, input equipment, output equipment and memory are connected with each other,
In, the memory is for storing computer program, and the computer program includes program instruction, and the processor is configured to use
In calling described program instruction, the method as described in first aspect and its any possible embodiment is executed.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage
There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor
The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application will be uploaded to the first information of block chain by receiving from third party, obtain the first information
In user identifier to determine the first user side, sent to the first user side include first information content confirmation request, make the
One user side verifies first information content, then receives the confirmation message from the first user side, and the first information is uploaded
To block chain, above-mentioned confirmation message is for confirming that first information content by verifying, can need after third party's upload information
Will user side's confirmation message relevant to the information it is whether true, confirmation after can just be uploaded to block chain, information is not true then
It can not upload, can be uploaded after needing modification information to confirm in authenticating party, ensure information authenticity.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description
Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of Information Authentication method provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for Information Authentication method that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of block chain server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another block chain server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein
" embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments
In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor
With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand,
Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work
The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing
Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that
It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have
It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap
Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment
And be not intended to limit the application.As present specification and it is used in the attached claims, unless on
Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is
Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt
Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or
" if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true
It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
The characteristic of block chain have open, know together, go center, go trust, transparent, both sides are anonymous, can not distort and can chase after
It traces back.Wherein, open to mean that anyone participate in block chain network with transparent, each equipment can act as a section
Point, each node allow to obtain a complete database copy.Node is based on a set of common recognition mechanism, is calculated altogether by competition
With the entire block chain of maintenance.Any node failure, remaining node remain to work normally.Wherein, decentralization with write to arbitrarily be
Block chain collectively constitutes a network end to end by numerous nodes, and there is no the facilities and administration mechanisms of centralization.Node it
Between data exchange verified by digital signature technology, without trusting each other, as long as according to system it is set rule carry out, section
Other nodes can not cannot be also cheated between point.Wherein, the transparent operation rule that block chain is meant with both sides' anonymity is disclosed,
All data informations are also disclosed, therefore each transaction or evaluation are all visible to all nodes.Due to node and section
It goes to trust between point, therefore is not necessarily to public identity between node, the node of each participation is anonymous.Wherein, can not
It distorts and can be traced and mean each database that can not influence other nodes on the modification of database even more than node, unless energy
It is more than that 51% node is modified simultaneously in control whole network, this is almost impossible generation.
Specifically, block chain can use block linked data structure to verify and be total to storing data, using distributed node
Algorithm is known to generate and guarantee the safety of data transmission and access with more new data, in the way of cryptography, using by automating
The intelligent contract of scripted code composition programs the completely new distributed basis framework and calculation of one kind with operation data.Cause
This, the characteristic that block chain technology can not distort fundamentally changes the credit creation mode of centralization, effectively increases data
Unalterable feature and safety.Wherein, since intelligent contract makes all clauses be written as program, these clauses can be
It being executed automatically on block chain, ensure that block chain can be forced according in intelligent contract when there is the condition for triggering intelligent contract
Content execute, and not by any external force stop, to ensure that the validity and implementation capacity of contract, can not only substantially reduce
Cost can also improve efficiency.Each node on block chain has identical account book, it can be ensured that account book recording process is open
Transparent.A kind of point-to-point, open and clear direct interaction has may be implemented in block chain technology so that high efficiency, it is extensive,
The information interaction approach of non-stop layerization agency becomes reality.
The embodiment of the present application is mainly used in block chain node server, also known as block chain server, and as block chain
The type of node server has very much, can be traditional server, large memory system, desktop computer, laptop, plate
Computer, palm PC, smart phone, portable digital player, smartwatch and Intelligent bracelet etc..Wherein, block chain
Node server is one of server in the block chain network determined according to common recognition mechanism.It should be understood that due to block chain
It is the distributed data base of a decentralization, so data per treatment require to select one of them in block chain network
Server handles data as executor.And the rule for choosing server every time is common recognition mechanism, in the embodiment of the present application
Common recognition mechanism can be proof of work mechanism (Proof of Work, POW), equity prove mechanism (Proof of Stake,
POS), auspicious wave common recognition mechanism (Ripple Consensus) and authorization equity prove mechanism (Delegated Proof of
Stake, DPOS) etc., it is not limited thereto.In the embodiment of the present application, terminal includes but is not limited to the equipment with communication function, intelligence
Energy mobile phone, tablet computer, laptop, desktop computer, portable digital player, Intelligent bracelet and smartwatch etc..
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application
It continues.
It referring to Figure 1, is a kind of schematic flow diagram of Information Authentication method provided by the embodiments of the present application, this method can answer
For block chain server, this method as shown in Figure 1 can include:
101, it receives and comes from the third-party first information, the above-mentioned first information includes user identifier.
Wherein, above-mentioned third party may include can with any terminal device of block chain server communication, or be other
Block chain node server.The above-mentioned first information is the information that above-mentioned third party will be uploaded to block chain, includes user identifier,
And user identifier can be understood as the mark of the user side's (the application claims the first user side) cooperated with third party.From application scenarios
For, above-mentioned third party can be medium platform or agent platform, such as: when third party is letting agency's platform, with third
The user side of Fang Hezuo can be house to let user, then the house that the first information can be that letting agency's platform needs to issue is rented
Rent information, which is by letting agency's platform be house to let user publication information.
Terminal device involved by the embodiment of the present application is the equipment that can be communicated with block chain server, terminal
Equipment and block chain server may be in same local area network or heterogeneous networks, and above-mentioned block chain server can permit more
A terminal device accesses.Above-mentioned terminal device can be mobile terminal, including various hand-held with wireless communication function
Equipment, wearable device calculate equipment or are connected to other processing equipments and various forms of use of radio modem
Family equipment (User Equipment, UE), mobile station (Mobile Station, MS) etc..
Optionally, block chain server first can carry out authentication to above-mentioned third party, confirm that its is accessible above-mentioned
Block chain, then execute step 101;Before executing step 101, above-mentioned first user side is also required to recognize by the first user side
Card, authentication mode can be completed by face recognition, identity card, property ownership certificate or other perfect instruments.Third party is come from receiving
The first information after, the above-mentioned first information is not issued at this time in block chain, the above-mentioned first information, Yi Jike can be kept in
To execute step 102.
102, the above-mentioned user identifier in the above-mentioned first information is obtained, the first user side is determined according to the user identifier.
It is receiving after the third-party first information, the user identifier in the available above-mentioned first information, in area
The user side registered in block chain can distribute a user identifier (such as User ID), to facilitate management and identification identity, and deposit
Storage, therefore can be according to the determining cooperation relevant with the first information of third party this upload of above-mentioned user identifier in block chain
Side, i.e., above-mentioned first user side.
After determining above-mentioned first user side, step 103 can be executed.
103, the confirmation request comprising above-mentioned first information content is sent to above-mentioned first user side, makes first user side
The first information content is verified.
It may include above-mentioned first information content in above-mentioned confirmation request, first information content may include on third party
All the elements of the first information of biography, and may include uplink time and third party's essential information etc..
After determining above-mentioned first user side, can to the authenticity of first user side's confirmation request first information, because
This can send confirmation request to the first user side, wherein including above-mentioned first information content, in order to the first user side reception
After can be shown, then the user cooperated with above-mentioned third party verifies first information content, it can examine third
Whether the first information content of Fang Shangchuan is true.
After sending confirmation request, step 104 can be executed.
104, the confirmation message from above-mentioned first user side is received, which is uploaded to above-mentioned block chain, it should
Confirmation message is for confirming that above-mentioned first information content passes through verifying.
If the first user side confirms that the first information content is true, the first user side can send confirmation invalid information, table
Show that above-mentioned first information content has passed through verifying.After receiving the confirmation message from above-mentioned first user side, it can incite somebody to action
The first information is uploaded to above-mentioned block chain, it is understood that for the first information is uploaded to the node in block chain, that is, discloses
Issue the first information.
Optionally, after step 103, this method can also include: to receive the confirmation nothing from above-mentioned first user side
Information is imitated, the above-mentioned first information is forbidden to be uploaded to above-mentioned block chain, above-mentioned confirmation invalid information indicates above-mentioned first information content
It is unverified.
If the first user side confirms that the first information content is not true, the first information content is not approved in other words, first
User side can send confirmation invalid information, indicate above-mentioned first information content not over verifying.It is receiving from above-mentioned
After the confirmation invalid information of first user side, the above-mentioned first information can be forbidden to be uploaded to above-mentioned block chain.
Optionally, above-mentioned that third party is forbidden to upload the first information to above-mentioned block chain, it can be related to limiting the time, that is, limit
Forbid being uploaded to above-mentioned block chain from third-party information in time processed.It can store the above-mentioned limitation time in block chain,
Such as 30 minutes, 1 hour or 1 day, after unverified, third party cannot go up communication again within the above-mentioned limitation time
Breath, to the above-mentioned limitation time in the past after could upload information again, the process for uploading the first information again can be with aforementioned step
It is rapid identical, it needs to verify by above-mentioned first user side, by could successfully upload after verifying.
Illustrate the execution step of the above method below by concrete example:
By taking the realization of letting agency as an example, house-owner B cooperates with letting agency platform A, and letting agency platform A is needed to help out
It rents a house room 1, before executing the above method, both sides can register identity in block chain first, such as real based on application software
Existing account registration, house-owner B are above-mentioned first user side, and letting agency platform A is above-mentioned third party.Letting agency platform A needs
In block chain with intermediary name upload house-owner B house 1 rental information, wherein may relate to house-owner's personal information,
Time, rental price and house hardware condition etc. are hired out, and when uploading rental information, in order to avoid house-owner and following tenant's benefit
Benefit is impaired, needs first to confirm to house-owner B, has verified the identity of letting agency platform A and going out for related house 1 in house-owner B
It rents after information, letting agency platform A could be uploaded successfully and be issued rental information, improve the fairness of transaction, guarantee room
The authenticity of source information.
It is understood that general house lease platform is all to rent a house by third party (intermediary) and rental housing, in intermediary
Passing deceptive information excessively leads to tenant's inconvenience.In the embodiment of the present application, for example, upload the related source of houses in third party
In the case where information, when being related to the house of the first user side, the above-mentioned first information includes above-mentioned user identifier, i.e. third party is necessary
It is associated with the first user side, in order to which the first information content for requiring verifying to upload to the first user side, such as third party are being issued
When house to let information, some position is navigated to by application software, reuses after house picture uploads and is issued, at this time the
Tripartite cannot directly release news and check for user, but third party is needed to input house-owner's information, can by above-mentioned house-owner's information
To confirm above-mentioned user identifier, so as to send confirmation request to the corresponding above-mentioned first party user of user identifier, i.e., to room
The information content for mainly asking verifying third party's publication prevents third party from uploading deceptive information damage house-owner's interests, while also solving
The trust crisis of both sides, strangles the severe general mood of Liao Hei intermediary.
The embodiment of the present application will be uploaded to the first information of block chain by receiving from third party, obtain the first information
In user identifier to determine the first user side, sent to the first user side include first information content confirmation request, make the
One user side verifies first information content, then receives the confirmation message from the first user side, and the first information is uploaded
To block chain, above-mentioned confirmation message is for confirming that first information content by verifying, can need after third party's upload information
Will user side's confirmation message relevant to the information it is whether true, confirmation after can just be uploaded to block chain, information is not true then
It can not upload, can be uploaded after needing modification information to confirm in authenticating party, ensure information authenticity, and be gone by block chain
The heartization and the characteristic that can not be distorted, it is ensured that the data information of upload is not distorted illegally, thereby may be ensured that Information Authentication with after
The safety of continuous transaction, improves public credibility.
It referring to fig. 2, is a kind of schematic flow diagram of Information Authentication method provided by the embodiments of the present application, the embodiment of the present application
In third party can be letting agency's platform, the first user side can be house-owner, and second user can be with for tenant, Ke Yifen
Block chain is not accessed by terminal device.This method as shown in Figure 2 can include:
201, it receives and comes from the third-party first information, the above-mentioned first information includes user identifier.
Third party, the first user side and the second user side mentioned in the embodiment of the present application need to be above-mentioned by authentication
Authentication may include digital identity verifying.Digital identity in block chain technology, this side of correspondent entity (method/nature) people
A kind of real-name authentication, unique biological characteristic can be taken from the biological person according to different authorization mechanisms, can referred to
Line information, can be pupil information, be also possible to DNA fragmentation information.When an entity people enters net using above-mentioned digital identity
It when network, i.e., is digitally signed using biological information, obtains one and temporarily or permanently authorize to enter target number identity
Network, into the digital identity network after an interlock account generated according to authorization code, which can represent entity people.
Wherein, step 201 can refer to the specific descriptions in the step 101 of embodiment illustrated in fig. 1, and details are not described herein again.
202, the above-mentioned user identifier in the above-mentioned first information is obtained, the first user side is determined according to the user identifier.
After obtaining above-mentioned user identifier, step 203 can be executed.Wherein, step 202 can be real with reference to shown in Fig. 1
The specific descriptions in the step 102 of example are applied, details are not described herein again.
203, the confirmation request comprising above-mentioned first information content is sent to above-mentioned first user side, makes first user side
The first information content is verified.
Wherein, step 203 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, and details are not described herein again.
According to verification result difference, step 206 or step 207 can be executed.
204, the confirmation message from above-mentioned first user side is received, which is uploaded to above-mentioned block chain.It should
Confirmation message is for confirming that above-mentioned first information content passes through verifying.
After receiving the confirmation message from above-mentioned first user side, step 206 can be executed.
205, the confirmation invalid information from above-mentioned first user side is received, the above-mentioned first information is forbidden to be uploaded to above-mentioned area
Block chain.Above-mentioned confirmation invalid information indicates that above-mentioned first information content is unverified.
Wherein, above-mentioned steps 204 and step 205 can refer to the specific descriptions in the step 104 of embodiment illustrated in fig. 1,
Details are not described herein again.
206, the investigation for first information content from second user side is sent to above-mentioned third party to request.
After the above-mentioned first information is uploaded to block chain, the user of authentication or registration was carried out in block chain
It is available to arrive the above-mentioned first information, that is, there is the user of relationship trading demand to may browse through above-mentioned the first letter being verified
Breath, for example, above-mentioned second user side can be understood as wanting the user to rent a house, second user after having browsed the first information
Side can contact third party to the house in the first information to carry out on-the-spot investigation, i.e., block chain server can receive from the
The investigation for first information content of two user sides is requested, and is forwarded the investigation to request to third party, if third party responds, is used
Family can visit the house hired out under the leading of intermediary, after sending above-mentioned investigation request and above-mentioned third party agreement,
Then the second user side can have the qualification evaluated the first information, can execute step 207.
207, it after above-mentioned third party confirms above-mentioned investigation request, receives from above-mentioned second user side to above-mentioned first
The evaluation information of the information content is recorded in above-mentioned block chain.
After above-mentioned third party receives above-mentioned investigation request, it can be confirmed, it can and second user side
Reach common understanding, above-mentioned second user side can be allowed to investigate the house in the first information, can also allow for above-mentioned second to use
It is evaluated family side.Evaluation information can be generated after making an appraisal to first information content in second user side, is recorded in block chain
In, above-mentioned evaluation information can be to be made up of text information (comment), image information (photo or video taken on the spot), with
It and can also include situation of giving a mark to the items of third party and first information content.
208, above-mentioned third-party prestige is assessed according to above-mentioned evaluation information, obtained and stored above-mentioned third-party
Credit assessment information.
Specifically, can also be assessed above-mentioned third-party prestige according to the evaluation information of second user side, obtain
Credit assessment information.May include in above-mentioned evaluation information for count the scoring of third party's prestige (can be Star rating or
Other forms), third-party degrees of comparison or prestige scoring can be calculated to third-party scoring according to all at present,
It is recorded in block chain, is referred to for other users.
Optionally, above-mentioned third-party credit assessment information is prestige scoring, this method further include:
In the case where the scoring of above-mentioned prestige is lower than scoring threshold value, punitive measures, above-mentioned punishment are executed to above-mentioned third party
Measure may include:
It limits the information that above-mentioned third party investigated in the time and uploads number, invalid above-mentioned third-party first information content,
Or above-mentioned third party is recorded in blacklist, forbid upload information.
It can store the above-mentioned investigation time in block chain server, the above-mentioned investigation time can be set to 3 days or one week
Deng;Above-mentioned scoring threshold value, such as 75 points or 60 points, above-mentioned investigation time and scoring can also be stored in block chain server
Threshold value can be modified by the node with modification authority.If detecting third-party prestige scoring lower than above-mentioned scoring threshold
Value, then representing above-mentioned third-party prestige, there are problems, can execute above-mentioned punitive measures to above-mentioned third party.Wherein, specifically
Measure can be the information upload number for limiting above-mentioned third party within the above-mentioned investigation time, for example limitation was only capable of in 1 month
Upload 2 information;Or invalid above-mentioned third-party first information content, it specifically can be the above-mentioned first information that revocation uploads
Or the mark first information is invalid;Or above-mentioned third party is recorded in and is used to store the low third-party blacklist of prestige
In, forbid third party's upload information again.Above-mentioned punitive measures can also have other forms, and can be scored according to different prestige
Different measure is executed, the embodiment of the present application is with no restrictions.
Optionally, after step 201, this method can also include: whether the above-mentioned third-party prestige scoring of detection is high
In above-mentioned scoring threshold value;
If above-mentioned prestige scoring is higher than above-mentioned scoring threshold value, the above-mentioned user mark in the above-mentioned first information of above-mentioned acquisition is executed
The step of knowledge.
When receiving from the third-party first information, block chain server can first to third-party prestige score into
Row detection, judges whether it is higher than above-mentioned scoring threshold value, if being higher than, can execute above-mentioned steps 202, if being not higher than, the
The prestige of tripartite at this time is too low, cannot upload the first information, does not execute above-mentioned steps 202 at this time, and block chain server can be to
Third party, which feeds back, uploads failure information, for prompting third party that cannot upload the above-mentioned first information, further alternative, third party
Prestige scoring, can be accumulated at any time in the case where being not affected by user's variance and commenting, be gradually restored to above-mentioned scoring threshold value with
On, if above-mentioned third-party prestige scoring reaches above-mentioned scoring threshold value, prompt information can be sent to third party, for prompting
Third-party prestige is recovered normal, can be with upload information;If third-party prestige scoring.
It is above-mentioned that assessment and punitive measures are carried out to above-mentioned third-party prestige, it can also be carried out by way of intelligent contract
Specification is realized.
Wherein, intelligent contract is a kind of contract that record provision content is removed with computer language substitution legal language, deployment
Intelligent contract on block chain is that portion can be in the digital contract of CPU execution contract code, when the item for meeting intelligent contract
When money content, rule and clause that the execution that can be automated pre-defines.In alternative embodiments, above-mentioned punishment is arranged
Applying can recorde in intelligent contract, when above-mentioned third-party prestige scoring is lower than scoring threshold value, can trigger intelligent contract
Execution, third party pays corresponding cost according to punitive provision corresponding in intelligent contract.Optionally, shared data can obtain
Block chain can be written by the node definition in block chain in reward, reward in the form of intelligent contract.For example, when above-mentioned
Second party user audits, second to above-mentioned first information content or after evaluating third party if evaluation information passes through
The reward of the forms such as the available integral of side's user account used by a user or coupons.It is also based in intelligent contract
Above-mentioned third party's information uploads and above-mentioned user side evaluation provides that other rewards or punitive measures, the embodiment of the present application do not limit
System.
Wherein, the step 201- step 208 that the embodiment of the present application is mentioned can be executed by server, which can manage
Solution is block chain server, a node being also considered as in block chain.
It by the embodiment of the present application, can receive from the third-party first information, wherein the first information is marked comprising user
Know, obtain above-mentioned user identifier, the first user side is determined according to the user identifier, and then send comprising above-mentioned to the first user side
The confirmation request of first information content verifies that first user side to the first information content, if receiving from above-mentioned
The first information, can be uploaded to above-mentioned block chain by the confirmation message of the first user side, and the confirmation message is above-mentioned for confirming
First information content passes through verifying;If receiving the confirmation invalid information from above-mentioned first user side, forbid above-mentioned first letter
Breath is uploaded to above-mentioned block chain, and above-mentioned confirmation invalid information indicates that above-mentioned first information content is unverified.It can be in third
It after square upload information, needs user side's confirmation message relevant to the information whether true, area can be just uploaded to after confirmation
Block chain, information is not true, can not upload, and can upload after needing modification information to confirm in authenticating party, ensure information authenticity.
The embodiment of the present application can also send the investigation for first information content from second user side to above-mentioned third party and request,
After above-mentioned third party confirms above-mentioned investigation request, reception comments above-mentioned first information content from above-mentioned second user side
Valence information is recorded in above-mentioned block chain, can also be assessed according to above-mentioned evaluation information above-mentioned third-party prestige, be obtained
Above-mentioned third-party credit assessment information is obtained and stores, the information content uploaded by each side user's evaluation third party, objectively
The publication of third party's information is supervised, information authenticity is further improved.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of block chain server provided by the embodiments of the present application, the block
Chain server 300 includes following module:
Above-mentioned transmission module 310 comes from the third-party first information for receiving, and the above-mentioned first information is marked comprising user
Know;
Above-mentioned user's confirmation module 320, for obtaining the above-mentioned user identifier in the above-mentioned first information, according to above-mentioned user
It identifies and determines the first user side;
Above-mentioned transmission module 310 is also used to, and sends the confirmation comprising above-mentioned first information content to above-mentioned first user side
Request, verifies that above-mentioned first user side to above-mentioned first information content;
Above-mentioned transmission module 310 is also used to, and receives the confirmation message from above-mentioned first user side, and above-mentioned confirmation message is used
Pass through verifying in the above-mentioned first information content of confirmation;
Above-mentioned uploading module 330, for the above-mentioned first information to be uploaded to above-mentioned block chain.
As a kind of possible embodiment, above-mentioned block chain server 300 further includes evaluation module 340;
Above-mentioned transmission module 310 is also used to, and sends being directed in the first information from second user side to above-mentioned third party
The investigation of appearance is requested;
Above-mentioned transmission module 310 is also used to, and after above-mentioned third party confirms above-mentioned investigation request, is received and is used from second
Family side is to the evaluation information of above-mentioned first information content, and above-mentioned uploading module 330 is also used to, by above-mentioned second user side to above-mentioned
The evaluation information of first information content is recorded in above-mentioned block chain;
Above-mentioned evaluation module 340, for assessing according to above-mentioned evaluation information above-mentioned third-party prestige, in acquisition
Third-party credit assessment information is stated, above-mentioned third-party credit assessment information is stored in above-mentioned block chain by above-mentioned uploading module
In.
As a kind of possible embodiment, above-mentioned transmission module 310 is also used to, and is received from above-mentioned first user side's
Confirm invalid information, above-mentioned confirmation message is for confirming that above-mentioned first information content passes through verifying;
Above-mentioned uploading module 330, in the case where receiving from the confirmation invalid information of above-mentioned first user side,
The above-mentioned first information is forbidden to be uploaded to above-mentioned block chain.
As a kind of possible embodiment, above-mentioned block chain server 300 further include:
Detection module 350, for detecting whether above-mentioned third-party prestige scoring is higher than scoring threshold value;
If above-mentioned prestige scoring is higher than above-mentioned scoring threshold value, the above-mentioned user mark in the above-mentioned first information of above-mentioned acquisition is executed
The step of knowledge.
According to the specific embodiment of the embodiment of the present application, the step of Fig. 1 and Information Authentication method shown in Fig. 2 are related to
101~104,201~208 modules that can be in block chain server as shown in Figure 3 are performed.For example, in Fig. 1
Step 101~104 can respectively the receiving module 310 as shown in Fig. 3, obtain module 320, sending module 330 and on
Transmission module 340 executes.
By the block chain server 300 of the embodiment of the present application, block chain server 300 can receive will from third party
It is uploaded to the first information of block chain, obtains the user identifier in the first information to determine the first user side, to the first user
Side sends the confirmation request comprising first information content, verifies that the first user side to first information content, then receives and
From the confirmation message of the first user side, the first information is uploaded to block chain, above-mentioned confirmation message is for confirming in the first information
Hold through verifying, user side's confirmation message relevant to the information can be needed whether true after third party's upload information,
Confirmation after can just be uploaded to block chain, information is not true, can not upload, need modification information confirm after authenticating party can on
It passes, has ensured information authenticity.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind block chain server disclosed in the embodiment of the present application.Such as Fig. 4
Shown, which includes processor 401 and memory 402, wherein block chain server 400 can also include
Bus 403, processor 401 and memory 402 can be connected with each other by bus 403, and bus 403 can be Peripheral Component Interconnect
Standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended
Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus,
Control bus etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a seed type convenient for indicating
Bus.Wherein, block chain server 400 can also include input-output equipment 404, and input-output equipment 404 may include
Display screen, such as liquid crystal display.Memory 402 is used to store one or more programs comprising instruction;Processor 401 is used for
It calls and some or all of mentions method and step in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution that is stored in memory 402.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central
Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital
Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit,
ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic
Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at
Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user
Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and
Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited
Store up the information of device type.
By the block chain server 400 of the embodiment of the present application, block chain server 400 can receive will from third party
It is uploaded to the first information of block chain, obtains the user identifier in the first information to determine the first user side, to the first user
Side sends the confirmation request comprising first information content, verifies that the first user side to first information content, then receives and
From the confirmation message of the first user side, the first information is uploaded to block chain, above-mentioned confirmation message is for confirming in the first information
Hold through verifying, user side's confirmation message relevant to the information can be needed whether true after third party's upload information,
Confirmation after can just be uploaded to block chain, information is not true, can not upload, need modification information confirm after authenticating party can on
It passes, has ensured information authenticity.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity
The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer
A kind of some or all of Information Authentication method step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment
Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way
It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of
Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can
To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual
Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module,
It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module
The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple
On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs
's.
If the integrated module is realized in the form of software function module and sells or use as independent product
When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or
Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products
Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment
(can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention
Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory
The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, Ke Yitong
Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
Claims (10)
1. a kind of Information Authentication method, which is characterized in that the described method includes:
It receives and comes from the third-party first information, the first information includes user identifier;
The user identifier in the first information is obtained, the first user side is determined according to the user identifier;
The confirmation request comprising the first information content is sent to first user side, makes first user side to described
First information content is verified;
The confirmation message from first user side is received, the first information is uploaded to the block chain, the confirmation
Information is for confirming that the first information content passes through verifying.
2. the method according to claim 1, wherein it is described by the first information be uploaded to the block chain it
Afterwards, the method also includes:
The investigation for first information content from second user side is sent to the third party to request;
After the third party confirms the investigation request, receive from the second user side to the first information content
Evaluation information, be recorded in the block chain;
The third-party prestige is assessed according to the evaluation information, obtains and stores the third-party credit assessment
Information.
3. according to the method described in claim 2, it is characterized in that, the third-party credit assessment information is prestige scoring;
In the case where prestige scoring is lower than scoring threshold value, punitive measures, the punitive measures are executed to the third party
Include:
It limits the information that the third party investigated in the time and uploads number, the invalid third-party first information content, or
The third party is recorded in blacklist, forbids third party's upload information.
4. according to the method described in claim 3, it is characterized in that, described receive the institute after the third-party first information
Before stating the user identifier obtained in the first information, the method also includes:
Detect whether the third-party prestige scoring is higher than the scoring threshold value;
If the prestige scoring is higher than the scoring threshold value, the user identifier in the acquisition first information is executed
Step.
5. method according to claim 1-4, which is characterized in that the method also includes:
If receiving the confirmation invalid information from first user side, the first information is forbidden to be uploaded to the block
Chain, the confirmation invalid information indicate that the first information content is unverified.
6. a kind of block chain server characterized by comprising transmission module, user's confirmation module and uploading module, in which:
The transmission module comes from the third-party first information for receiving, and the first information includes user identifier;
User's confirmation module, it is true according to the user identifier for obtaining the user identifier in the first information
Fixed first user side;
The transmission module is also used to, and is sent the confirmation request comprising the first information content to first user side, is made
First user side verifies the first information content;
The transmission module is also used to, and receives the confirmation message from first user side, the confirmation message is for confirming
The first information content passes through verifying;
The uploading module, for the first information to be uploaded to the block chain.
7. block chain server according to claim 6, which is characterized in that the block chain server further includes evaluation mould
Block;
The transmission module is also used to, and sends the investigation for first information content from second user side to the third party
Request;
The transmission module is also used to, and after the third party confirms the investigation request, is received and is come from second user side pair
The evaluation information of the first information content, the uploading module are also used to, by the second user side to the first information
The evaluation information of content is recorded in the block chain;
The evaluation module obtains the third for assessing according to the evaluation information the third-party prestige
The third-party credit assessment information is stored in the block chain by the credit assessment information of side, the uploading module.
8. block chain server according to claim 7, which is characterized in that the transmission module is also used to, and reception comes from
The confirmation invalid information of first user side, the confirmation message is for confirming that the first information content passes through verifying;
The uploading module, for forbidding institute in the case where receiving from the confirmation invalid information of first user side
It states the first information and is uploaded to the block chain.
9. a kind of block chain server, which is characterized in that including processor, input equipment, output equipment and memory, the place
It manages device, input equipment, output equipment and memory to be connected with each other, wherein the memory is described for storing computer program
Computer program includes program instruction, and the processor is configured for calling described program instruction, executes such as claim 1-5
Described in any item methods.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described
Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor
The described in any item methods of 1-5.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685213.0A CN109102358A (en) | 2018-06-27 | 2018-06-27 | A kind of Information Authentication method, server and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810685213.0A CN109102358A (en) | 2018-06-27 | 2018-06-27 | A kind of Information Authentication method, server and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109102358A true CN109102358A (en) | 2018-12-28 |
Family
ID=64845238
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810685213.0A Pending CN109102358A (en) | 2018-06-27 | 2018-06-27 | A kind of Information Authentication method, server and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109102358A (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109584096A (en) * | 2019-01-30 | 2019-04-05 | 翟红鹰 | Master and apprentice's social contact method, terminal device and storage medium based on block chain |
CN109767188A (en) * | 2018-12-29 | 2019-05-17 | 百度在线网络技术(北京)有限公司 | Employee inspiration method, apparatus, equipment and storage medium based on block chain |
CN109951489A (en) * | 2019-03-27 | 2019-06-28 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN110598434A (en) * | 2019-09-12 | 2019-12-20 | 腾讯科技(深圳)有限公司 | House information processing method and device based on block chain network, electronic equipment and storage medium |
CN110838067A (en) * | 2019-11-14 | 2020-02-25 | 腾讯科技(深圳)有限公司 | Real estate transaction data processing method, device, server and storage medium |
CN110889264A (en) * | 2019-11-11 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN111291394A (en) * | 2020-01-31 | 2020-06-16 | 腾讯科技(深圳)有限公司 | False information management method, false information management device and storage medium |
Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101763604A (en) * | 2010-03-23 | 2010-06-30 | 王慧文 | Credit data management method and service platform system |
CN105684028A (en) * | 2016-01-26 | 2016-06-15 | 盛玉伟 | Housing website information publishing method and system |
CN107220911A (en) * | 2017-05-10 | 2017-09-29 | 深圳市易图资讯股份有限公司 | A kind of real estate market and information of real estate management system |
CN107292718A (en) * | 2017-06-21 | 2017-10-24 | 李志敏 | Houseclearing management method and server |
CN107426324A (en) * | 2017-08-02 | 2017-12-01 | 余秀英 | A kind of housing tripartite's communication system based on geographical position |
CN107563910A (en) * | 2017-07-21 | 2018-01-09 | 广东工业大学 | A kind of second-hand house method of commerce based on block chain technology |
CN107689019A (en) * | 2017-08-22 | 2018-02-13 | 福建省中电网络科技有限公司 | A kind of source of houses checking method and system |
CN108090659A (en) * | 2017-12-06 | 2018-05-29 | 成都初唐网络科技股份有限公司 | Source of houses distribution method and device |
-
2018
- 2018-06-27 CN CN201810685213.0A patent/CN109102358A/en active Pending
Patent Citations (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101763604A (en) * | 2010-03-23 | 2010-06-30 | 王慧文 | Credit data management method and service platform system |
CN105684028A (en) * | 2016-01-26 | 2016-06-15 | 盛玉伟 | Housing website information publishing method and system |
CN107220911A (en) * | 2017-05-10 | 2017-09-29 | 深圳市易图资讯股份有限公司 | A kind of real estate market and information of real estate management system |
CN107292718A (en) * | 2017-06-21 | 2017-10-24 | 李志敏 | Houseclearing management method and server |
CN107563910A (en) * | 2017-07-21 | 2018-01-09 | 广东工业大学 | A kind of second-hand house method of commerce based on block chain technology |
CN107426324A (en) * | 2017-08-02 | 2017-12-01 | 余秀英 | A kind of housing tripartite's communication system based on geographical position |
CN107689019A (en) * | 2017-08-22 | 2018-02-13 | 福建省中电网络科技有限公司 | A kind of source of houses checking method and system |
CN108090659A (en) * | 2017-12-06 | 2018-05-29 | 成都初唐网络科技股份有限公司 | Source of houses distribution method and device |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109767188A (en) * | 2018-12-29 | 2019-05-17 | 百度在线网络技术(北京)有限公司 | Employee inspiration method, apparatus, equipment and storage medium based on block chain |
CN109584096A (en) * | 2019-01-30 | 2019-04-05 | 翟红鹰 | Master and apprentice's social contact method, terminal device and storage medium based on block chain |
CN109951489A (en) * | 2019-03-27 | 2019-06-28 | 深圳市网心科技有限公司 | A kind of digital identification authentication method, unit, system and storage medium |
CN110598434A (en) * | 2019-09-12 | 2019-12-20 | 腾讯科技(深圳)有限公司 | House information processing method and device based on block chain network, electronic equipment and storage medium |
CN110598434B (en) * | 2019-09-12 | 2023-08-15 | 腾讯科技(深圳)有限公司 | House information processing method and device based on blockchain network, electronic equipment and storage medium |
CN110889264A (en) * | 2019-11-11 | 2020-03-17 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN110889264B (en) * | 2019-11-11 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Multimedia information processing method, device, equipment and storage medium |
CN110838067A (en) * | 2019-11-14 | 2020-02-25 | 腾讯科技(深圳)有限公司 | Real estate transaction data processing method, device, server and storage medium |
CN110838067B (en) * | 2019-11-14 | 2024-04-09 | 腾讯科技(深圳)有限公司 | Real estate transaction data processing method, device, server and storage medium |
CN111291394A (en) * | 2020-01-31 | 2020-06-16 | 腾讯科技(深圳)有限公司 | False information management method, false information management device and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109102358A (en) | A kind of Information Authentication method, server and storage medium | |
EP3989155A1 (en) | Asset trading system enabling transparent trading history management | |
TW202008290A (en) | Blockchain-based service rental methods and devices | |
US9406067B1 (en) | System and method for verifying identity | |
WO2020082868A1 (en) | Block chain-based claim settlement method and apparatus | |
CN109509518A (en) | Management method, server and the computer storage medium of electronic health record | |
CN109543447A (en) | Information processing method, server and computer storage medium based on block chain | |
US20140279611A1 (en) | High assurance federated attribute management | |
CN108985916A (en) | A kind of digital asset management method and server | |
CN108416670A (en) | Credit matches folk prescription method and server | |
CN111369730B (en) | Voting processing method and device based on block chain | |
CA2752089A1 (en) | System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device | |
CN109325848A (en) | Debt collection method, equipment and computer readable storage medium based on block chain | |
CN108830463B (en) | Evaluation record storage method, device, storage medium and system | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
CN108764723B (en) | Evaluation qualification filtering method, device, terminal equipment and system | |
CN109859040A (en) | A kind of method and device carrying out house prosperity transaction based on block chain | |
CN109377395A (en) | Mutual insurance is insured Claims Resolution method and relevant apparatus | |
CN108932678A (en) | Correlating method, device and the storage medium of house property information | |
US9197648B2 (en) | System and method for verifying the identity of an internet user | |
CN109327312A (en) | Authentication method and device, electronic equipment | |
TW201901579A (en) | Data acquisition method and device and electronic device for risk evaluation | |
US20210174373A1 (en) | Ticket validity confirmation device, method, and program | |
CN110602097A (en) | Block chain-based task processing method, device, equipment and storage medium | |
TWI625703B (en) | Online voting and ballot counting system based on blockchain and method thereof |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20181228 |
|
RJ01 | Rejection of invention patent application after publication |