CN109102358A - A kind of Information Authentication method, server and storage medium - Google Patents

A kind of Information Authentication method, server and storage medium Download PDF

Info

Publication number
CN109102358A
CN109102358A CN201810685213.0A CN201810685213A CN109102358A CN 109102358 A CN109102358 A CN 109102358A CN 201810685213 A CN201810685213 A CN 201810685213A CN 109102358 A CN109102358 A CN 109102358A
Authority
CN
China
Prior art keywords
information
party
mentioned
block chain
user side
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810685213.0A
Other languages
Chinese (zh)
Inventor
刘均
苏奥杰
刘新
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Launch Technology Co Ltd
Original Assignee
Shenzhen Launch Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Launch Technology Co Ltd filed Critical Shenzhen Launch Technology Co Ltd
Priority to CN201810685213.0A priority Critical patent/CN109102358A/en
Publication of CN109102358A publication Critical patent/CN109102358A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/16Real estate

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Tourism & Hospitality (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Human Resources & Organizations (AREA)
  • Primary Health Care (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the present application discloses a kind of Information Authentication method, server and storage medium, and wherein method includes: to receive from the third-party first information, and the first information includes user identifier;The user identifier in the first information is obtained, the first user side is determined according to the user identifier;The confirmation request comprising the first information content is sent to first user side, verifies that first user side to the first information content;Receive the confirmation message from first user side, the first information is uploaded to the block chain, the confirmation message is for confirming that the first information content by verifying, can ensure information authenticity, and Information Authentication and the safety of subsequent transaction can be improved, improve public credibility.

Description

A kind of Information Authentication method, server and storage medium
Technical field
This application involves block chain application field more particularly to a kind of Information Authentication methods, server and storage medium.
Background technique
In the quick urbanization process in China, people are very high for the dealing in house and lease demand, about room The transaction in room is also more and more, since more populations pour into growth area, so that housing need problems demand solves.One As for, house-owner and tenant hire out and rent a house as third party, by intermediary upload information of real estate, facilitate transaction.
Letting agency's industry is the important component of real estate, among the overall process of real estate economic transactions It plays a crucial role, provides the intermediary sevices of diversification for the production, circulation and consumption of real estate.But In the huge environment of house transaction information content, the actual situation of the information of many intermediary's publications can not be verified, the void of some intermediary's publications False information or the lease demand for violating customers wishes, result in house-owner and tenant's benefit damage.
Summary of the invention
The embodiment of the present application provides a kind of Information Authentication method, server and storage medium, it is ensured that Information Authentication The safety of reliability and subsequent transaction improves public credibility.
In a first aspect, the embodiment of the present application provides a kind of Information Authentication method, this method comprises:
It receives and comes from the third-party first information, the first information includes user identifier;
The user identifier in the first information is obtained, the first user side is determined according to the user identifier;
The confirmation request comprising the first information content is sent to first user side, makes first user side couple The first information content is verified;
The confirmation message from first user side is received, the first information is uploaded to the block chain, it is described Confirmation message is for confirming that the first information content passes through verifying.
As a kind of possible embodiment, it is described the first information is uploaded to the block chain after, the side Method further include:
The investigation for first information content from second user side is sent to the third party to request;
After the third party confirms the investigation request, receive from the second user side to the first information The evaluation information of content is recorded in the block chain;
The third-party prestige is assessed according to the evaluation information, obtains and stores the third-party prestige Assess information.
As a kind of possible embodiment, the third-party credit assessment information is prestige scoring;
In the case where prestige scoring is lower than scoring threshold value, punitive measures, the punishment are executed to the third party Measure includes:
It limits the information that the third party investigated in the time and uploads number, the invalid third-party first information content, Or the third party is recorded in blacklist, forbid third party's upload information.
As a kind of possible embodiment, described to receive after the third-party first information, described in the acquisition Before the user identifier in the first information, the method also includes:
Detect whether the third-party prestige scoring is higher than the scoring threshold value;
If the prestige scoring is higher than the scoring threshold value, the user mark obtained in the first information is executed The step of knowledge.
As a kind of possible embodiment, the method also includes:
If receiving the confirmation invalid information from first user side, the first information is forbidden to be uploaded to the area Block chain, the confirmation invalid information indicate that the first information content is unverified.
Second aspect, the embodiment of the present application provide a kind of block chain server, comprising: transmission module, user confirm mould Block and uploading module, in which:
The transmission module comes from the third-party first information for receiving, and the first information includes user identifier;
User's confirmation module is marked for obtaining the user identifier in the first information according to the user Know and determines the first user side;
The transmission module is also used to, and is sent the confirmation comprising the first information content to first user side and is asked It asks, verifies that first user side to the first information content;
The transmission module is also used to, and receives the confirmation message from first user side, and the confirmation message is used for Confirm that the first information content passes through verifying;
The uploading module, for the first information to be uploaded to the block chain.
As a kind of possible embodiment, the block chain server further includes evaluation module;
The transmission module is also used to, to the third party send from second user side for first information content Investigate request;
The transmission module is also used to, and after the third party confirms the investigation request, is received and is come from second user Side is to the evaluation information of the first information content, and the uploading module is also used to, by the second user side to described first The evaluation information of the information content is recorded in the block chain;
The evaluation module, for assessing according to the evaluation information the third-party prestige, described in acquisition The third-party credit assessment information is stored in the block chain by third-party credit assessment information, the uploading module In.
As a kind of possible embodiment, the transmission module is also used to, and is received from first user side really Recognize invalid information, the confirmation message is for confirming that the first information content passes through verifying;
The uploading module, for prohibiting in the case where receiving from the confirmation invalid information of first user side Only the first information is uploaded to the block chain.
The third aspect, the embodiment of the present application also provides a kind of block chain server, which includes: including processing Device, input equipment, output equipment and memory, the processor, input equipment, output equipment and memory are connected with each other, In, the memory is for storing computer program, and the computer program includes program instruction, and the processor is configured to use In calling described program instruction, the method as described in first aspect and its any possible embodiment is executed.
Fourth aspect, the embodiment of the present application provide a kind of computer storage medium, the computer storage medium storage There is computer program, the computer program includes program instruction, and described program instruction makes the place when being executed by a processor The method that reason device executes above-mentioned first aspect and its any possible embodiment.
The embodiment of the present application will be uploaded to the first information of block chain by receiving from third party, obtain the first information In user identifier to determine the first user side, sent to the first user side include first information content confirmation request, make the One user side verifies first information content, then receives the confirmation message from the first user side, and the first information is uploaded To block chain, above-mentioned confirmation message is for confirming that first information content by verifying, can need after third party's upload information Will user side's confirmation message relevant to the information it is whether true, confirmation after can just be uploaded to block chain, information is not true then It can not upload, can be uploaded after needing modification information to confirm in authenticating party, ensure information authenticity.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in embodiment description Attached drawing is briefly described.
Fig. 1 is a kind of flow diagram of Information Authentication method provided by the embodiments of the present application;
Fig. 2 is a kind of flow diagram for Information Authentication method that another embodiment of the application provides;
Fig. 3 is a kind of structural schematic diagram of block chain server provided by the embodiments of the present application;
Fig. 4 is the structural schematic diagram of another block chain server provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with the attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Site preparation description, it is clear that described embodiment is some embodiments of the present application, instead of all the embodiments.Herein " embodiment " is referred to it is meant that a particular feature, structure, or characteristic described may be embodied in the application at least in conjunction with the embodiments In one embodiment.The phrase, which occurs, in each position in the description might not each mean identical embodiment, nor With the independent or alternative embodiment of other embodiments mutual exclusion.Those skilled in the art explicitly and implicitly understand, Embodiment described herein can be combined with other embodiments.
Based on the embodiment in the application, those of ordinary skill in the art are obtained without making creative work The every other embodiment obtained, shall fall in the protection scope of this application.
The description and claims of this application and term " first " in above-mentioned attached drawing, " second " etc. are for distinguishing Different objects, are not use to describe a particular order.In addition, term " includes " and " having " and their any deformations, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of not listing or unit, or optionally also wrap Include other step or units intrinsic for these process, methods, product or equipment.
It is also understood that mesh of the term used in this present specification merely for the sake of description specific embodiment And be not intended to limit the application.As present specification and it is used in the attached claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singular, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in present specification and the appended claims is Refer to any combination and all possible combinations of one or more of associated item listed, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determination " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
The characteristic of block chain have open, know together, go center, go trust, transparent, both sides are anonymous, can not distort and can chase after It traces back.Wherein, open to mean that anyone participate in block chain network with transparent, each equipment can act as a section Point, each node allow to obtain a complete database copy.Node is based on a set of common recognition mechanism, is calculated altogether by competition With the entire block chain of maintenance.Any node failure, remaining node remain to work normally.Wherein, decentralization with write to arbitrarily be Block chain collectively constitutes a network end to end by numerous nodes, and there is no the facilities and administration mechanisms of centralization.Node it Between data exchange verified by digital signature technology, without trusting each other, as long as according to system it is set rule carry out, section Other nodes can not cannot be also cheated between point.Wherein, the transparent operation rule that block chain is meant with both sides' anonymity is disclosed, All data informations are also disclosed, therefore each transaction or evaluation are all visible to all nodes.Due to node and section It goes to trust between point, therefore is not necessarily to public identity between node, the node of each participation is anonymous.Wherein, can not It distorts and can be traced and mean each database that can not influence other nodes on the modification of database even more than node, unless energy It is more than that 51% node is modified simultaneously in control whole network, this is almost impossible generation.
Specifically, block chain can use block linked data structure to verify and be total to storing data, using distributed node Algorithm is known to generate and guarantee the safety of data transmission and access with more new data, in the way of cryptography, using by automating The intelligent contract of scripted code composition programs the completely new distributed basis framework and calculation of one kind with operation data.Cause This, the characteristic that block chain technology can not distort fundamentally changes the credit creation mode of centralization, effectively increases data Unalterable feature and safety.Wherein, since intelligent contract makes all clauses be written as program, these clauses can be It being executed automatically on block chain, ensure that block chain can be forced according in intelligent contract when there is the condition for triggering intelligent contract Content execute, and not by any external force stop, to ensure that the validity and implementation capacity of contract, can not only substantially reduce Cost can also improve efficiency.Each node on block chain has identical account book, it can be ensured that account book recording process is open Transparent.A kind of point-to-point, open and clear direct interaction has may be implemented in block chain technology so that high efficiency, it is extensive, The information interaction approach of non-stop layerization agency becomes reality.
The embodiment of the present application is mainly used in block chain node server, also known as block chain server, and as block chain The type of node server has very much, can be traditional server, large memory system, desktop computer, laptop, plate Computer, palm PC, smart phone, portable digital player, smartwatch and Intelligent bracelet etc..Wherein, block chain Node server is one of server in the block chain network determined according to common recognition mechanism.It should be understood that due to block chain It is the distributed data base of a decentralization, so data per treatment require to select one of them in block chain network Server handles data as executor.And the rule for choosing server every time is common recognition mechanism, in the embodiment of the present application Common recognition mechanism can be proof of work mechanism (Proof of Work, POW), equity prove mechanism (Proof of Stake, POS), auspicious wave common recognition mechanism (Ripple Consensus) and authorization equity prove mechanism (Delegated Proof of Stake, DPOS) etc., it is not limited thereto.In the embodiment of the present application, terminal includes but is not limited to the equipment with communication function, intelligence Energy mobile phone, tablet computer, laptop, desktop computer, portable digital player, Intelligent bracelet and smartwatch etc..
In order to more fully understand the embodiment of the present application, will be situated between below to the method for application the embodiment of the present application It continues.
It referring to Figure 1, is a kind of schematic flow diagram of Information Authentication method provided by the embodiments of the present application, this method can answer For block chain server, this method as shown in Figure 1 can include:
101, it receives and comes from the third-party first information, the above-mentioned first information includes user identifier.
Wherein, above-mentioned third party may include can with any terminal device of block chain server communication, or be other Block chain node server.The above-mentioned first information is the information that above-mentioned third party will be uploaded to block chain, includes user identifier, And user identifier can be understood as the mark of the user side's (the application claims the first user side) cooperated with third party.From application scenarios For, above-mentioned third party can be medium platform or agent platform, such as: when third party is letting agency's platform, with third The user side of Fang Hezuo can be house to let user, then the house that the first information can be that letting agency's platform needs to issue is rented Rent information, which is by letting agency's platform be house to let user publication information.
Terminal device involved by the embodiment of the present application is the equipment that can be communicated with block chain server, terminal Equipment and block chain server may be in same local area network or heterogeneous networks, and above-mentioned block chain server can permit more A terminal device accesses.Above-mentioned terminal device can be mobile terminal, including various hand-held with wireless communication function Equipment, wearable device calculate equipment or are connected to other processing equipments and various forms of use of radio modem Family equipment (User Equipment, UE), mobile station (Mobile Station, MS) etc..
Optionally, block chain server first can carry out authentication to above-mentioned third party, confirm that its is accessible above-mentioned Block chain, then execute step 101;Before executing step 101, above-mentioned first user side is also required to recognize by the first user side Card, authentication mode can be completed by face recognition, identity card, property ownership certificate or other perfect instruments.Third party is come from receiving The first information after, the above-mentioned first information is not issued at this time in block chain, the above-mentioned first information, Yi Jike can be kept in To execute step 102.
102, the above-mentioned user identifier in the above-mentioned first information is obtained, the first user side is determined according to the user identifier.
It is receiving after the third-party first information, the user identifier in the available above-mentioned first information, in area The user side registered in block chain can distribute a user identifier (such as User ID), to facilitate management and identification identity, and deposit Storage, therefore can be according to the determining cooperation relevant with the first information of third party this upload of above-mentioned user identifier in block chain Side, i.e., above-mentioned first user side.
After determining above-mentioned first user side, step 103 can be executed.
103, the confirmation request comprising above-mentioned first information content is sent to above-mentioned first user side, makes first user side The first information content is verified.
It may include above-mentioned first information content in above-mentioned confirmation request, first information content may include on third party All the elements of the first information of biography, and may include uplink time and third party's essential information etc..
After determining above-mentioned first user side, can to the authenticity of first user side's confirmation request first information, because This can send confirmation request to the first user side, wherein including above-mentioned first information content, in order to the first user side reception After can be shown, then the user cooperated with above-mentioned third party verifies first information content, it can examine third Whether the first information content of Fang Shangchuan is true.
After sending confirmation request, step 104 can be executed.
104, the confirmation message from above-mentioned first user side is received, which is uploaded to above-mentioned block chain, it should Confirmation message is for confirming that above-mentioned first information content passes through verifying.
If the first user side confirms that the first information content is true, the first user side can send confirmation invalid information, table Show that above-mentioned first information content has passed through verifying.After receiving the confirmation message from above-mentioned first user side, it can incite somebody to action The first information is uploaded to above-mentioned block chain, it is understood that for the first information is uploaded to the node in block chain, that is, discloses Issue the first information.
Optionally, after step 103, this method can also include: to receive the confirmation nothing from above-mentioned first user side Information is imitated, the above-mentioned first information is forbidden to be uploaded to above-mentioned block chain, above-mentioned confirmation invalid information indicates above-mentioned first information content It is unverified.
If the first user side confirms that the first information content is not true, the first information content is not approved in other words, first User side can send confirmation invalid information, indicate above-mentioned first information content not over verifying.It is receiving from above-mentioned After the confirmation invalid information of first user side, the above-mentioned first information can be forbidden to be uploaded to above-mentioned block chain.
Optionally, above-mentioned that third party is forbidden to upload the first information to above-mentioned block chain, it can be related to limiting the time, that is, limit Forbid being uploaded to above-mentioned block chain from third-party information in time processed.It can store the above-mentioned limitation time in block chain, Such as 30 minutes, 1 hour or 1 day, after unverified, third party cannot go up communication again within the above-mentioned limitation time Breath, to the above-mentioned limitation time in the past after could upload information again, the process for uploading the first information again can be with aforementioned step It is rapid identical, it needs to verify by above-mentioned first user side, by could successfully upload after verifying.
Illustrate the execution step of the above method below by concrete example:
By taking the realization of letting agency as an example, house-owner B cooperates with letting agency platform A, and letting agency platform A is needed to help out It rents a house room 1, before executing the above method, both sides can register identity in block chain first, such as real based on application software Existing account registration, house-owner B are above-mentioned first user side, and letting agency platform A is above-mentioned third party.Letting agency platform A needs In block chain with intermediary name upload house-owner B house 1 rental information, wherein may relate to house-owner's personal information, Time, rental price and house hardware condition etc. are hired out, and when uploading rental information, in order to avoid house-owner and following tenant's benefit Benefit is impaired, needs first to confirm to house-owner B, has verified the identity of letting agency platform A and going out for related house 1 in house-owner B It rents after information, letting agency platform A could be uploaded successfully and be issued rental information, improve the fairness of transaction, guarantee room The authenticity of source information.
It is understood that general house lease platform is all to rent a house by third party (intermediary) and rental housing, in intermediary Passing deceptive information excessively leads to tenant's inconvenience.In the embodiment of the present application, for example, upload the related source of houses in third party In the case where information, when being related to the house of the first user side, the above-mentioned first information includes above-mentioned user identifier, i.e. third party is necessary It is associated with the first user side, in order to which the first information content for requiring verifying to upload to the first user side, such as third party are being issued When house to let information, some position is navigated to by application software, reuses after house picture uploads and is issued, at this time the Tripartite cannot directly release news and check for user, but third party is needed to input house-owner's information, can by above-mentioned house-owner's information To confirm above-mentioned user identifier, so as to send confirmation request to the corresponding above-mentioned first party user of user identifier, i.e., to room The information content for mainly asking verifying third party's publication prevents third party from uploading deceptive information damage house-owner's interests, while also solving The trust crisis of both sides, strangles the severe general mood of Liao Hei intermediary.
The embodiment of the present application will be uploaded to the first information of block chain by receiving from third party, obtain the first information In user identifier to determine the first user side, sent to the first user side include first information content confirmation request, make the One user side verifies first information content, then receives the confirmation message from the first user side, and the first information is uploaded To block chain, above-mentioned confirmation message is for confirming that first information content by verifying, can need after third party's upload information Will user side's confirmation message relevant to the information it is whether true, confirmation after can just be uploaded to block chain, information is not true then It can not upload, can be uploaded after needing modification information to confirm in authenticating party, ensure information authenticity, and be gone by block chain The heartization and the characteristic that can not be distorted, it is ensured that the data information of upload is not distorted illegally, thereby may be ensured that Information Authentication with after The safety of continuous transaction, improves public credibility.
It referring to fig. 2, is a kind of schematic flow diagram of Information Authentication method provided by the embodiments of the present application, the embodiment of the present application In third party can be letting agency's platform, the first user side can be house-owner, and second user can be with for tenant, Ke Yifen Block chain is not accessed by terminal device.This method as shown in Figure 2 can include:
201, it receives and comes from the third-party first information, the above-mentioned first information includes user identifier.
Third party, the first user side and the second user side mentioned in the embodiment of the present application need to be above-mentioned by authentication Authentication may include digital identity verifying.Digital identity in block chain technology, this side of correspondent entity (method/nature) people A kind of real-name authentication, unique biological characteristic can be taken from the biological person according to different authorization mechanisms, can referred to Line information, can be pupil information, be also possible to DNA fragmentation information.When an entity people enters net using above-mentioned digital identity It when network, i.e., is digitally signed using biological information, obtains one and temporarily or permanently authorize to enter target number identity Network, into the digital identity network after an interlock account generated according to authorization code, which can represent entity people.
Wherein, step 201 can refer to the specific descriptions in the step 101 of embodiment illustrated in fig. 1, and details are not described herein again.
202, the above-mentioned user identifier in the above-mentioned first information is obtained, the first user side is determined according to the user identifier.
After obtaining above-mentioned user identifier, step 203 can be executed.Wherein, step 202 can be real with reference to shown in Fig. 1 The specific descriptions in the step 102 of example are applied, details are not described herein again.
203, the confirmation request comprising above-mentioned first information content is sent to above-mentioned first user side, makes first user side The first information content is verified.
Wherein, step 203 can refer to the specific descriptions in the step 103 of embodiment illustrated in fig. 1, and details are not described herein again. According to verification result difference, step 206 or step 207 can be executed.
204, the confirmation message from above-mentioned first user side is received, which is uploaded to above-mentioned block chain.It should Confirmation message is for confirming that above-mentioned first information content passes through verifying.
After receiving the confirmation message from above-mentioned first user side, step 206 can be executed.
205, the confirmation invalid information from above-mentioned first user side is received, the above-mentioned first information is forbidden to be uploaded to above-mentioned area Block chain.Above-mentioned confirmation invalid information indicates that above-mentioned first information content is unverified.
Wherein, above-mentioned steps 204 and step 205 can refer to the specific descriptions in the step 104 of embodiment illustrated in fig. 1, Details are not described herein again.
206, the investigation for first information content from second user side is sent to above-mentioned third party to request.
After the above-mentioned first information is uploaded to block chain, the user of authentication or registration was carried out in block chain It is available to arrive the above-mentioned first information, that is, there is the user of relationship trading demand to may browse through above-mentioned the first letter being verified Breath, for example, above-mentioned second user side can be understood as wanting the user to rent a house, second user after having browsed the first information Side can contact third party to the house in the first information to carry out on-the-spot investigation, i.e., block chain server can receive from the The investigation for first information content of two user sides is requested, and is forwarded the investigation to request to third party, if third party responds, is used Family can visit the house hired out under the leading of intermediary, after sending above-mentioned investigation request and above-mentioned third party agreement, Then the second user side can have the qualification evaluated the first information, can execute step 207.
207, it after above-mentioned third party confirms above-mentioned investigation request, receives from above-mentioned second user side to above-mentioned first The evaluation information of the information content is recorded in above-mentioned block chain.
After above-mentioned third party receives above-mentioned investigation request, it can be confirmed, it can and second user side Reach common understanding, above-mentioned second user side can be allowed to investigate the house in the first information, can also allow for above-mentioned second to use It is evaluated family side.Evaluation information can be generated after making an appraisal to first information content in second user side, is recorded in block chain In, above-mentioned evaluation information can be to be made up of text information (comment), image information (photo or video taken on the spot), with It and can also include situation of giving a mark to the items of third party and first information content.
208, above-mentioned third-party prestige is assessed according to above-mentioned evaluation information, obtained and stored above-mentioned third-party Credit assessment information.
Specifically, can also be assessed above-mentioned third-party prestige according to the evaluation information of second user side, obtain Credit assessment information.May include in above-mentioned evaluation information for count the scoring of third party's prestige (can be Star rating or Other forms), third-party degrees of comparison or prestige scoring can be calculated to third-party scoring according to all at present, It is recorded in block chain, is referred to for other users.
Optionally, above-mentioned third-party credit assessment information is prestige scoring, this method further include:
In the case where the scoring of above-mentioned prestige is lower than scoring threshold value, punitive measures, above-mentioned punishment are executed to above-mentioned third party Measure may include:
It limits the information that above-mentioned third party investigated in the time and uploads number, invalid above-mentioned third-party first information content, Or above-mentioned third party is recorded in blacklist, forbid upload information.
It can store the above-mentioned investigation time in block chain server, the above-mentioned investigation time can be set to 3 days or one week Deng;Above-mentioned scoring threshold value, such as 75 points or 60 points, above-mentioned investigation time and scoring can also be stored in block chain server Threshold value can be modified by the node with modification authority.If detecting third-party prestige scoring lower than above-mentioned scoring threshold Value, then representing above-mentioned third-party prestige, there are problems, can execute above-mentioned punitive measures to above-mentioned third party.Wherein, specifically Measure can be the information upload number for limiting above-mentioned third party within the above-mentioned investigation time, for example limitation was only capable of in 1 month Upload 2 information;Or invalid above-mentioned third-party first information content, it specifically can be the above-mentioned first information that revocation uploads Or the mark first information is invalid;Or above-mentioned third party is recorded in and is used to store the low third-party blacklist of prestige In, forbid third party's upload information again.Above-mentioned punitive measures can also have other forms, and can be scored according to different prestige Different measure is executed, the embodiment of the present application is with no restrictions.
Optionally, after step 201, this method can also include: whether the above-mentioned third-party prestige scoring of detection is high In above-mentioned scoring threshold value;
If above-mentioned prestige scoring is higher than above-mentioned scoring threshold value, the above-mentioned user mark in the above-mentioned first information of above-mentioned acquisition is executed The step of knowledge.
When receiving from the third-party first information, block chain server can first to third-party prestige score into Row detection, judges whether it is higher than above-mentioned scoring threshold value, if being higher than, can execute above-mentioned steps 202, if being not higher than, the The prestige of tripartite at this time is too low, cannot upload the first information, does not execute above-mentioned steps 202 at this time, and block chain server can be to Third party, which feeds back, uploads failure information, for prompting third party that cannot upload the above-mentioned first information, further alternative, third party Prestige scoring, can be accumulated at any time in the case where being not affected by user's variance and commenting, be gradually restored to above-mentioned scoring threshold value with On, if above-mentioned third-party prestige scoring reaches above-mentioned scoring threshold value, prompt information can be sent to third party, for prompting Third-party prestige is recovered normal, can be with upload information;If third-party prestige scoring.
It is above-mentioned that assessment and punitive measures are carried out to above-mentioned third-party prestige, it can also be carried out by way of intelligent contract Specification is realized.
Wherein, intelligent contract is a kind of contract that record provision content is removed with computer language substitution legal language, deployment Intelligent contract on block chain is that portion can be in the digital contract of CPU execution contract code, when the item for meeting intelligent contract When money content, rule and clause that the execution that can be automated pre-defines.In alternative embodiments, above-mentioned punishment is arranged Applying can recorde in intelligent contract, when above-mentioned third-party prestige scoring is lower than scoring threshold value, can trigger intelligent contract Execution, third party pays corresponding cost according to punitive provision corresponding in intelligent contract.Optionally, shared data can obtain Block chain can be written by the node definition in block chain in reward, reward in the form of intelligent contract.For example, when above-mentioned Second party user audits, second to above-mentioned first information content or after evaluating third party if evaluation information passes through The reward of the forms such as the available integral of side's user account used by a user or coupons.It is also based in intelligent contract Above-mentioned third party's information uploads and above-mentioned user side evaluation provides that other rewards or punitive measures, the embodiment of the present application do not limit System.
Wherein, the step 201- step 208 that the embodiment of the present application is mentioned can be executed by server, which can manage Solution is block chain server, a node being also considered as in block chain.
It by the embodiment of the present application, can receive from the third-party first information, wherein the first information is marked comprising user Know, obtain above-mentioned user identifier, the first user side is determined according to the user identifier, and then send comprising above-mentioned to the first user side The confirmation request of first information content verifies that first user side to the first information content, if receiving from above-mentioned The first information, can be uploaded to above-mentioned block chain by the confirmation message of the first user side, and the confirmation message is above-mentioned for confirming First information content passes through verifying;If receiving the confirmation invalid information from above-mentioned first user side, forbid above-mentioned first letter Breath is uploaded to above-mentioned block chain, and above-mentioned confirmation invalid information indicates that above-mentioned first information content is unverified.It can be in third It after square upload information, needs user side's confirmation message relevant to the information whether true, area can be just uploaded to after confirmation Block chain, information is not true, can not upload, and can upload after needing modification information to confirm in authenticating party, ensure information authenticity. The embodiment of the present application can also send the investigation for first information content from second user side to above-mentioned third party and request, After above-mentioned third party confirms above-mentioned investigation request, reception comments above-mentioned first information content from above-mentioned second user side Valence information is recorded in above-mentioned block chain, can also be assessed according to above-mentioned evaluation information above-mentioned third-party prestige, be obtained Above-mentioned third-party credit assessment information is obtained and stores, the information content uploaded by each side user's evaluation third party, objectively The publication of third party's information is supervised, information authenticity is further improved.
Fig. 3 is referred to, Fig. 3 is a kind of structural schematic diagram of block chain server provided by the embodiments of the present application, the block Chain server 300 includes following module:
Above-mentioned transmission module 310 comes from the third-party first information for receiving, and the above-mentioned first information is marked comprising user Know;
Above-mentioned user's confirmation module 320, for obtaining the above-mentioned user identifier in the above-mentioned first information, according to above-mentioned user It identifies and determines the first user side;
Above-mentioned transmission module 310 is also used to, and sends the confirmation comprising above-mentioned first information content to above-mentioned first user side Request, verifies that above-mentioned first user side to above-mentioned first information content;
Above-mentioned transmission module 310 is also used to, and receives the confirmation message from above-mentioned first user side, and above-mentioned confirmation message is used Pass through verifying in the above-mentioned first information content of confirmation;
Above-mentioned uploading module 330, for the above-mentioned first information to be uploaded to above-mentioned block chain.
As a kind of possible embodiment, above-mentioned block chain server 300 further includes evaluation module 340;
Above-mentioned transmission module 310 is also used to, and sends being directed in the first information from second user side to above-mentioned third party The investigation of appearance is requested;
Above-mentioned transmission module 310 is also used to, and after above-mentioned third party confirms above-mentioned investigation request, is received and is used from second Family side is to the evaluation information of above-mentioned first information content, and above-mentioned uploading module 330 is also used to, by above-mentioned second user side to above-mentioned The evaluation information of first information content is recorded in above-mentioned block chain;
Above-mentioned evaluation module 340, for assessing according to above-mentioned evaluation information above-mentioned third-party prestige, in acquisition Third-party credit assessment information is stated, above-mentioned third-party credit assessment information is stored in above-mentioned block chain by above-mentioned uploading module In.
As a kind of possible embodiment, above-mentioned transmission module 310 is also used to, and is received from above-mentioned first user side's Confirm invalid information, above-mentioned confirmation message is for confirming that above-mentioned first information content passes through verifying;
Above-mentioned uploading module 330, in the case where receiving from the confirmation invalid information of above-mentioned first user side, The above-mentioned first information is forbidden to be uploaded to above-mentioned block chain.
As a kind of possible embodiment, above-mentioned block chain server 300 further include:
Detection module 350, for detecting whether above-mentioned third-party prestige scoring is higher than scoring threshold value;
If above-mentioned prestige scoring is higher than above-mentioned scoring threshold value, the above-mentioned user mark in the above-mentioned first information of above-mentioned acquisition is executed The step of knowledge.
According to the specific embodiment of the embodiment of the present application, the step of Fig. 1 and Information Authentication method shown in Fig. 2 are related to 101~104,201~208 modules that can be in block chain server as shown in Figure 3 are performed.For example, in Fig. 1 Step 101~104 can respectively the receiving module 310 as shown in Fig. 3, obtain module 320, sending module 330 and on Transmission module 340 executes.
By the block chain server 300 of the embodiment of the present application, block chain server 300 can receive will from third party It is uploaded to the first information of block chain, obtains the user identifier in the first information to determine the first user side, to the first user Side sends the confirmation request comprising first information content, verifies that the first user side to first information content, then receives and From the confirmation message of the first user side, the first information is uploaded to block chain, above-mentioned confirmation message is for confirming in the first information Hold through verifying, user side's confirmation message relevant to the information can be needed whether true after third party's upload information, Confirmation after can just be uploaded to block chain, information is not true, can not upload, need modification information confirm after authenticating party can on It passes, has ensured information authenticity.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another kind block chain server disclosed in the embodiment of the present application.Such as Fig. 4 Shown, which includes processor 401 and memory 402, wherein block chain server 400 can also include Bus 403, processor 401 and memory 402 can be connected with each other by bus 403, and bus 403 can be Peripheral Component Interconnect Standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..Bus 403 can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a thick line in Fig. 4, it is not intended that an only bus or a seed type convenient for indicating Bus.Wherein, block chain server 400 can also include input-output equipment 404, and input-output equipment 404 may include Display screen, such as liquid crystal display.Memory 402 is used to store one or more programs comprising instruction;Processor 401 is used for It calls and some or all of mentions method and step in the above-mentioned Fig. 1 and Fig. 2 embodiment of instruction execution that is stored in memory 402.
It should be appreciated that in the embodiment of the present application, alleged processor 401 can be central processing unit (Central Processing Unit, CPU), which can also be other general processors, digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at Reason device is also possible to any conventional processor etc..
Input equipment 402 may include that Trackpad, fingerprint adopt sensor (for acquiring the finger print information and fingerprint of user Directional information), microphone etc., output equipment 403 may include display (LCD etc.), loudspeaker etc..
The memory 404 may include read-only memory and random access memory, and to processor 401 provide instruction and Data.The a part of of memory 404 can also include nonvolatile RAM.For example, memory 404 can also be deposited Store up the information of device type.
By the block chain server 400 of the embodiment of the present application, block chain server 400 can receive will from third party It is uploaded to the first information of block chain, obtains the user identifier in the first information to determine the first user side, to the first user Side sends the confirmation request comprising first information content, verifies that the first user side to first information content, then receives and From the confirmation message of the first user side, the first information is uploaded to block chain, above-mentioned confirmation message is for confirming in the first information Hold through verifying, user side's confirmation message relevant to the information can be needed whether true after third party's upload information, Confirmation after can just be uploaded to block chain, information is not true, can not upload, need modification information confirm after authenticating party can on It passes, has ensured information authenticity.
The embodiment of the present application also provides a kind of computer storage medium, wherein computer storage medium storage is for electricity The computer program of subdata exchange, it is as any in recorded in above method embodiment which execute computer A kind of some or all of Information Authentication method step.
In the above-described embodiments, it all emphasizes particularly on different fields to the description of each embodiment, there is no the portion being described in detail in some embodiment Point, reference can be made to the related descriptions of other embodiments.
In several embodiments provided herein, it should be understood that disclosed device, it can be by another way It realizes.For example, the apparatus embodiments described above are merely exemplary, such as the division of the module, it is only a kind of Logical function partition, there may be another division manner in actual implementation, such as multiple units or components can combine or can To be integrated into another system, or some features can be ignored or not executed.Another point, shown or discussed is mutual Coupling, direct-coupling or communication connection can be through some interfaces, the indirect coupling or communication connection of device or module, It can be electrical or other forms.
The module as illustrated by the separation member may or may not be physically separated, aobvious as module The component shown may or may not be physical module, it can and it is in one place, or may be distributed over multiple On network module.Some or all of the modules therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
If the integrated module is realized in the form of software function module and sells or use as independent product When, it can store in a computer-readable access to memory.Based on this understanding, technical solution of the present invention substantially or Person says that all or part of the part that contributes to existing technology or the technical solution can body in the form of software products Reveal and, which is stored in a memory, including some instructions are used so that a computer equipment (can be personal computer, server or network equipment etc.) executes all or part of each embodiment the method for the present invention Step.And memory above-mentioned includes: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory The various media that can store program code such as (Random Access Memory, RAM), mobile hard disk, magnetic or disk.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, Ke Yitong Computer program is crossed to instruct relevant hardware and complete, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..

Claims (10)

1. a kind of Information Authentication method, which is characterized in that the described method includes:
It receives and comes from the third-party first information, the first information includes user identifier;
The user identifier in the first information is obtained, the first user side is determined according to the user identifier;
The confirmation request comprising the first information content is sent to first user side, makes first user side to described First information content is verified;
The confirmation message from first user side is received, the first information is uploaded to the block chain, the confirmation Information is for confirming that the first information content passes through verifying.
2. the method according to claim 1, wherein it is described by the first information be uploaded to the block chain it Afterwards, the method also includes:
The investigation for first information content from second user side is sent to the third party to request;
After the third party confirms the investigation request, receive from the second user side to the first information content Evaluation information, be recorded in the block chain;
The third-party prestige is assessed according to the evaluation information, obtains and stores the third-party credit assessment Information.
3. according to the method described in claim 2, it is characterized in that, the third-party credit assessment information is prestige scoring;
In the case where prestige scoring is lower than scoring threshold value, punitive measures, the punitive measures are executed to the third party Include:
It limits the information that the third party investigated in the time and uploads number, the invalid third-party first information content, or The third party is recorded in blacklist, forbids third party's upload information.
4. according to the method described in claim 3, it is characterized in that, described receive the institute after the third-party first information Before stating the user identifier obtained in the first information, the method also includes:
Detect whether the third-party prestige scoring is higher than the scoring threshold value;
If the prestige scoring is higher than the scoring threshold value, the user identifier in the acquisition first information is executed Step.
5. method according to claim 1-4, which is characterized in that the method also includes:
If receiving the confirmation invalid information from first user side, the first information is forbidden to be uploaded to the block Chain, the confirmation invalid information indicate that the first information content is unverified.
6. a kind of block chain server characterized by comprising transmission module, user's confirmation module and uploading module, in which:
The transmission module comes from the third-party first information for receiving, and the first information includes user identifier;
User's confirmation module, it is true according to the user identifier for obtaining the user identifier in the first information Fixed first user side;
The transmission module is also used to, and is sent the confirmation request comprising the first information content to first user side, is made First user side verifies the first information content;
The transmission module is also used to, and receives the confirmation message from first user side, the confirmation message is for confirming The first information content passes through verifying;
The uploading module, for the first information to be uploaded to the block chain.
7. block chain server according to claim 6, which is characterized in that the block chain server further includes evaluation mould Block;
The transmission module is also used to, and sends the investigation for first information content from second user side to the third party Request;
The transmission module is also used to, and after the third party confirms the investigation request, is received and is come from second user side pair The evaluation information of the first information content, the uploading module are also used to, by the second user side to the first information The evaluation information of content is recorded in the block chain;
The evaluation module obtains the third for assessing according to the evaluation information the third-party prestige The third-party credit assessment information is stored in the block chain by the credit assessment information of side, the uploading module.
8. block chain server according to claim 7, which is characterized in that the transmission module is also used to, and reception comes from The confirmation invalid information of first user side, the confirmation message is for confirming that the first information content passes through verifying;
The uploading module, for forbidding institute in the case where receiving from the confirmation invalid information of first user side It states the first information and is uploaded to the block chain.
9. a kind of block chain server, which is characterized in that including processor, input equipment, output equipment and memory, the place It manages device, input equipment, output equipment and memory to be connected with each other, wherein the memory is described for storing computer program Computer program includes program instruction, and the processor is configured for calling described program instruction, executes such as claim 1-5 Described in any item methods.
10. a kind of computer storage medium, which is characterized in that the computer storage medium is stored with computer program, described Computer program includes program instruction, and described program instruction makes the processor execute such as claim when being executed by a processor The described in any item methods of 1-5.
CN201810685213.0A 2018-06-27 2018-06-27 A kind of Information Authentication method, server and storage medium Pending CN109102358A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810685213.0A CN109102358A (en) 2018-06-27 2018-06-27 A kind of Information Authentication method, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810685213.0A CN109102358A (en) 2018-06-27 2018-06-27 A kind of Information Authentication method, server and storage medium

Publications (1)

Publication Number Publication Date
CN109102358A true CN109102358A (en) 2018-12-28

Family

ID=64845238

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810685213.0A Pending CN109102358A (en) 2018-06-27 2018-06-27 A kind of Information Authentication method, server and storage medium

Country Status (1)

Country Link
CN (1) CN109102358A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109584096A (en) * 2019-01-30 2019-04-05 翟红鹰 Master and apprentice's social contact method, terminal device and storage medium based on block chain
CN109767188A (en) * 2018-12-29 2019-05-17 百度在线网络技术(北京)有限公司 Employee inspiration method, apparatus, equipment and storage medium based on block chain
CN109951489A (en) * 2019-03-27 2019-06-28 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN110598434A (en) * 2019-09-12 2019-12-20 腾讯科技(深圳)有限公司 House information processing method and device based on block chain network, electronic equipment and storage medium
CN110838067A (en) * 2019-11-14 2020-02-25 腾讯科技(深圳)有限公司 Real estate transaction data processing method, device, server and storage medium
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN111291394A (en) * 2020-01-31 2020-06-16 腾讯科技(深圳)有限公司 False information management method, false information management device and storage medium

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763604A (en) * 2010-03-23 2010-06-30 王慧文 Credit data management method and service platform system
CN105684028A (en) * 2016-01-26 2016-06-15 盛玉伟 Housing website information publishing method and system
CN107220911A (en) * 2017-05-10 2017-09-29 深圳市易图资讯股份有限公司 A kind of real estate market and information of real estate management system
CN107292718A (en) * 2017-06-21 2017-10-24 李志敏 Houseclearing management method and server
CN107426324A (en) * 2017-08-02 2017-12-01 余秀英 A kind of housing tripartite's communication system based on geographical position
CN107563910A (en) * 2017-07-21 2018-01-09 广东工业大学 A kind of second-hand house method of commerce based on block chain technology
CN107689019A (en) * 2017-08-22 2018-02-13 福建省中电网络科技有限公司 A kind of source of houses checking method and system
CN108090659A (en) * 2017-12-06 2018-05-29 成都初唐网络科技股份有限公司 Source of houses distribution method and device

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101763604A (en) * 2010-03-23 2010-06-30 王慧文 Credit data management method and service platform system
CN105684028A (en) * 2016-01-26 2016-06-15 盛玉伟 Housing website information publishing method and system
CN107220911A (en) * 2017-05-10 2017-09-29 深圳市易图资讯股份有限公司 A kind of real estate market and information of real estate management system
CN107292718A (en) * 2017-06-21 2017-10-24 李志敏 Houseclearing management method and server
CN107563910A (en) * 2017-07-21 2018-01-09 广东工业大学 A kind of second-hand house method of commerce based on block chain technology
CN107426324A (en) * 2017-08-02 2017-12-01 余秀英 A kind of housing tripartite's communication system based on geographical position
CN107689019A (en) * 2017-08-22 2018-02-13 福建省中电网络科技有限公司 A kind of source of houses checking method and system
CN108090659A (en) * 2017-12-06 2018-05-29 成都初唐网络科技股份有限公司 Source of houses distribution method and device

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109767188A (en) * 2018-12-29 2019-05-17 百度在线网络技术(北京)有限公司 Employee inspiration method, apparatus, equipment and storage medium based on block chain
CN109584096A (en) * 2019-01-30 2019-04-05 翟红鹰 Master and apprentice's social contact method, terminal device and storage medium based on block chain
CN109951489A (en) * 2019-03-27 2019-06-28 深圳市网心科技有限公司 A kind of digital identification authentication method, unit, system and storage medium
CN110598434A (en) * 2019-09-12 2019-12-20 腾讯科技(深圳)有限公司 House information processing method and device based on block chain network, electronic equipment and storage medium
CN110598434B (en) * 2019-09-12 2023-08-15 腾讯科技(深圳)有限公司 House information processing method and device based on blockchain network, electronic equipment and storage medium
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN110889264B (en) * 2019-11-11 2021-06-22 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN110838067A (en) * 2019-11-14 2020-02-25 腾讯科技(深圳)有限公司 Real estate transaction data processing method, device, server and storage medium
CN110838067B (en) * 2019-11-14 2024-04-09 腾讯科技(深圳)有限公司 Real estate transaction data processing method, device, server and storage medium
CN111291394A (en) * 2020-01-31 2020-06-16 腾讯科技(深圳)有限公司 False information management method, false information management device and storage medium

Similar Documents

Publication Publication Date Title
CN109102358A (en) A kind of Information Authentication method, server and storage medium
EP3989155A1 (en) Asset trading system enabling transparent trading history management
TW202008290A (en) Blockchain-based service rental methods and devices
US9406067B1 (en) System and method for verifying identity
WO2020082868A1 (en) Block chain-based claim settlement method and apparatus
CN109509518A (en) Management method, server and the computer storage medium of electronic health record
CN109543447A (en) Information processing method, server and computer storage medium based on block chain
US20140279611A1 (en) High assurance federated attribute management
CN108985916A (en) A kind of digital asset management method and server
CN108416670A (en) Credit matches folk prescription method and server
CN111369730B (en) Voting processing method and device based on block chain
CA2752089A1 (en) System and method for authenticating a user of multiple computer applications, networks or devices using a wireless device
CN109325848A (en) Debt collection method, equipment and computer readable storage medium based on block chain
CN108830463B (en) Evaluation record storage method, device, storage medium and system
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN108764723B (en) Evaluation qualification filtering method, device, terminal equipment and system
CN109859040A (en) A kind of method and device carrying out house prosperity transaction based on block chain
CN109377395A (en) Mutual insurance is insured Claims Resolution method and relevant apparatus
CN108932678A (en) Correlating method, device and the storage medium of house property information
US9197648B2 (en) System and method for verifying the identity of an internet user
CN109327312A (en) Authentication method and device, electronic equipment
TW201901579A (en) Data acquisition method and device and electronic device for risk evaluation
US20210174373A1 (en) Ticket validity confirmation device, method, and program
CN110602097A (en) Block chain-based task processing method, device, equipment and storage medium
TWI625703B (en) Online voting and ballot counting system based on blockchain and method thereof

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20181228

RJ01 Rejection of invention patent application after publication