CN109120609B - Social information reporting method and device based on block chain - Google Patents

Social information reporting method and device based on block chain Download PDF

Info

Publication number
CN109120609B
CN109120609B CN201810869164.6A CN201810869164A CN109120609B CN 109120609 B CN109120609 B CN 109120609B CN 201810869164 A CN201810869164 A CN 201810869164A CN 109120609 B CN109120609 B CN 109120609B
Authority
CN
China
Prior art keywords
network
network node
identity
information
social
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810869164.6A
Other languages
Chinese (zh)
Other versions
CN109120609A (en
Inventor
环瑛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Chuangye Tianxia Network Technology Co.,Ltd.
Original Assignee
Xi'an Chuangye Tianxia Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Chuangye Tianxia Network Technology Co ltd filed Critical Xi'an Chuangye Tianxia Network Technology Co ltd
Priority to CN201810869164.6A priority Critical patent/CN109120609B/en
Publication of CN109120609A publication Critical patent/CN109120609A/en
Application granted granted Critical
Publication of CN109120609B publication Critical patent/CN109120609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Landscapes

  • Engineering & Computer Science (AREA)
  • Computing Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • General Engineering & Computer Science (AREA)
  • Primary Health Care (AREA)
  • Strategic Management (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Mobile Radio Communication Systems (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The invention provides a social information reporting method and device based on a block chain, wherein the method comprises the following steps: when the reporting information from any first network node is received, other online network nodes in the social network verify and identify the first network node identity, and the reporting information comprises the reported second network node identity; when the first network node identity identification passes verification and identification, broadcasting a second network node identity identification in the social network in a whole network; and when the first network node identity identification is not verified and identified, recording the first network node identity identification as a false network identity identification, and storing the false network identity identification to an adjacent network node. Through the technical scheme of the invention, false and suspect network identity identification can be identified, reported and frozen, thereby being beneficial to preventing lawless persons from accessing certain resources and illegally acquiring use permission, carrying out acts of fraud or illegal transactions and further improving the safety and reliability of the social network.

Description

Social information reporting method and device based on block chain
Technical Field
The invention relates to the technical field of block chains, in particular to a social information reporting method and a social information reporting device based on a block chain.
Background
The block chain technology is used as a decentralized core security technology, has wide application prospect in the field of social contact, a novel social contact platform Ethern block chain based on the block chain is used as a bottom platform, and is combined with the existing block chain identity authentication system to replace centralization in a point-to-point mode, and the server-free decentralized application is built by fully utilizing the characteristics of consensus, expandability, standardization, complete characteristics, easiness in development and collaboration.
In the related technology, the block chain identity authentication technology mainly comprises the following steps of applying for a network identity identification and encrypting according to user registration information, logging in by a user name according to the fact that the registration information stored in a block chain cannot be changed, judging whether the login user is a login user according to whether the login user grasps encrypted registration information (such as a private key of a digital signature, an authentication factor or association between the user name and an address), and achieving user authentication without inputting a password. According to the network identity information stored in the block chain nodes, when a user logs in a website by the network identity, the verification of the network identity of the block chain can be realized, but the great potential safety hazard still exists, namely besides a real-name authentication user, a false user steals personal information of a real user by various methods, the identity information identical to that of the real user is forged, the identity of a legal user is counterfeited, the access and illegal acquisition of the use authority of certain resources are realized, even the behavior of fraud or illegal transaction is carried out, the great potential safety hazard is brought to the development of the block chain and the stability of a social system, and the great hazard is caused to the legal interest of registered users.
Disclosure of Invention
The invention aims to provide a complete and reliable social information reporting method and a social information reporting device based on a block chain, which have strong safety.
In order to achieve the above object, a technical solution of the present invention provides a social information reporting method based on a block chain, which is used in a social network formed by a plurality of peer network nodes, and includes: when the reporting information from any first network node is received, other online network nodes in the social network verify and identify the first network node identity, and the reporting information comprises the reported second network node identity; when the first network node identity identification passes verification and identification, broadcasting a second network node identity identification in the social network in a whole network; and when the first network node identity identification is not verified and identified, recording the first network node identity identification as a false network identity identification, and storing the false network identity identification to an adjacent network node.
In the scheme, when the report information from any first network node is received, other online network nodes in the social network verify and recognize the first network node identity, the report information comprises the reported second network node identity, and the false report phenomenon is favorably reduced The identification, the report and the freezing of the identity mark of the suspected network are beneficial to improving the safety and the reliability of the social network.
It should be noted that any report information is written into one block, and the next block copies and backs up the previous block, and the whole block chain report record table is formed in cycles, and is continuously updated, has irrevocable and persistent properties, and can represent the trustworthiness level of the user.
Preferably, the method further comprises the following steps: when the second network node identity is broadcasted in the social network in the whole network, the other network nodes verify and identify the second network node identity; when the second network node identity identification is not verified and identified, feeding back problem reporting information to the first network node; and determining the processing operation of the second network node identity identification according to the quantity of the feedback problem reporting information received by the first network node.
In the scheme, when the second network node identity is broadcast in the social network in a whole network, other network nodes verify and identify the second network node identity, so that whether the second network node identity is a suspected network identity and the suspected degree are favorably discriminated, a corresponding processing strategy is favorably made, the accuracy is improved, the suspicion degree of the second network node identity is identified by feeding back problem report information to the first network node when the second network node identity is not verified and identified, and the processing operation of the second network node identity is determined according to the number of the feedback problem report information received by the first network node, so that the suspicion degree of the second network node identity is identified, the corresponding processing is made according to the serious degree of the plot, and the phenomenon that the suspected network identity is frozen due to errors is reduced, the rationality and the realizability of the identity identification processing of the suspected network are improved.
Preferably, the determining, according to the amount of the feedback problem report information received by the first network node, a processing operation on the identity of the second network node includes: when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and smaller than a second preset threshold, determining that the second network node identity is a suspected network identity, and storing the suspected network identity to an adjacent network node; when the suspected network identity identifier logs in again and passes verification and identification, the reported prompt information is sent; and when the number of the feedback problem report information received by the first network node is larger than or equal to a second preset threshold value, determining to freeze the identity of the second network node, broadcasting the identity of the second network node in the social network in a whole network manner, and updating the related data information of other network nodes.
In the scheme, when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and less than a second preset threshold, the identity of the second network node is determined to be a suspected network identity, the suspected network identity is stored to an adjacent network node, and when the suspected network identity logs in again and passes verification and identification, the reported prompt information is sent, so that an actual user of the network identity can know the reported condition in time, whether phenomena such as embezzlement exist or not are determined, corresponding treatment is carried out, when the number of the feedback problem reporting information received by the first network node is greater than or equal to the second preset threshold, the identity of the second network node is determined to be frozen, the identity of the second network node is broadcasted in a social network in a whole network, relevant data information of other network nodes is updated, and freezing of the identity of the network node with high suspicion degree is realized, the method is favorable for reducing the possibility that the suspected network identity mark continuously logs in other network nodes, thereby preventing lawbreakers from accessing certain resources and illegally acquiring the use permission by using the suspected network identity mark and carrying out acts of fraud or illegal transactions.
It should be noted that the first preset threshold and the second preset threshold are determined according to a percentage of the number of network nodes accessed, for example, the first preset threshold is twenty percent of the number of network nodes accessed, and the second preset threshold is fifty percent of the number of network nodes accessed.
Preferably, the method further comprises the following steps: when the first network node identity identification is not verified and identified, reducing the preset reporting limit times of the first network node identity identification in a preset time period; and when the preset reporting limit times are less than or equal to zero, determining to freeze the first network node identity, broadcasting the first network node identity in the social network in the whole network, and updating the related data information of other network nodes.
According to the scheme, when the first network node identity identification is not verified and identified, the preset reporting limit times of the first network node identity identification in the preset time period are reduced, when the preset reporting limit times are smaller than or equal to zero, the first network node identity identification is determined to be frozen, the first network node identity identification is broadcasted in the social network in the whole network, relevant data information of other network nodes is updated, the occurrence of malicious reporting is reduced, the first network node identity identification is broadcasted in the whole network, a user can know the credit condition of the network identity identification, the alarming heart is improved, and the safety and the reliability of the social network are improved.
Preferably, the method further comprises the following steps: receiving registration information of a first network node to a social network, and auditing the registration information by other network nodes; and when the verification is passed, encrypting and storing the registration information to any network node of the social network so as to carry out identity verification and identification according to the registration information.
In the scheme, the registration information of the first network node to the social network is received, other network nodes check the registration information, the registration information is the real identity information of the user, and is stored on the network nodes in an encrypted form (blind signature strategy, multiple signature strategy and threshold signature strategy), the network nodes are interconnected in real time, when the user joins the social network, according to the encrypted information during registration, the user is identified by authentication, and when the user performs transaction interaction in the social network by using the registered network identity, the stored identity information of the mobile terminal is required to reach the credible standard, the identity authentication and identification are carried out again, the interactive information is encrypted, and the encrypted information can also be subjected to authentication identification when being reported or being reported, so that the authentication identification of the user is realized, and the safety and reliability of the social network are further improved.
The technical scheme of the invention also provides a social information reporting device based on the block chain, which is used in a social network formed by a plurality of peer-to-peer network nodes and comprises the following steps: the verification and identification unit is used for verifying and identifying the first network node identity identification by other online network nodes in the social network when the reporting information from any first network node is received, wherein the reporting information comprises the reported second network node identity identification; the whole network broadcasting unit is used for broadcasting the identity identification of the second network node in the social network in a whole network mode when the identity identification of the first network node passes verification and identification; and the recording unit is used for recording the first network node identity as a false network identity when the first network node identity is not verified and identified, and storing the false network identity to the adjacent network node.
In the scheme, when the report information from any first network node is received, other online network nodes in the social network verify and recognize the first network node identity, the report information comprises the reported second network node identity, and the false report phenomenon is favorably reduced The identification, the report and the freezing of the identity mark of the suspected network are beneficial to improving the safety and the reliability of the social network.
It should be noted that any report information is written into one block, and the next block copies and backs up the previous block, and the whole block chain report record table is formed in cycles, and is continuously updated, has irrevocable and persistent properties, and can represent the trustworthiness level of the user.
Preferably, the method further comprises the following steps: the verification identification unit is further configured to: when the second network node identity is broadcasted in the social network in the whole network, the other network nodes verify and identify the second network node identity; the social information reporting device based on the block chain further comprises: the feedback unit is used for feeding back the problem reporting information to the first network node when the second network node identity identification fails to pass the verification and identification; and the determining unit is used for determining the processing operation of the second network node identity identification according to the quantity of the feedback problem reporting information received by the first network node.
In the scheme, when the second network node identity is broadcast in the social network in a whole network, other network nodes verify and identify the second network node identity, so that whether the second network node identity is a suspected network identity and the suspected degree are favorably discriminated, a corresponding processing strategy is favorably made, the accuracy is improved, the suspicion degree of the second network node identity is identified by feeding back problem report information to the first network node when the second network node identity is not verified and identified, and the processing operation of the second network node identity is determined according to the number of the feedback problem report information received by the first network node, so that the suspicion degree of the second network node identity is identified, the corresponding processing is made according to the serious degree of the plot, and the phenomenon that the suspected network identity is frozen due to errors is reduced, the rationality and the realizability of the identity identification processing of the suspected network are improved.
Preferably, the determining unit is further configured to: when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and smaller than a second preset threshold, determining that the second network node identity is a suspected network identity, and storing the suspected network identity to an adjacent network node; the social information reporting device based on the block chain further comprises: the sending unit is used for sending the reported prompt information when the suspected network identity identifier logs in again and passes the verification and identification; the determination unit is further configured to: and when the number of the feedback problem report information received by the first network node is larger than or equal to a second preset threshold value, determining to freeze the identity of the second network node, broadcasting the identity of the second network node in the social network in a whole network manner, and updating the related data information of other network nodes.
In the scheme, when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and less than a second preset threshold, the identity of the second network node is determined to be a suspected network identity, the suspected network identity is stored to an adjacent network node, and when the suspected network identity logs in again and passes verification and identification, the reported prompt information is sent, so that an actual user of the network identity can know the reported condition in time, whether phenomena such as embezzlement exist or not are determined, corresponding treatment is carried out, when the number of the feedback problem reporting information received by the first network node is greater than or equal to the second preset threshold, the identity of the second network node is determined to be frozen, the identity of the second network node is broadcasted in a social network in a whole network, relevant data information of other network nodes is updated, and freezing of the identity of the network node with high suspicion degree is realized, the method is favorable for reducing the possibility that the suspected network identity mark continuously logs in other network nodes, thereby preventing lawbreakers from accessing certain resources and illegally acquiring the use permission by using the suspected network identity mark and carrying out acts of fraud or illegal transactions.
It should be noted that the first preset threshold and the second preset threshold are determined according to a percentage of the number of network nodes accessed, for example, the first preset threshold is twenty percent of the number of network nodes accessed, and the second preset threshold is fifty percent of the number of network nodes accessed.
Preferably, the method further comprises the following steps: the reduction unit is used for reducing the preset reporting limit times of the first network node identity identifier in a preset time period when the first network node identity identifier is not verified and identified; the determination unit is further configured to: and when the preset reporting limit times are less than or equal to zero, determining to freeze the first network node identity, broadcasting the first network node identity in the social network in the whole network, and updating the related data information of other network nodes.
According to the scheme, when the first network node identity identification is not verified and identified, the preset reporting limit times of the first network node identity identification in the preset time period are reduced, when the preset reporting limit times are smaller than or equal to zero, the first network node identity identification is determined to be frozen, the first network node identity identification is broadcasted in the social network in the whole network, relevant data information of other network nodes is updated, the occurrence of malicious reporting is reduced, the first network node identity identification is broadcasted in the whole network, a user can know the credit condition of the network identity identification, the alarming heart is improved, and the safety and the reliability of the social network are improved.
Preferably, the method further comprises the following steps: the receiving unit is used for receiving registration information of the first network node to the social network, and other network nodes check the registration information; and the storage unit is used for encrypting and storing the registration information to any network node of the social network when the verification is passed so as to carry out identity authentication and identification according to the registration information.
In the scheme, the registration information of the first network node to the social network is received, other network nodes check the registration information, the registration information is the real identity information of the user, and is stored on the network nodes in an encrypted form (blind signature strategy, multiple signature strategy and threshold signature strategy), the network nodes are interconnected in real time, when the user joins the social network, according to the encrypted information during registration, the user is identified by authentication, and when the user performs transaction interaction in the social network by using the registered network identity, the stored identity information of the mobile terminal is required to reach the credible standard, the identity authentication and identification are carried out again, the interactive information is encrypted, and the encrypted information can also be subjected to authentication identification when being reported or being reported, so that the authentication identification of the user is realized, and the safety and reliability of the social network are further improved.
Through the technical scheme, based on the block chain technology, when the reporting information is received, the reported network identity and the reported network identity are verified and identified, so that the false and suspected network identity can be identified, reported and frozen, the false user can be prevented from embezzling the personal information of the real user, the identity information the same as the real user is imitated, the identity of a legal user is imitated, lawful persons can be prevented from accessing and illegally acquiring the use authority of a certain resource by utilizing the false and suspected network identities, fraud or illegal transaction behaviors are carried out, and the safety and reliability of the social network are further improved.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The above and/or additional aspects and advantages of the present invention will become apparent and readily appreciated from the following description of the embodiments, taken in conjunction with the accompanying drawings of which:
FIG. 1 is a schematic flow diagram of a block chain-based social information reporting method in an embodiment;
FIG. 2 is a schematic block diagram of a social information reporting device based on a block chain in one embodiment;
FIG. 3 is a schematic flow diagram of a method for social information reporting based on a blockchain in one embodiment;
fig. 4 is a schematic flow chart of the taifang block validation algorithm.
Detailed Description
In order that the above objects, features and advantages of the present invention can be more clearly understood, a more particular description of the invention will be rendered by reference to the appended drawings. It should be noted that the embodiments and features of the embodiments of the present application may be combined with each other without conflict.
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present invention, however, the present invention may be practiced in other ways than those specifically described herein, and therefore the scope of the present invention is not limited by the specific embodiments disclosed below.
As shown in fig. 1, the social information reporting method based on a block chain in this embodiment includes the following steps:
s102, when the reporting information from any first network node is received, other online network nodes in the social network verify and identify the first network node identity, and the reporting information comprises the reported second network node identity;
s104, when the first network node identity passes verification and identification, broadcasting a second network node identity in the social network in a whole network;
and S106, when the first network node identity identification is not verified and identified, recording that the first network node identity identification is a false network identity identification, and storing the false network identity identification to an adjacent network node.
In this embodiment, when the report information from any first network node is received, the other network nodes on line in the social network verify and identify the first network node identities, the report information includes the reported second network node identities, which is beneficial to reducing the occurrence of false report phenomena, when the first network node identities pass the verification and identification, the second network node identities are broadcast in the social network all over the network, on one hand, the second network node identities are beneficial to being identified all over the network, when the first network node identities do not pass the verification and identification, the first network node identities are recorded as false network identities and stored to the adjacent network nodes, the false network identities are beneficial to being identified all over the network, the occurrence of malicious report phenomena is reduced, and the false report phenomena are beneficial to being realized, The identification, the report and the freezing of the identity mark of the suspected network are beneficial to improving the safety and the reliability of the social network.
It should be noted that any report information is written into one block, and the next block copies and backs up the previous block, and the whole block chain report record table is formed in cycles, and is continuously updated, has irrevocable and persistent properties, and can represent the trustworthiness level of the user.
As shown in fig. 2, the social information reporting apparatus 200 based on a block chain in this embodiment includes: the verification and identification unit 202 is configured to, when receiving the reporting information from any first network node, perform verification and identification on the first network node identity by other online network nodes in the social network, where the reporting information includes a reported second network node identity; the whole network broadcasting unit 204 is used for broadcasting the second network node identity in the social network in a whole network mode when the first network node identity passes verification and identification; the recording unit 206 is configured to record the first network node identifier as a false network identifier and store the false network identifier to an adjacent network node when the first network node identifier fails to be verified and identified.
In this embodiment, when the report information from any first network node is received, the other network nodes on line in the social network verify and identify the first network node identities, the report information includes the reported second network node identities, which is beneficial to reducing the occurrence of false report phenomena, when the first network node identities pass the verification and identification, the second network node identities are broadcast in the social network all over the network, on one hand, the second network node identities are beneficial to being identified all over the network, when the first network node identities do not pass the verification and identification, the first network node identities are recorded as false network identities and stored to the adjacent network nodes, the false network identities are beneficial to being identified all over the network, the occurrence of malicious report phenomena is reduced, and the false report phenomena are beneficial to being realized, The identification, the report and the freezing of the identity mark of the suspected network are beneficial to improving the safety and the reliability of the social network.
It should be noted that any report information is written into one block, and the next block copies and backs up the previous block, and the whole block chain report record table is formed in cycles, and is continuously updated, has irrevocable and persistent properties, and can represent the trustworthiness level of the user.
Preferably, the method further comprises the following steps: the verification identification unit 202 is further configured to: when the second network node identity is broadcasted in the social network in the whole network, the other network nodes verify and identify the second network node identity; the social information reporting apparatus 200 based on the block chain further includes: the feedback unit 208 is configured to feed back the problem report information to the first network node when the identity of the second network node fails to be verified and identified; the determining unit 210 is configured to determine, according to the amount of the feedback problem report information received by the first network node, a processing operation on the identity of the second network node.
In the embodiment, when the second network node identity is broadcast in the social network, other network nodes verify and identify the second network node identity, which is beneficial to discriminating whether the second network node identity is a suspected network identity and the suspected degree, so as to be beneficial to making a corresponding processing strategy and improve the accuracy, when the second network node identity is not verified and identified, the problem reporting information is fed back to the first network node, and the processing operation of the second network node identity is determined according to the number of the feedback problem reporting information received by the first network node, so that the suspicion degree of the second network node identity is identified, the corresponding processing is made according to the serious degree of the plot, and the phenomenon that the suspected network identity is frozen due to errors is reduced, the rationality and the realizability of the identity identification processing of the suspected network are improved.
Preferentially, the determining unit 210 is further configured to: when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and smaller than a second preset threshold, determining that the second network node identity is a suspected network identity, and storing the suspected network identity to an adjacent network node; the social information reporting apparatus 200 based on the block chain further includes: a sending unit 212, configured to send the reported prompt information when the suspected network identity logs in again and passes the verification identification; the determination unit 210 is further configured to: and when the number of the feedback problem report information received by the first network node is larger than or equal to a second preset threshold value, determining to freeze the identity of the second network node, broadcasting the identity of the second network node in the social network in a whole network manner, and updating the related data information of other network nodes.
In the embodiment, when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and less than a second preset threshold, the identity of the second network node is determined to be a suspected network identity, the suspected network identity is stored in an adjacent network node, and when the suspected network identity logs in again and passes verification and identification, the reported prompt information is sent, so that an actual user of the network identity can know the reported condition in time, whether phenomena such as embezzlement exist or not are determined, corresponding processing is carried out, when the number of the feedback problem reporting information received by the first network node is greater than or equal to the second preset threshold, the identity of the second network node is determined to be frozen, the identity of the second network node is broadcasted in a social network in a whole network, relevant data information of other network nodes is updated, and freezing of the identity of the network node with high suspicion is realized, the method is favorable for reducing the possibility that the suspected network identity mark continuously logs in other network nodes, thereby preventing lawbreakers from accessing certain resources and illegally acquiring the use permission by using the suspected network identity mark and carrying out acts of fraud or illegal transactions.
It should be noted that the first preset threshold and the second preset threshold are determined according to a percentage of the number of network nodes accessed, for example, the first preset threshold is twenty percent of the number of network nodes accessed, and the second preset threshold is fifty percent of the number of network nodes accessed.
Preferably, the method further comprises the following steps: a reducing unit 214, configured to reduce the preset reporting limit times of the first network node identity identifier within a preset time period when the first network node identity identifier fails to be verified and identified; the determination unit 210 is further configured to: and when the preset reporting limit times are less than or equal to zero, determining to freeze the first network node identity, broadcasting the first network node identity in the social network in the whole network, and updating the related data information of other network nodes.
In this embodiment, when the first network node identity is not verified and identified, the preset reporting limit times of the first network node identity within a preset time period is reduced, and when the preset reporting limit times is less than or equal to zero, it is determined that the first network node identity is frozen, the first network node identity is broadcasted in the social network in a whole network, relevant data information of other network nodes is updated, occurrence of a malicious reporting phenomenon is reduced, and the first network node identity is broadcasted in the whole network, which is beneficial for a user to know the credit condition of the network identity, and improves the alert center, and is beneficial for improving the safety and reliability of the social network.
Preferably, the method further comprises the following steps: a receiving unit 216, configured to receive registration information of a first network node to a social network, where other network nodes check the registration information; and the storage unit 218 is used for encrypting and storing the registration information to any network node of the social network when the audit is passed, so as to perform authentication identification according to the registration information.
In this embodiment, registration information of the first network node with the social network is received, and other network nodes audit the registration information, the registration information is the real identity information of the user, and is stored on the network nodes in an encrypted form (blind signature strategy, multiple signature strategy and threshold signature strategy), the network nodes are interconnected in real time, when the user joins the social network, according to the encrypted information during registration, the user is identified by authentication, and when the user performs transaction interaction in the social network by using the registered network identity, the stored identity information of the mobile terminal is required to reach the credible standard, the identity authentication and identification are carried out again, the interactive information is encrypted, and the encrypted information can also be subjected to authentication identification when being reported or being reported, so that the authentication identification of the user is realized, and the safety and reliability of the social network are further improved.
As shown in fig. 3, the social information reporting method based on a block chain in this embodiment includes:
s202, receiving registration information of a first network node to a social network, and auditing the registration information by other network nodes;
s204, when the verification is passed, encrypting and storing the registration information to any network node of the social network so as to carry out identity authentication and identification according to the registration information;
specifically, the social network Etherhouse blockchain is the underlying platform. The method is characterized in that a user is allowed to operate a node on own equipment to access a network, the node is interconnected with the node, user information is stored in the network node in an encrypted form to form a distributed cloud, and effective data of the node can be obtained only by mastering keys (a blind signature strategy, a multiple signature strategy and a threshold signature strategy) according to a block chain technology. The method comprises the steps that a user applies for a network identity from a social network identity issuing mechanism by using real identity information, the issuing mechanism carries out identity identification according to an issuing network, the network identity is a string of random numerical values, the issued network identity can be recorded, an Etheng platform user can establish a final abstract basic layer, a block chain with a built-in complete graphic programming language can be established, any person can establish contracts and decentralized applications, freely-defined ownership rules, transaction modes and state conversion functions are set in the contracts, and when the user registers the network identity with the real identity, triple state conversion functions can be randomly set according to user registration information and stored on a network node.
It should be noted that, based on the triple state transition function of the ethernet, it is specifically checked whether the format of the id to be recognized is correct (i.e., has a correct value), whether the signature is valid, whether the sending address is correct, and whether the random number matches the random number of the sender account. If not, an error is returned.
When a user operates a network node and joins a social network, primary identity recognition is carried out on the user according to encrypted information and a state conversion function during registration of the user, the primary identity recognition comprises the steps of verifying the registration information and whether the private key of the hash function is mastered by the user, when the user uses a registered network identity to carry out transaction interaction in the social network, the stored identity information of the user is required to reach a credible standard, carrying out secondary identity recognition on the identity of the user and encrypting the interactive information, and at the moment, the user is verified whether the private key of a double state conversion function is mastered by the user.
S206, when the reporting information from any first network node is received, other online network nodes in the social network verify and identify the first network node identity, and the reporting information comprises the reported second network node identity;
specifically, when there is a network identity report, that is, when the identity of a certain network node indicates that the identity of another network node is suspect, the other network nodes (generally, the closest network node) on line in the social network perform third identity recognition on the network identity of the reported network node, and the user needs to master the third triple private key, so that the false account or illegal report can be effectively prevented.
If the verification identification is passed in S206, executing S208, and when the first network node identity identification passes the verification identification, broadcasting a second network node identity identification in the social network all over the network;
s210, when the second network node identity is broadcasted in the social network in the whole network, other network nodes verify and identify the second network node identity;
s212, when the second network node identity identification is not verified and identified, feeding back problem reporting information to the first network node;
specifically, the social network adopting the social information reporting method of the invention expands the identity verification identification thereof, so that the intelligent contract is realized to a certain extent, the user can perform normal social activities only by collecting three keys, and the effectiveness of social reporting is improved in the application of the social network by multiple signatures.
S214, judging whether the number of the feedback report information received by the first network node is greater than a second preset threshold value;
if the judgment of the step S214 is yes, the step S216 is executed, the second network node identity is determined to be frozen, the second network node identity is broadcasted in the social network all over the network, and the related data information of other network nodes is updated;
if the determination in S214 is no, then S218 is performed, and it is determined whether the number of the feedback problem report information received by the first network node is greater than or equal to a first preset threshold;
if the determination in S218 is yes, then S220 is executed, and the identity of the second network node is determined to be a suspected network identity, and is stored in an adjacent network node;
s222, when the suspected network identity is logged in again and passes the verification and identification, the reported prompt information is sent;
if the verification identification in the step S206 is not passed, executing step S224, when the first network node identity identification fails, recording that the first network node identity identification is a false network identity identification, storing the false network identity identification to an adjacent network node, and reducing the preset reporting limit times of the first network node identity identification within a preset time period;
s226, judging whether the preset reporting limit times are less than or equal to zero;
if the determination at S226 is yes, S228 is performed to determine to freeze the first network node identifier, and broadcast the first network node identifier all over the network in the social network, and update the related data information of other network nodes.
It should be noted that each report generates a block, each block containing a timestamp, a random number, a reference to the previous block (i.e., hash), and all the report lists that occurred since the previous block was generated, thus creating a continuously growing chain of report list blocks over time that are continuously updated and can represent the trustworthiness rating of the user, thus forming a valid chain of report etherhouse blocks. Effective processing of the report information is realized by using an ether house block validation algorithm, as shown in fig. 4, specifically, whether a last block referenced by a block exists and is effective is checked; checking whether the time stamp of the block is larger than the last block referenced and is less than 15 minutes; checking whether the block sequence number, a random number, a reference (i.e., hash) to the previous block, all report lists occurring since the previous block was generated, and a preset report limit number are valid; checking whether the workload of the block proves to be effective or not, if the workload of the reserved block is exceeded, more strict limitation is needed to the reporting condition, and S0 is assigned to be the STATE of the last block; tx is assigned as a reporting list of blocks, with a total of n reports. For i belonging to 0 … … n-1, a state transition S [ i +1] ═ APPLY (S [ i ], Tx [ i ]) is performed. If any one conversion has an error, or the program spends more than a limit to execute, returning an error; assigning S _ FINAL with S [ n ], checking whether S _ FINAL is the same as STATE; if so, the block is valid. Otherwise, the block is invalid.
The effective processing of the report information is realized by utilizing an EtherFang block confirmation algorithm, the state is stored in a tree structure, and only a small part of the tree structure needs to be changed when each block is added. Thus, in general, most of the tree structure of two adjacent blocks should be the same, and therefore storing data once, can be referenced twice with a pointer (i.e., a sub-tree hash). This is achieved by a Tree structure called a Patricia Tree, which includes modifications to the concept of the mercker Tree, allowing not only the nodes to be changed, but also the nodes to be inserted and deleted. In addition, since all the state information is part of the last chunk, there is no need to store the entire chunk history, which is calculated to provide a 10-20 times savings in storage space.
The technical scheme of the invention is explained in detail by combining the drawings, and the invention provides a social information reporting method based on a block chain and a social information reporting device based on the block chain.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present invention, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the spirit of the invention, which falls within the scope of the invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (8)

1. A social information reporting method based on a block chain is used in a social network formed by a plurality of peer-to-peer network nodes, and is characterized by comprising the following steps:
when reporting information from any first network node is received, other online network nodes in the social network verify and identify the first network node identity, wherein the reporting information comprises a reported second network node identity;
when the first network node identity identification passes verification and identification, broadcasting the second network node identity identification in the social network all over the network;
when the first network node identity identification is not verified and identified, recording that the first network node identity identification is a false network identity identification, and storing the false network identity identification to an adjacent network node;
further comprising:
when the second network node identity is broadcasted in the social network in the whole network, the other network nodes verify and identify the second network node identity;
when the second network node identity identification is not verified and identified, feeding back problem reporting information to the first network node;
and determining the processing operation of the second network node identity identification according to the quantity of the feedback problem report information received by the first network node.
2. The social information reporting method based on the blockchain according to claim 1, wherein the determining, according to the number of the feedback problem reporting information received by the first network node, a processing operation for the second network node identifier specifically includes:
when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and smaller than a second preset threshold, determining that the second network node identity is a suspected network identity, and storing the suspected network identity to an adjacent network node;
when the suspected network identity identifier logs in again and passes verification and identification, the reported prompt information is sent;
and when the number of the feedback problem report information received by the first network node is greater than or equal to the second preset threshold value, determining to freeze the second network node identity, broadcasting the second network node identity in the social network in a whole network manner, and updating the related data information of other network nodes.
3. The block chain-based social information reporting method according to any one of claims 1 to 2, further comprising:
when the first network node identity identification is not verified and identified, reducing the preset reporting limit times of the first network node identity identification in a preset time period;
and when the preset reporting limit times are less than or equal to zero, determining to freeze the first network node identity, broadcasting the first network node identity in the social network in a whole network, and updating the related data information of other network nodes.
4. The block chain-based social information reporting method of claim 3, further comprising:
receiving registration information of the first network node to the social network, and auditing the registration information by the other network nodes;
and when the verification is passed, encrypting and storing the registration information to any network node of the social network so as to carry out identity authentication and identification according to the registration information.
5. A social information reporting device based on a block chain is used in a social network formed by a plurality of peer-to-peer network nodes, and is characterized by comprising:
the verification and identification unit is used for verifying and identifying the first network node identity by other online network nodes in the social network when the reporting information from any first network node is received, wherein the reporting information comprises the reported second network node identity;
the whole network broadcasting unit is used for broadcasting the second network node identity in the social network in a whole network mode when the first network node identity passes verification and identification;
the recording unit is used for recording the first network node identity as a false network identity when the first network node identity is not verified and identified and storing the false network identity to an adjacent network node;
the verification identification unit is further configured to: when the second network node identity is broadcasted in the social network in the whole network, the other network nodes verify and identify the second network node identity;
the social information reporting device based on the block chain further comprises:
the feedback unit is used for feeding back the problem report information to the first network node when the second network node identity identification is not verified and identified;
and the determining unit is used for determining the processing operation of the second network node identity identification according to the quantity of the feedback problem reporting information received by the first network node.
6. The block chain-based social information reporting device according to claim 5,
the determination unit is further configured to: when the number of the feedback problem reporting information received by the first network node is greater than or equal to a first preset threshold and smaller than a second preset threshold, determining that the second network node identity is a suspected network identity, and storing the suspected network identity to an adjacent network node;
the social information reporting device based on the block chain further comprises:
the sending unit is used for sending the reported prompt information when the suspected network identity identifier logs in again and passes verification and identification;
the determination unit is further configured to: and when the number of the feedback problem report information received by the first network node is greater than or equal to the second preset threshold value, determining to freeze the second network node identity, broadcasting the second network node identity in the social network in a whole network manner, and updating the related data information of other network nodes.
7. The block chain-based social information reporting device according to any one of claims 5 to 6, further comprising:
the reduction unit is used for reducing the preset reporting limit times of the first network node identity identifier in a preset time period when the first network node identity identifier is not verified and identified;
the determination unit is further configured to: and when the preset reporting limit times are less than or equal to zero, determining to freeze the first network node identity, broadcasting the first network node identity in the social network in a whole network, and updating the related data information of other network nodes.
8. The block chain-based social information reporting device according to claim 7, further comprising:
a receiving unit, configured to receive registration information of the first network node to the social network, where the other network nodes check the registration information;
and the storage unit is used for encrypting and storing the registration information to any network node of the social network when the audit is passed so as to carry out identity authentication and identification according to the registration information.
CN201810869164.6A 2018-08-02 2018-08-02 Social information reporting method and device based on block chain Active CN109120609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810869164.6A CN109120609B (en) 2018-08-02 2018-08-02 Social information reporting method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810869164.6A CN109120609B (en) 2018-08-02 2018-08-02 Social information reporting method and device based on block chain

Publications (2)

Publication Number Publication Date
CN109120609A CN109120609A (en) 2019-01-01
CN109120609B true CN109120609B (en) 2021-01-29

Family

ID=64851622

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810869164.6A Active CN109120609B (en) 2018-08-02 2018-08-02 Social information reporting method and device based on block chain

Country Status (1)

Country Link
CN (1) CN109120609B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111510415B (en) * 2019-01-31 2022-09-16 中国移动通信集团终端有限公司 Method, device, equipment and storage medium for sharing and identifying blacklist number
CN110188526B (en) * 2019-05-31 2023-06-30 创新先进技术有限公司 Method, device and system for processing appointment information based on blockchain and electronic equipment
CN110233850B (en) * 2019-06-20 2021-08-31 浪潮卓数大数据产业发展有限公司 Registration method, application server, user side and system based on alliance chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681301A (en) * 2016-01-16 2016-06-15 杭州复杂美科技有限公司 Settlement method on block chain
CN106327173A (en) * 2016-08-22 2017-01-11 布比(北京)网络技术有限公司 Network payment method and network payment device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103139155B (en) * 2011-11-28 2016-09-28 阿里巴巴集团控股有限公司 The processing method of report information, equipment and system
US9549024B2 (en) * 2012-12-07 2017-01-17 Remote Media, Llc Routing and synchronization system, method, and manager
CN105872003A (en) * 2015-12-21 2016-08-17 乐视云计算有限公司 Data processing method, device and system based on P2P (Peer-to-Peer) network
US10333713B2 (en) * 2016-10-11 2019-06-25 International Business Machines Corporation Validating internet of things device firmware using a peer-to-peer registry
CN107563905A (en) * 2017-07-20 2018-01-09 西安电子科技大学 A kind of academic platform service system and method for building up based on block chain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105681301A (en) * 2016-01-16 2016-06-15 杭州复杂美科技有限公司 Settlement method on block chain
CN106327173A (en) * 2016-08-22 2017-01-11 布比(北京)网络技术有限公司 Network payment method and network payment device

Also Published As

Publication number Publication date
CN109120609A (en) 2019-01-01

Similar Documents

Publication Publication Date Title
CN109766673B (en) Alliance type audio and video copyright block chain system and audio and video copyright chaining method
EP3451579B1 (en) Multiple-phase rewritable blockchain
CN109417479B (en) Cryptographic logic rewritable block chains
US11301361B2 (en) Sidechain testing system and method for improving security and stability of a smart contract by generating sidechains having mirror image accounts of part or all mainchain assets
CN106230851B (en) Data security method and system based on block chain
CN110008720B (en) Dynamic data tracing method and device for Internet of things based on alliance chain
CN108830602B (en) Permission chain construction and management and control method based on chameleon hash function
CN109120609B (en) Social information reporting method and device based on block chain
CN106548091A (en) A kind of data deposit card, the method and device of checking
CN111355786B (en) Internet of things equipment control method based on alliance block chain
CN114363352B (en) Cross-chain interaction method of Internet of things system based on block chain
CN108880820B (en) Code management method and device
CN103595696B (en) The method and device that a kind of File Ownership proves
CN109428892A (en) Multistage rewritable block chain
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN115987697B (en) Multi-level information data sharing method and system based on event subscription mechanism
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
CN114117264A (en) Illegal website identification method, device, equipment and storage medium based on block chain
CN109905388B (en) Domain name credit processing method and system based on block chain
CN112804207A (en) Alliance link node safety access method applied to electronic government scene
CN115640581A (en) Data security risk assessment method, device, medium and electronic equipment
CN113824738A (en) Method and system for node communication management in block chain
CN112016119A (en) Autonomous identity management method based on block chain
CN115277252B (en) Data authorization method based on multi-signature mechanism
CN114650145B (en) Method and device for generating blocks in block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210114

Address after: Room 2201220222032216, block D, Changhe international, No. 180, Fengcheng 8th Road, Xi'an Economic and Technological Development Zone, Shaanxi 710000

Applicant after: Xi'an Chuangye Tianxia Network Technology Co.,Ltd.

Address before: Room 14, room 210, Business Incubator Co., Ltd., building 1, chuangyue times cultural and creative park, 61 Xianan Road, Guicheng Street, Nanhai District, Foshan City, Guangdong Province, 528200

Applicant before: FOSHAN XINDA ZHIHUI TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant