CN109302281A - Realize the method and system of social networks - Google Patents

Realize the method and system of social networks Download PDF

Info

Publication number
CN109302281A
CN109302281A CN201811307529.2A CN201811307529A CN109302281A CN 109302281 A CN109302281 A CN 109302281A CN 201811307529 A CN201811307529 A CN 201811307529A CN 109302281 A CN109302281 A CN 109302281A
Authority
CN
China
Prior art keywords
message
node
public key
encryption
encryption message
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811307529.2A
Other languages
Chinese (zh)
Other versions
CN109302281B (en
Inventor
陈德辉
宋传尚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811307529.2A priority Critical patent/CN109302281B/en
Publication of CN109302281A publication Critical patent/CN109302281A/en
Application granted granted Critical
Publication of CN109302281B publication Critical patent/CN109302281B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

Provide a kind of method and system for realizing social networks.The method can include: the private key based on the first node generates the signature of the first node;Public key based on the second node encrypts first message to obtain the first encryption message;Broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the public key of the first node and the signature of the first node, and the destination mark of the first encryption message is the public key of the second node.According to the method for the present invention and system, information transmission security can be improved and reduce privacy leakage.

Description

Realize the method and system of social networks
Technical field
All things considered of the present invention is related to social networks technology, more particularly, is related to a kind of method for realizing social networks And system.
Background technique
The high speed development of internet and various internet the relevant technologies, brings convenience to people's lives, and still, also produces Give birth to following new problem:
1, privacy leakage problem.Personal information security is paid close attention to by the whole world.Social software is while offering convenience Also the hidden danger of privacy leakage is brought.In order to avoid privacy leakage, some people is even abandoned using social software.
2, information authenticity and integrity problem.The development of internet improves the spread speed of information, while also making not Meet actual information, fuzzy message, even flame largely to be transmitted, seriously affects normal life.People are by a The human-subject test of people screens information, and judgement is limited, so that the space that spoofing has existence and grows.In addition, false Range is wider, life cycle is longer for message spreading in internet.
3, information problem at random.Social networks is the important channel for obtaining daily information.However, in existing social networks The information spread is not classified effectively, and the acquisition modes of information have contingency and limitation, and the information needed cannot be timely Effectively obtain.
4, the unsound problem of credit rating system.Sincerity is the important foundation of exchange, and existing social networks has not been set up The information evaluation mechanism of effect.
5, the unsound problem of personal information management mechanism.Individual is needing and mechanism (bank, post office, government department, business Mechanism etc.) when establishing connection, the means usually using the personal information such as name, address, phone, mailbox as identification individual.By Know in the easy third party by other than mechanism and individual of personal closely related information, and different institutions are identifying The means difference that uses when personal is to be managed collectively personal information, therefore, lead to leakage of personal information, organization management at The problems such as this is high.
6, with the cumbersome problem of mechanism interactive operation.When individual interacts with different institutions, need to be submitted repeatedly including individual The list of information.Not only bank queuing phenomenon is obvious, but also personal cumbersome.
Summary of the invention
The purpose of the present invention is to provide a kind of social networks of decentralization, which includes two or more By the information unit (node) of individual autonomy management, to improve information exchange and the efficiency of management, security and reliability.The present invention Basic thought include: that the data such as personal essential information, social networks belong to personal property as physical item, by owning Person's full powers management.
In the present invention, decentralization means to weaken server capability or is detached from server admin, information unit and the external world It is communicated between (another) information unit;It can ensure safety by asymmetric encryption techniques;Between information unit can direct communication with It improves efficiency;The transmission (circulation) of resource information and reputation information can be achieved;It can be protected by predefining the corresponding identity of public key Demonstrate,prove the reliability in information source.
The exemplary embodiment of the disclosure is intended to overcome at least part defect existing in the prior art, and at least provides Following beneficial effect.
According to an exemplary embodiment of the present disclosure, a kind of method for realizing social networks is provided, which comprises base The signature of the first node is generated in the private key of the first node;Public key based on the second node encrypts to obtain first message First encryption message;Broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the public key of the first node Destination mark with the signature of the first node, the first encryption message is the public key of the second node.
Optionally, the method further include: receive the second encryption message;Judge the transmitting side marking of the second encryption message Whether include sign and judge the second encryption message destination mark whether be the first node public key, when second encrypt message Transmitting side marking do not include signature and the second encryption message destination mark when not being the public key of the first node, forwarding second Encrypt message;Or whether included public key and signature matches and judges in the transmitting side marking of verifying the second encryption message Second encryption message destination mark whether be the first node public key, when the verifying the result is that matching and second plus When the destination mark of close message is not the public key of the first node, forwarding the second encryption message.
Optionally, the method also includes: forwarding second encrypt message before, judge second encrypt message there are when Between whether reach time limit of the second encryption message, when it is described do not reach described there are the time when prescribe a time limit, forwarding the second encryption message.
Optionally, the method also includes: obtain the public key of the second node, and the public key of the second node be stored in first In the relation list of node.
Optionally, first message includes the message being read for indicating message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks, the method packet are provided It includes: receiving the first encryption message of the public key that destination mark is the second node;The transmitting side marking of verifying the first encryption message In included public key and signature whether match;When public key and signature included in the transmitting side marking of the first encryption message User's input of the first encryption message is read in timing in response to receiving, according to the private key of the second node to the first encryption message It is decrypted to obtain first message.
Optionally, the method also includes: display with first encryption message transmitting side marking in included by public key phase Associated information.
Optionally, the method also includes: receive second encryption message;Judging the transmitting side marking of the second encryption message is It is no include sign and judge the second encryption message destination mark whether be the second node public key, when the second encryption message When transmitting side marking does not include signature and the second destination mark for encrypting message is not the public key of the second node, forwarding second adds Close message;Or whether included public key and signature matches and judges the in the transmitting side marking of verifying the second encryption message Two encryption message destination mark whether be the second node public key, when the verifying the result is that matching and second encryption When the destination mark of message is not the public key of the second node, forwarding the second encryption message.
Optionally, the method also includes: forwarding second encrypt message before, judge second encrypt message there are when Between whether reach time limit of the second encryption message, when it is described be not up to described there are the time when prescribe a time limit, forwarding the second encryption message.
Optionally, the method also includes: obtain the public key of the first node, and the public key of the first node be stored in second In the relation list of node.
Optionally, first message includes the message being read for indicating message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate day Normal dynamic message;Receive the third encryption message for the public key that destination mark is third node;Verify the hair of third encryption message Whether included public key and signature match in the side's of sending mark;When public key included in the transmitting side marking of third encryption message When with signatures match, third encryption message is decrypted to obtain third message in the private key based on third node;When third disappears When breath is daily dynamic acquisition request message, daily dynamic message is obtained, institute in the transmitting side marking based on third encryption message Including public key to the daily dynamic message of acquisition encrypted with obtain the 4th encryption message, and broadcast the 4th encryption disappear Breath, wherein the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, and the 4th encryption disappears The destination mark of breath is public key included in the transmitting side marking of third encryption message.
Optionally, the method also includes: when generating daily dynamic message, specify the permission group of daily dynamic message; Wherein, the step of obtaining daily dynamic message comprises determining that public key institute included in the transmitting side marking of third encryption message Permission group, and obtain the corresponding daily dynamic message of permission group with determination;Or the sender when third encryption message When included public key is in the relation list of third node in mark, determines and wrapped in the transmitting side marking of third encryption message Permission group where the public key included, and obtain daily dynamic message corresponding with the permission group determined.
Optionally, the step of obtaining daily dynamic message include: according in following item at least one of from the daily of generation Dynamic message obtains corresponding daily dynamic message: included time and generation day in daily dynamic acquisition request message The time of normal dynamic message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on the The public key of three nodes encrypts daily dynamic acquisition request message to obtain third encryption message;Broadcast third encryption disappears Breath, wherein the transmitting side marking of third encryption message includes the public key of the 4th node and the signature of the 4th node, and third encryption disappears The destination mark of breath is the public key of third node;Receive the 4th encryption message of the public key that destination mark is the 4th node; Verify whether public key and signature included in the transmitting side marking of the 4th encryption message match;When the transmission of the 4th encryption message Included public key and when signatures match in side's mark, the 4th encryption message is decrypted to obtain in the private key based on the 4th node Obtain the 4th message.
According to the another exemplary embodiment of the disclosure, provide a kind of method for realizing social networks, comprising: obtain to The template filled in;The template for obtaining and filling in is inputted based on user;Public key based on the 6th node is to including the of the template filled in Five message are encrypted to obtain the 5th encryption message;Broadcast the 5th encryption message, wherein sender's mark of the 5th encryption message Knowing includes the public key of the 5th node and the signature of the 5th node, and the destination mark of the 5th encryption message is the public affairs of the 6th node Key.
Optionally, the 5th message further includes the supplemental messages of user's input.
Optionally, the step of obtaining in blank template includes: to obtain in blank template from Resource Server.
Optionally, before executing the step of obtaining the 5th encryption message, the method also includes: receive destination mark It is the 6th encryption message of the public key of the 5th node;Verify public key and label included in the transmitting side marking of the 6th encryption message Whether name matches;When public key and signatures match included in the transmitting side marking of the 6th encryption message, it is based on the 5th node Private key to the 6th encryption message be decrypted to obtain the 6th message;When the 6th message is resource acquisition request message, hold Row obtains the step of the 5th encryption message of the step of the 5th encryption message and broadcast.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh Ground mark be the 6th node public key the 5th encryption message;Included by verifying in the transmitting side marking of the 5th encryption message Whether public key and signature match;When public key and signatures match included in the transmitting side marking of the 5th encryption message, it is based on The 5th encryption message is decrypted to obtain the 5th message in the private key of 6th node.
Optionally, before receiving the 5th encryption message, the method also includes: the public key based on the 5th node is to resource Acquisition request message is encrypted to obtain the 6th encryption message;Broadcast the 6th encryption message, wherein the hair of the 6th encryption message The side's of sending mark includes the public key of the 6th node and the signature of the 6th node, and the destination mark of the 6th encryption message is the 5th node Public key.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate needle To the evaluation information of special object;Receive the 7th encryption message of the public key that destination mark is the 7th node;The 7th is verified to add Whether included public key and signature match in the transmitting side marking of close message;When institute in the transmitting side marking of the 7th encryption message Including public key and when signatures match, the 7th encryption message is decrypted to obtain the 7th and disappear in the private key based on the 7th node Breath;When the 7th message is evaluation information acquisition request message, evaluation information is obtained, sender's mark based on the 7th encryption message Included public key encrypts the evaluation information of acquisition to obtain the 8th encryption message in knowledge, and broadcasts the 8th encryption and disappear Breath, wherein the transmitting side marking of the 8th encryption message includes the public key of the 7th node and the signature of the 7th node, and the 8th encryption disappears The destination mark of breath is public key included in the transmitting side marking of the 7th encryption message.
Optionally, the method also includes: when generating evaluation information, the permission group of specified evaluation information;
Wherein, the step of obtaining evaluation information comprises determining that public affairs included in the transmitting side marking of the 7th encryption message Permission group where key, and obtain evaluation information corresponding with the permission group determined;Or the sender when the 7th encryption message When included public key is in the relation list of the 7th node in mark, determines and wrapped in the transmitting side marking of the 7th encryption message Permission group where the public key included, and obtain evaluation information corresponding with the permission group determined.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on the The public key of seven nodes encrypts evaluation information acquisition request message to obtain the 7th encryption message;The 7th encryption is broadcasted to disappear Breath, wherein the transmitting side marking of the 7th encryption message includes the public key of the 8th node and the signature of the 8th node, and the 7th encryption disappears The destination mark of breath is the public key of the 7th node;Receive the 8th encryption message of the public key that destination mark is the 8th node; Verify whether public key and signature included in the transmitting side marking of the 8th encryption message match;When the transmission of the 8th encryption message Included public key and when signatures match in side's mark, the 8th encryption message is decrypted to obtain in the private key based on the 8th node Obtain the 8th message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: from the tenth Node obtains the public key and signature of in blank template and the tenth node;Verify the tenth node public key and signature whether Match and whether the public key of the tenth node is effective;When the public key and signatures match of the tenth node and the public key of the tenth node is effective When, the data of the 9th node of template extraction based on acquisition, data and user based on extraction, which input, generates node information, to production Raw node information is encrypted to obtain the 9th encryption message, and broadcasts the 9th encryption message, wherein the 9th encryption message Transmitting side marking include the public key of the 9th node and the signature of the 9th node, the destination mark of the 9th encryption message is the tenth The public key of node.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate simultaneously Display includes the two dimensional code of in blank template, the public key of the tenth node and signature;Receiving destination mark is the tenth node 9th encryption message of public key;Verify whether public key and signature included in the transmitting side marking of the 9th encryption message match; When public key and signatures match included in the transmitting side marking of the 9th encryption message, according to the private key of the tenth node to the 9th Encryption message is decrypted to obtain the 9th message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on every The public key of a group members is encrypted to group invitation message is entered to obtain and encrypt message with each group members the corresponding tenth; Broadcast encrypts message with each group members the corresponding tenth, wherein encrypts and disappears with each group members the corresponding tenth The transmitting side marking of breath includes the public key of the 11st node and the signature of the 11st node, and corresponding with each group members The destination mark of ten encryption message is the public key of each group members, and entering group invitation message includes the tenth as group's node The public key of two nodes.
Optionally, the method also includes: generate as group's node the 12nd node public key and private key.
Optionally, message is managed to group the method also includes: the public key based on the 12nd node to be encrypted to obtain 11st encryption message, and broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the tenth The destination mark of the signature of the public key of one node and the 11st node, the 11st encryption message is the public key of the 12nd node, Wherein, it includes at least one in following item that the group, which manages message: group members kick out of message, group's essential information changes message, The publication of group's bulletin or update message, group's title editor message and group's rules customization message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh Ground mark be the 12nd node public key the 11st encryption message;Verify institute in the transmitting side marking of the 11st encryption message Including public key and signature whether match;When public key and signatures match included in the transmitting side marking of the 11st encryption message When, the 11st encryption message is decrypted to obtain the 11st message according to the private key of the 12nd node;When the 11st message It is transmitting side marking when receiving into group invitation message or group's update of basic information request message, based on the 11st encryption message In included public key group's essential information is encrypted to obtain the 12nd encryption message;The 12nd encryption message is broadcasted, Wherein, the transmitting side marking of the 12nd encryption message includes the public key of the 12nd node and the signature of the 12nd node, and the 12nd The destination mark of encryption message is public key included in the transmitting side marking of the 11st encryption message, wherein the group Essential information includes the public key of each group member node.
Optionally, the method also includes: when the 11st message is to move back group message, or when the 11st message is group's pipe When included public key belongs to the public key of administrator's node in the transmitting side marking of reason message and the 11st encryption message, institute is updated State group's essential information, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, group's base This information changes message, group announces publication or update message, group's title editor message and group's rules customization message.
Optionally, the method also includes: receive destination mark be the 12nd node public key the 13rd encryption disappear Breath;Verify whether public key and signature included in the transmitting side marking of the 13rd encryption message match;When the 13rd encryption disappears Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 12nd node to the 13rd encryption message It is decrypted to obtain the 13rd message;When the 13rd message is message in group, the 13rd encryption message of storage.
Optionally, the method also includes: receive destination mark be the 12nd node public key the 14th encryption disappear Breath;Verify whether public key and signature included in the transmitting side marking of the 14th encryption message match;When the 14th encryption disappears Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 12nd node to the 14th encryption message It is decrypted to obtain the 14th message;When the 14th message is message acquisition request message in group, extracts and broadcast the tenth Three encryption message, wherein the destination mark of the 13rd encryption message is changed to the transmitting side marking of the 14th encryption message In included public key.
Optionally, the step of extracting the 13rd encryption message include: according in group in message acquisition request message it is included Time come extract the 13rd encryption message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh Ground mark be the 13rd node public key the tenth encryption message;It verifies included in the transmitting side marking of the tenth encryption message Public key and signature whether match;When public key and signatures match included in the transmitting side marking of the tenth encryption message, root The tenth encryption message is decrypted to obtain the tenth message according to the private key of the 13rd node;When the tenth message is disappeared into group invitation When breath, in response to receive agree into group user input, the public key based on the 12nd node to receive into group invitation message into Row encryption broadcasts the 11st encryption message to obtain the 11st encryption message, wherein the sender of the 11st encryption message Mark includes the public key of the 13rd node and the signature of the 13rd node, and the destination mark of the 11st encryption message is invited into group The public key of the 12nd node as group's node that please be included in message.
Optionally, the method also includes: receive destination mark be the 13rd node public key the 12nd encryption disappear Breath;Verify whether public key and signature included in the transmitting side marking of the 12nd encryption message match;When the 12nd encryption disappears Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 13rd node to the 12nd encryption message It is decrypted to obtain the 12nd message;When the 12nd message is group's essential information, storage cluster essential information, wherein Group's essential information includes the public key of each group member node.
Optionally, the method also includes: the cryptographic Hash of the public key based on collective group member's node to message in group into Row encryption broadcasts the 13rd encryption message to obtain the 13rd encryption message, wherein the sender of the 13rd encryption message Mark includes the public key of the 13rd node and the signature of the 13rd node, and the destination mark of the 13rd encryption message is group node Public key.
Optionally, the method also includes: the public key based on the 12nd node carries out message acquisition request message in group Encryption is to obtain the 14th encryption message, the 14th encryption message of broadcast, wherein the transmitting side marking packet of the 14th encryption message The public key of the 13rd node and the signature of the 13rd node are included, the destination mark of the 14th encryption message is the public affairs of group node Key;Receive the 13rd encryption message of the public key that destination mark is the 13rd node;Verify the transmission of the 13rd encryption message Whether included public key and signature match in side's mark;When public key included in the transmitting side marking of the 13rd encryption message When with signatures match, the 13rd encryption message is decrypted to obtain the 13rd message according to the private key of the 13rd node;When It when 13rd message is message in group, is inputted in response to the user for reading message in group, shows message in group.
Optionally, the method also includes: the public keys based on the 13rd node to moving back group message or group's essential information more New request message is encrypted to obtain the 11st encryption message, and broadcasts the 11st encryption message, wherein the 11st encryption The transmitting side marking of message includes the public key of the 13rd node and the signature of the 13rd node, the destination of the 11st encryption message Mark is the public key of group node.
Optionally, in the group message include group's essential information renewal time, the method also includes: will be local The renewal time of group's essential information is compared with the renewal time of included group's essential information in message in the group;Root Group's update of basic information request message is obtained according to the comparison result.
According to the another exemplary embodiment of the disclosure, a kind of computer readable storage medium of store instruction is provided, Wherein, when described instruction is run by least one computing device, at least one described computing device is promoted to execute as described above Method.
According to the another exemplary embodiment of the disclosure, a kind of system for realizing social networks, including at least two are provided A node, wherein method as described above can be performed in any one node at least two node.
Method and system of the invention at least can provide it is following the utility model has the advantages that
1, information security is improved.Under several scenes, information is transmitted using asymmetric encryption mode, information security obtains Raising is arrived.The scene includes: circle of friends information (daily dynamic message) transmission, general information transmission, sensitive information (individual Privacy information) transmission, resource information transfer, evaluation information transmission, the transmission of group's relevant information.
2, information authenticity and reliability are improved.It can know identity corresponding to public key, in advance so as to disappear by encryption The identity for the public key accurate judgement sender for including in the transmitting side marking of breath, to guarantee the reliable of information source or can lead to Cross authenticity and reliability that information source judges information.
3, effectively classify to information.The information of needs can be targetedly obtained, for example, with daily dynamic, money The related information such as source, evaluation can also automatically extract information based on template.In this case, can targetedly obtain needs The information wanted, improves information acquisition efficiency, and effective mode classification can also be convenient for information management.
4, credit rating system is improved.Evaluation is established for node or not a node, be easy to distinguish appraiser and is evaluated the person Part, thus the process of Speed-up Establishment credit rating system.
5, personal information management mechanism is improved.Individual is needing and mechanism (bank, post office, government department, business place Deng) establish connection when, the personal information such as information, such as name, address, phone, mailbox that template rapidly extracting can be used to need And mechanism is submitted to, individual directly interacts with mechanism, without the third party, and information security can be improved, when reducing third party's participation The information management cost of waste.
6, the quick execution of repetitive operation when convenient for being interacted with mechanism.When individual interacts with different institutions, pass through template It extracts information and is submitted directly to bank.Treatment effeciency is improved, the queuing phenomena of the mechanisms such as bank can be reduced, reduces the numerous of individual Trivial operation.
Part in following description is illustrated into the other aspect and/or advantage of disclosure general plotting, there are also one Point will be apparent by description, or can implementation Jing Guo disclosure general plotting and learn.
Detailed description of the invention
By below with reference to be exemplarily illustrated embodiment attached drawing carry out description, disclosure exemplary embodiment it is upper Stating will become apparent with other purposes and feature, in which:
Fig. 1 shows the flow chart of the method for the realization social networks of the first exemplary embodiment according to the present invention;
Fig. 2 shows the flow charts of the method for the realization social networks of the second exemplary embodiment according to the present invention;
Fig. 3 shows the flow chart of the method for the realization social networks of third exemplary embodiment according to the present invention;
Fig. 4 shows the flow chart of the method for the realization social networks of the 4th exemplary embodiment according to the present invention;
Fig. 5 shows the flow chart of the method for the realization social networks of the 5th exemplary embodiment according to the present invention;
Fig. 6 shows the flow chart of the method for the realization social networks of the 6th exemplary embodiment according to the present invention
Fig. 7 shows the flow chart of the method for the realization social networks of the 7th exemplary embodiment according to the present invention;
Fig. 8 shows the flow chart of the method for the realization social networks of the 8th exemplary embodiment according to the present invention;
Fig. 9 shows the flow chart of the method for the realization social networks of the 9th exemplary embodiment according to the present invention;
Figure 10 shows the flow chart of the method for the realization social networks of the tenth exemplary embodiment according to the present invention;
Figure 11 shows the flow chart of the method for the realization social networks of the 11st exemplary embodiment according to the present invention;
Figure 12 shows the flow chart of the method for the realization social networks of the 12nd exemplary embodiment according to the present invention;
Figure 13 to Figure 17 shows the stream of the method for the realization social networks of the 13rd exemplary embodiment according to the present invention Cheng Tu;
Figure 18 shows the block diagram of the system of the realization social networks of the 14th exemplary embodiment according to the present invention.
Specific embodiment
It reference will now be made in detail embodiment of the disclosure, examples of the embodiments are shown in the accompanying drawings, wherein identical mark Number identical component is referred to always.It will illustrate the embodiment, by referring to accompanying drawing below to explain the disclosure.
In an exemplary embodiment of the present invention, it can be held by another node using the method or operation that a node executes Row, for example, the first node execute method or operation can by other than the first node any one or more node hold Row;It the private key of one node can be used to decrypt using the message of the public key encryption of a node, use one node Public key can verify that whether the signature of one node effective;Node is also known as node, can be application (for example, answering With program) or information related with user set.
The method provided in each exemplary embodiment of the invention may each comprise: create node operation and generate with The operation of the node of creation corresponding public key and private key.
Fig. 1 show the first exemplary embodiment according to the present invention realization social networks method flow chart, first The method of exemplary embodiment can realize that the first node can be used for carrying out encrypting and transmitting to first message in the first node.
As shown in fig. 1, the method includes the steps S110 to S130.In step S110, the private key based on the first node Generate the signature of the first node.In step S120, the public key based on the second node encrypts to obtain first first message Encrypt message.In step S130, broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the first knot The destination mark of the public key of point and the signature of the first node, the first encryption message is the public key of the second node.
As an example, first message is to be sent to the message of the second node from the first node (for example, hello messages, daily Exchange message etc.).First node is the sender of the first encryption message, and the second node is the destination of the first encryption message.
As an example, the first node and the second node all have respective public key and private key.The two nodes can be by pre- Other side's hair public key is known in first interaction (for example, scanning the two-dimensional code face-to-face).
As an example, judgement or verification operation can be carried out after receiving encryption message.For example, receiving the second encryption Message;Whether the transmitting side marking for judging the second encryption message includes signing and judging that the destination mark of the second encryption message is No is the public key of the first node, when the transmitting side marking of the second encryption message does not include the destination of signature and the second encryption message When mark is not the public key of the first node, forwarding the second encryption message;Or in the transmitting side marking of verifying the second encryption message Included public key and signature whether match and judge the second encryption message destination mark whether be the first node public affairs Key, when the verifying the result is that matching and second encryption message destination mark be not the public key of the first node when, turn Hair the second encryption message.
As an example, the method may also include that before forwarding second encrypts message, depositing for the second encryption message is judged The time limit for whether reaching the second encryption message in the time, when it is described do not reach described there are the time when prescribe a time limit, forwarding second encryption disappears Breath.
As an example, obtaining the public key of the second node, and the relationship that the public key of the second node is stored in the first node is arranged In table.
As an example, first message includes the message being read for indicating message.
By the present exemplary embodiment, encryption message can be transmitted between two nodes.Using particular public key and private key It is encrypted or is decrypted, so as to ensure information security;It is whether reliable using signature verification message sender, to guarantee to believe Reliability, authenticity or the validity of breath;It can be judged by signature or verify or judge the time limit to reject interference message, avoided Harmful information transmission;The storage of node public key can be carried out, by relation list so as to promptly and accurately know informed source;It can lead to The message that message has been read is crossed to know message status, consequently facilitating judge message is sent to state.
Fig. 2 shows the second exemplary embodiment according to the present invention realization social networks method flow chart, second The method of exemplary embodiment can realize that the second node can be used for receiving the first encryption message and be decrypted in the second node.
As shown in Figure 2, which comprises step S210 to step S230.In step S210, receiving destination mark is First encryption message of the public key of the second node.It is included in step S220, the transmitting side marking of verifying the first encryption message Public key and signature whether match.In step S230, when public key and label included in the transmitting side marking of the first encryption message When name matching, user's input of the first encryption message is read in response to receiving, and is encrypted according to the private key of the second node to first Message is decrypted to obtain first message.
As an example, the method also includes: display and public key included in the transmitting side marking of the first encryption message Associated information.
As an example, the method also includes: receive the second encryption message;Judge the transmitting side marking of the second encryption message Whether include sign and judge the second encryption message destination mark whether be the second node public key, when second encrypt message Transmitting side marking do not include signature and the second encryption message destination mark when not being the public key of the second node, forwarding second Encrypt message;Or whether included public key and signature matches and judges in the transmitting side marking of verifying the second encryption message Second encryption message destination mark whether be the second node public key, when the verifying the result is that matching and second plus When the destination mark of close message is not the public key of the second node, forwarding the second encryption message.
As an example, the method also includes: before forwarding second encrypts message, judge the presence of the second encryption message Whether the time reaches the time limit of the second encryption message, when it is described be not up to described there are the time when prescribe a time limit, forwarding second encryption disappears Breath.
As an example, the method also includes: the public key of the first node is obtained, and the public key of the first node is stored in the In the relation list of two nodes.
As an example, first message includes the message being read for indicating message.
By the present exemplary embodiment, the second node can receive the broadcast of the first node and by addition to the first node and second First encryption message of the node forwarding except node;Since the first encryption message is added by the public key of the second node Close, therefore, the second node can be decrypted the first encryption message using the private key of itself;What the second node can also sign The judgement in the time limit of judgement or verifying or message, to reject unwanted messages;Second node can also be saved by relation list The public key of node, so as to be compareed with the public key for including from the transmitting side marking of the first encryption message, to determine the The source of one encryption message.First node and the second node can exchange public key (for example, by mutual scanning phase other side two dimensional code in advance To know other side's public key) and the public key received is stored in relation list, relation list can storage of public keys, public affairs can also be stored The corresponding contact identity of key (for example, friend, household, company personnel, classmate, leader etc.).
Fig. 3 shows the flow chart of the method for the realization social networks of third exemplary embodiment according to the present invention, third The method of exemplary embodiment can realize that third node can be used for generating daily dynamic message and according to request in third node (for example, request of the 4th node) sends the daily dynamic message generated.
As shown in Figure 3, the method can include: step S310 to step S350.In step S310, daily dynamic is generated Message.In step S320, the third encryption message for the public key that destination mark is third node is received.In step S330, verifying Third encrypt public key and signature (for example, public key and signature of the 4th node) included in the transmitting side marking of message whether Match.Third knot is based on when public key and signatures match included in the transmitting side marking of third encryption message in step S340 Third encryption message is decrypted to obtain third message in the private key of point.In step S350, when third message is daily dynamic When acquisition request message, daily dynamic message is obtained, included public key (example in the transmitting side marking based on third encryption message Such as, the public key of the 4th node) the daily dynamic message of acquisition is encrypted to obtain the 4th encryption message, and broadcast the 4th Encrypting message, wherein the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, and the 4th The destination mark of encryption message is public key included in the transmitting side marking of third encryption message (for example, the 4th node Public key).
The daily dynamic of the node of daily dynamic message is requested to disappear as an example, can determine and be issued to based on permission group Breath.For example, the method can include: when generating daily dynamic message, specify the permission group of daily dynamic message;Wherein, it obtains The step of taking daily dynamic message comprises determining that the permission where public key included in the transmitting side marking of third encryption message Group, and obtain daily dynamic message corresponding with the permission group determined;Or when institute in the transmitting side marking of third encryption message Including public key in the relation list of third node when, determine public key included in the transmitting side marking of third encryption message The permission group at place, and obtain daily dynamic message corresponding with the permission group determined.
As an example, permission group can indicate the permission of node (for example, public key of node), it may be assumed which day node can be seen Normal dynamic message.
The daily dynamic of the node of daily dynamic message is requested to disappear as an example, can also determine to be issued to based on the time Breath.For example, the step of obtaining daily dynamic message includes: the daily dynamic message according at least one in following item from generation Obtain corresponding daily dynamic message: included time and the daily dynamic of generation disappear in daily dynamic acquisition request message The time of breath.For example, it can will be wrapped after the time for generating daily dynamic message and in daily dynamic acquisition request message Daily dynamic message within the time range included is sent to the 4th node.
In the present example embodiment, third message can be daily dynamic acquisition request message, and the 4th message can be The daily dynamic message of request;Third node receives the daily dynamic acquisition request of the 4th node, and by corresponding daily dynamic Message is sent to the 4th node.
According to the present exemplary embodiment, daily dynamic message can be transmitted by encryption message, ensure that information security;It is daily Dynamic message is based on request and is sent, rather than active push, effectively limits the spread scope of daily dynamic message, ensure that Individual privacy;Daily dynamic message can be also limited by permission group knows range, convenient for the management of daily dynamic message.
Fig. 4 show the 4th exemplary embodiment according to the present invention realization social networks method flow chart, the 4th The method of exemplary embodiment can realize that the 4th node can be used for requesting daily dynamic message (for example, to third in the 4th node Node requests daily dynamic message).
As shown in Figure 4, the method can include: step S410 to step S450.In step S410, it is based on third node Public key daily dynamic acquisition request message is encrypted with obtain third encryption message.In step S420, broadcasts third and add Close message, wherein the transmitting side marking that third encrypts message includes the public key of the 4th node and the signature of the 4th node, and third adds The destination mark of close message is the public key of third node.In step S430, the public key that destination mark is the 4th node is received The 4th encryption message.Included public key and signature (example in step S440, the transmitting side marking of the 4th encryption message of verifying Such as, the public key and signature of third node) whether match.In step S450, wrapped when in the transmitting side marking of the 4th encryption message When the public key and signatures match that include, the 4th encryption message is decrypted to obtain the 4th message in the private key based on the 4th node.
Fig. 5 show the 5th exemplary embodiment according to the present invention realization social networks method flow chart, the 5th The method of exemplary embodiment can realize that the 5th node can be used for (for example, to the 6th node) and send resource letter in the 5th node Breath (for example, job hunting information, search notice etc.).
As shown in Figure 5, the method includes the steps S510 to step S540.In step S510, in blank mould is obtained Plate.In step S520, the template for obtaining and filling in is inputted based on user.In step S530, the public key based on the 6th node is to including 5th message of the template filled in is encrypted to obtain the 5th encryption message.In step S540, broadcast the 5th encrypts message, In, the transmitting side marking of the 5th encryption message includes the public key of the 5th node and the signature of the 5th node, and the 5th encrypts message Destination mark is the public key of the 6th node.Here, the 5th node actively can send message (for example, resource disappears to the 6th node Breath), the 6th node receives the message that the 5th node is sent, and the 5th message can be resource information.
As an example, the 5th message further includes the supplemental messages of user's input, to supplement the template filled in.
As an example, the step of obtaining in blank template includes: to obtain in blank template from Resource Server.Resource Server can be public server, which can store various templates.Template can be including multiple items of information.It changes Yan Zhi, template can be with multiple tables to fill message item.
As an example, the 5th encryption message can be sent based on request.For example, the method also includes: step S521: reception Destination mark is the 6th encryption message of the public key of the 5th node;Step S522: sender's mark of the 6th encryption message of verifying Whether included public key and signature match in knowledge;Step S523: when included in the transmitting side marking of the 6th encryption message When public key and signatures match, the 6th encryption message is decrypted to obtain the 6th message in the private key based on the 5th node;When When six message are resource acquisition request messages, the step of the 5th encryption message of the step of obtaining the 5th encryption message and broadcast is executed Suddenly.Here, the 6th node sends to the 5th node and requests, and therefore, the 6th message can be the resource acquisition from the 6th node Request message.
According to the present exemplary embodiment, can by the format of template-setup message to be transmitted (for example, the 5th message), from And convenient for the quick management formed with information (resource information) of message.
Fig. 6 show the 6th exemplary embodiment according to the present invention realization social networks method flow chart, the 6th The method of exemplary embodiment can realize that the 6th node can be used for receiving (for example, the 5th node) and send information in the 6th node (for example, job hunting information, search notice etc.), it may also be used for (for example, to the 5th node) sends request, to request resource information.
As shown in Figure 6, the method may include step S610 to step S630.In step S610, purpose terrestrial reference is received Knowledge is the 5th encryption message of the public key of the 6th node.The institute in step S620, the transmitting side marking of the 5th encryption message of verifying Including public key and signature whether match.In step S630, when public key included in the transmitting side marking of the 5th encryption message When with signatures match, the 5th encryption message is decrypted to obtain the 5th message in the private key based on the 6th node.
As an example, the transmittable request of the 6th node to the 5th node (for example, send out before receiving the 5th encryption message Send resource acquisition request message).In this case, the method can include: the public key based on the 5th node is to resource acquisition Request message is encrypted to obtain the 6th encryption message;Broadcast the 6th encryption message, wherein the sender of the 6th encryption message Mark includes the public key of the 6th node and the signature of the 6th node, and the destination mark of the 6th encryption message is the public affairs of the 5th node Key.
Fig. 7 show the 7th exemplary embodiment according to the present invention realization social networks method flow chart, the 7th The method of exemplary embodiment can realize that the 7th node can be used for passively sending evaluation information based on request in the 7th node (for example, good, bad, general, degrees of comparison etc.).
As shown in Figure 7, the method may include step S710 to step S750.In step S710, generate for specific The evaluation information of object.In step S720, the 7th encryption message of the public key that destination mark is the 7th node is received.In step S730, verifying the 7th encrypt whether public key and signature included in the transmitting side marking of message match.In step S740, when Included public key and when signatures match in the transmitting side marking of seven encryption message, the private key based on the 7th node is encrypted to the 7th Message is decrypted to obtain the 7th message.In step S750, when the 7th message is evaluation information acquisition request message, obtain Evaluation information, in the transmitting side marking based on the 7th encryption message included public key to the evaluation information of acquisition encrypted with The 8th encryption message is obtained, and broadcasts the 8th encryption message, wherein the transmitting side marking of the 8th encryption message includes the 7th knot The public key of point and the signature of the 7th node, the destination mark of the 8th encryption message are in the transmitting side marking of the 7th encryption message Included public key.
As an example, the 7th node receives the 7th message (for example, evaluation information acquisition request) from the 8th node, and will comment Valence information (for example, the 8th message) is sent to the 8th node.
As an example, the method further include: when generating evaluation information, the permission group of specified evaluation information;Wherein, The step of obtaining evaluation information comprises determining that the permission where public key included in the transmitting side marking of the 7th encryption message Group, and obtain evaluation information corresponding with the permission group determined;Or when included in the transmitting side marking of the 7th encryption message Public key in the relation list of the 7th node when, where determining public key included in the transmitting side marking of the 7th encryption message Permission group, and obtain the corresponding evaluation information of permission group with determination.
In the present example embodiment, evaluation information can passively be transmitted, due to knowing other side between node mutually Identity (is known) by exchanging public key, therefore the reliability of evaluation information and authenticity are high.
Fig. 8 show the 8th exemplary embodiment according to the present invention realization social networks method flow chart, the 8th The method of exemplary embodiment can realize that the 8th node can be used for (for example, to the 7th node) request evaluation letter in the 8th node Breath.
As shown in Figure 8, the method may include step S810 to step S850.In step S810, it is based on the 7th node Public key to evaluation information acquisition request message encrypted with obtain the 7th encryption message.In step S820, broadcast the 7th adds Close message, wherein the transmitting side marking of the 7th encryption message includes the public key of the 8th node and the signature of the 8th node, and the 7th adds The destination mark of close message is the public key of the 7th node.In step S830, the public key that destination mark is the 8th node is received The 8th encryption message.Included public key and signature are in step S840, the transmitting side marking of the 8th encryption message of verifying No matching.In step S850, when public key and signatures match included in the transmitting side marking of the 8th encryption message, based on the The 8th encryption message is decrypted to obtain the 8th message in the private key of eight nodes.
Here, the step of step S810 and step S820 is for sending the request for obtaining evaluation information, step The step of S830 to step S850 is for receiving evaluation information in response to request.
Fig. 9 show the 9th exemplary embodiment according to the present invention realization social networks method flow chart, the 9th The method of exemplary embodiment can realize that the 9th node can be used for and as mechanism (bank, post office, portion of government in the 9th node Door, business place etc.) the tenth node interaction.
As shown in Figure 9, the method can include: step S910 to step S930.In step S910, obtained from the tenth node The public key and signature for taking in blank template and the tenth node by modes such as the two dimensional codes of sweep mechanism (for example, can be obtained It takes).In step S920, verifies the public key of the tenth node and whether signature matches and whether the public key of the tenth node is effective.? Step S930, when the public key of the public key of the tenth node and signatures match and the tenth node is effective, the template extraction based on acquisition The data of 9th node, data and user based on extraction, which input, generates node information, and the public key based on the tenth node is to generation Node information encrypted to obtain the 9th encryption message, and broadcast the 9th encryption message, wherein the 9th encryption message Transmitting side marking includes the public key of the 9th node and the signature of the 9th node, and the destination mark of the 9th encryption message is the tenth knot The public key of point.
As an example, user's input may include input for the data of extraction to be selected or confirmed and/or be used for The input of supplemental information.
As an example, whether the public key that the tenth node can be verified by public server is effective.
By the present exemplary embodiment, can judge to determine the reliable of node with public key Effective judgement by signatures match Property, so that the information as the 9th personal node be effectively ensured (for example, telephone number, name, identification card number, Bank Account Number Deng) safety.
Figure 10 show the tenth exemplary embodiment according to the present invention realization social networks method flow chart, the tenth The method of exemplary embodiment can realize that the tenth node can be used as mechanism (bank, post office, government department, business in the tenth node Place etc.) and information can be obtained from as the 9th personal node.
As shown in Figure 10, the method may include step S1010 to step S1040.In step S1010, generates and show Show the two dimensional code including in blank template, the public key of the tenth node and signature.In step S1020, receiving destination mark is 9th encryption message of the public key of the tenth node.It is included in step S1030, the transmitting side marking of the 9th encryption message of verifying Public key and signature whether match.In step S1040, when public key and label included in the transmitting side marking of the 9th encryption message When name matching, the 9th encryption message is decrypted to obtain the 9th message according to the private key of the tenth node.
Figure 11 shows the flow chart of the method for the realization social networks of the 11st exemplary embodiment according to the present invention, the The method of 11 exemplary embodiments can realize that the 11st node can be the group's major node for establishing group in the 11st node, or Administrator's node of group.
As shown in Figure 11, the method may include step S1110 and step S1120.In step S1110, based on each The public key of group members is encrypted to group invitation message is entered to obtain and encrypt message with each group members the corresponding tenth.? Step S1120, broadcast encrypt message with each group members the corresponding tenth, wherein corresponding with each group members The transmitting side marking of tenth encryption message includes the public key of the 11st node and the signature of the 11st node, with each group at The destination mark of the corresponding tenth encryption message of member is the public key of each group members, and entering group invitation message includes as group The public key of 12nd node of node.
As an example, the method also includes: by group's major node or create group node generate as group's node the The public key and private key of 12 nodes.
As an example, group's node (12 node) is also node, public server can be stored in or existed with group's major node Same terminal, terminal can be the various electronic equipments such as mobile phone, tablet computer.
As an example, the method also includes: the public key based on the 12nd node manages message to group and is encrypted to obtain The 11st encryption message, and broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the The destination mark of the signature of the public key of 11 nodes and the 11st node, the 11st encryption message is the public affairs of the 12nd node Key, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, the change of group's essential information disappears Breath, group announce publication or update message, group's title editor message and group's rules customization message.
Figure 12 shows the flow chart of the method for the realization social networks of the 12nd exemplary embodiment according to the present invention, the The method of 12 exemplary embodiments can realize that the 12nd node can be group's node in the 12nd node.
As shown in Figure 12, the method includes the steps S1210 to step S1250.In step S1210, destination is received Mark is the 11st encryption message of the public key of the 12nd node.In step S1220, the sender of the 11st encryption message of verifying Whether included public key and signature match in mark.In step S1230, when institute in the transmitting side marking of the 11st encryption message Including public key and when signatures match, the 11st encryption message is decrypted to obtain the tenth according to the private key of the 12nd node One message.In step S1240, when the 11st message is received into group invitation message or group's update of basic information request message When, included public key encrypts group's essential information to obtain the in the transmitting side marking based on the 11st encryption message 12 encryption message.In step S1250, the 12nd encryption message of broadcast, wherein the transmitting side marking packet of the 12nd encryption message The public key of the 12nd node and the signature of the 12nd node are included, the destination mark of the 12nd encryption message is that the 11st encryption disappears Included public key in the transmitting side marking of breath, wherein group's essential information includes the public key of each group member node.
As an example, the method also includes: when the 11st message is to move back group message, or when the 11st message is group When included public key belongs to the public key of administrator's node in the transmitting side marking of management message and the 11st encryption message, update Group's essential information, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, group Essential information changes message, group announces publication or update message, group's title editor message and group's rules customization message.
As an example, the method also includes: receive the 13rd encryption of the public key that destination mark is the 12nd node Message;Verify whether public key and signature included in the transmitting side marking of the 13rd encryption message match;When the 13rd encryption Included public key and when signatures match in the transmitting side marking of message, disappears to the 13rd encryption according to the private key of the 12nd node Breath is decrypted to obtain the 13rd message;When the 13rd message is message in group, the 13rd encryption message of storage.
As an example, the method also includes: receive the 14th encryption of the public key that destination mark is the 12nd node Message;Verify whether public key and signature included in the transmitting side marking of the 14th encryption message match;When the 14th encryption Included public key and when signatures match in the transmitting side marking of message, disappears to the 14th encryption according to the private key of the 12nd node Breath is decrypted to obtain the 14th message;When the 14th message is message acquisition request message in group, extracts and broadcast 13 encryption message, wherein the destination mark of the 13rd encryption message is changed to sender's mark of the 14th encryption message Included public key in knowledge.
As an example, the step of extracting the 13rd encryption message includes: according to being wrapped in message acquisition request message in group The time included extracts the 13rd encryption message.
As an example, receiving group invitation message, group's update of basic information request message, moving back group message, message in group Message can be the 13rd node transmission as common group members in acquisition request message and group.Group's management message is the tenth What one node was sent.
Figure 13 to Figure 17 shows the stream of the method for the realization social networks of the 13rd exemplary embodiment according to the present invention The method of Cheng Tu, the 13rd exemplary embodiment can realize that the 13rd node can be common group members in the 13rd node Node.
As shown in Figure 13, the method includes the steps S1310 to step S1340.In step S1310, destination is received Mark is the tenth encryption message of the public key of the 13rd node (group members node).In step S1320, the tenth encryption message of verifying Transmitting side marking in included public key and signature whether match.In step S1330, when sender's mark of the tenth encryption message Included public key and when signatures match in knowledge, is decrypted to obtain the tenth encryption message according to the private key of the 13rd node Tenth message.In step S1340, when the tenth message is into group invitation message, agree to that the user into group is defeated in response to receiving Enter, the public key based on the 12nd node obtains the 11st encryption message to receiving to be encrypted into group invitation message, and wide Broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the public key and the 13rd of the 13rd node The destination mark of the signature of node, the 11st encryption message is the ten as group's node included in group invitation message The public key of two nodes.
As an example, as shown in Figure 14, the method also includes: step S1410: receiving destination mark is the 13rd 12nd encryption message of the public key of node;Step S1420: included by the transmitting side marking of the 12nd encryption message of verifying Whether public key and signature match;Step S1430: when public key and signature included in the transmitting side marking of the 12nd encryption message When matching, the 12nd encryption message is decrypted to obtain the 12nd message according to the private key of the 13rd node;Step S1440: when the 12nd message is group's essential information, storage cluster essential information, wherein group's essential information includes The public key of each group member node.
As an example, as shown in Figure 15, the method also includes: step S1510: based on collective group member's node The cryptographic Hash of public key encrypts message in group to obtain the 13rd encryption message;Step S1520: the 13rd encryption of broadcast disappears Breath, wherein the transmitting side marking of the 13rd encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the tenth The destination mark of three encryption message is the public key of group node.
As an example, as shown in Figure 16, the method also includes: step S1610: the public key pair based on the 12nd node Message acquisition request message is encrypted to obtain the 14th encryption message in group, step S1620: the 14th encryption of broadcast disappears Breath, wherein the transmitting side marking of the 14th encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the tenth The destination mark of four encryption message is the public key of group node;Step S1630: the public affairs that destination mark is the 13rd node are received 13rd encryption message of key;Step S1640: included public key and label in the transmitting side marking of the 13rd encryption message of verifying Whether name matches;Step S1650: when public key and signatures match included in the transmitting side marking of the 13rd encryption message, The 13rd encryption message is decrypted to obtain the 13rd message according to the private key of the 13rd node;Step S1660: when the tenth It when three message are message in group, is inputted in response to the user for reading message in group, shows message in group.
As an example, as shown in Figure 17, the method also includes: step S1710: the public key pair based on the 13rd node It moves back group message or group's update of basic information request message is encrypted to obtain the 11st encryption message;Step S1720: broadcast 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the public key and the 13rd knot of the 13rd node The destination mark of the signature of point, the 11st encryption message is the public key of group node.
As an example, message includes the renewal time of group's essential information in the group, and the method also includes: it will be local Renewal time of group's essential information be compared with the renewal time of included group's essential information in message in the group; Group's update of basic information request message is obtained according to the comparison result.
As an example, the cryptographic Hash is by all public affairs based on hash function to whole group member nodes of group Key is calculated and is obtained, and the present invention is not intended to limit the hash function used.In other words, any for calculating the Kazakhstan of multiple public keys The hash function of uncommon value is feasible.
Figure 18 shows the block diagram of the system of the realization social networks of the 14th exemplary embodiment according to the present invention.It is described System may include at least two nodes, and method as described above can be performed in any one node at least two node. It is any one in the executable the above exemplary embodiments of any one node in node 1810 and node 1820 in Figure 18 Method as described in the examples.
In accordance with an alternative illustrative embodiment of the present invention, a kind of computer readable storage medium of store instruction is provided, Wherein, when described instruction is run by least one computing device, at least one described computing device is promoted to execute as described above Method.
Computer readable storage medium is the arbitrary data storage device that can store the data read by computer system.Meter The example of calculation machine readable storage medium storing program for executing includes: read-only memory, random access memory, CD-ROM, tape, floppy disk, light number According to storage device and carrier wave (such as being transmitted via wired or wireless transmission path by the data of internet).
Moreover, it should be understood that according to each node of disclosure exemplary embodiment can be implemented as hardware component and/or Component software.Those skilled in the art's processing according to performed by each unit of restriction can for example use site may be programmed Gate array (FPGA) or specific integrated circuit (ASIC) realize each node.
In addition, may be implemented as the meter in computer readable storage medium according to the method for disclosure exemplary embodiment Calculation machine code.Those skilled in the art can realize the computer code according to the description to the above method.When the meter Calculation machine code is performed the above method for realizing the disclosure in computer (especially processor).
The present invention for each user provide a safety, can be with the external personal information management for carrying out information exchange Scheme.Based on this, it will be embodied in IT application process with everyone conscientiously, it will the daily of people is greatly improved The mode of the efficiency of information processing and the real-life information processing of improvement in life.
The foregoing describe each exemplary embodiments of the disclosure, it should be appreciated that foregoing description is merely exemplary, and exhaustive Property, the present disclosure is not limited to disclosed each exemplary embodiments.It is right without departing from the scope of the present disclosure and spirit Many modifications and changes are obvious for those skilled in the art.Therefore, the protection of the disclosure Range should be subject to the scope of the claims.

Claims (10)

1. a kind of method for realizing social networks, comprising:
Private key based on the first node generates the signature of the first node;
Public key based on the second node encrypts first message to obtain the first encryption message;
Broadcast the first encryption message,
Wherein, the transmitting side marking of the first encryption message includes the public key of the first node and the signature of the first node, the first encryption The destination mark of message is the public key of the second node.
2. a kind of method for realizing social networks, comprising:
Generate daily dynamic message;
Receive the third encryption message for the public key that destination mark is third node;
Whether included public key and signature match in the transmitting side marking of verifying third encryption message;
When public key and signatures match included in the transmitting side marking of third encryption message, the private key pair based on third node Third encryption message is decrypted to obtain third message;
When third message is daily dynamic acquisition request message, daily dynamic message is obtained, the hair based on third encryption message Included public key encrypts the daily dynamic message of acquisition to obtain the 4th encryption message in the side's of sending mark, and broadcasts 4th encryption message,
Wherein, the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, the 4th encryption The destination mark of message is public key included in the transmitting side marking of third encryption message.
3. a kind of method for realizing social networks, comprising:
Obtain in blank template;
The template for obtaining and filling in is inputted based on user;
Public key based on the 6th node encrypts the 5th message for including the template filled in obtain the 5th encryption message;
The 5th encryption message is broadcasted,
Wherein, the transmitting side marking of the 5th encryption message includes the public key of the 5th node and the signature of the 5th node, the 5th encryption The destination mark of message is the public key of the 6th node.
4. a kind of method for realizing social networks, comprising:
Generate the evaluation information for being directed to special object;
Receive the 7th encryption message of the public key that destination mark is the 7th node;
Verify whether public key and signature included in the transmitting side marking of the 7th encryption message match;
When public key and signatures match included in the transmitting side marking of the 7th encryption message, the private key pair based on the 7th node 7th encryption message is decrypted to obtain the 7th message;
When the 7th message is evaluation information acquisition request message, evaluation information is obtained, the sender based on the 7th encryption message Included public key encrypts the evaluation information of acquisition to obtain the 8th encryption message in mark, and broadcasts the 8th encryption Message,
Wherein, the transmitting side marking of the 8th encryption message includes the public key of the 7th node and the signature of the 7th node, the 8th encryption The destination mark of message is public key included in the transmitting side marking of the 7th encryption message.
5. a kind of method for realizing social networks, comprising:
The public key and signature of in blank template and the tenth node are obtained from the tenth node;
It verifies the public key of the tenth node and whether signature matches and whether the public key of the tenth node is effective;
When the public key of the public key of the tenth node and signatures match and the tenth node is effective, the 9th knot of template extraction based on acquisition The data of point, data and user based on extraction, which input, generates node information, is encrypted the node information of generation to obtain 9th encryption message, and the 9th encryption message is broadcasted,
Wherein, the transmitting side marking of the 9th encryption message includes the public key of the 9th node and the signature of the 9th node, the 9th encryption The destination mark of message is the public key of the tenth node.
6. a kind of method for realizing social networks, comprising:
It generates and shows the two dimensional code including in blank template, the public key of the tenth node and signature;
Receive the 9th encryption message of the public key that destination mark is the tenth node;
Verify whether public key and signature included in the transmitting side marking of the 9th encryption message match;
When public key and signatures match included in the transmitting side marking of the 9th encryption message, according to the private key pair of the tenth node 9th encryption message is decrypted to obtain the 9th message.
7. a kind of method for realizing social networks, comprising:
Public key based on each group members is encrypted to group invitation message is entered to obtain corresponding with each group members the Ten encryption message;
Broadcast encrypts message with each group members the corresponding tenth,
Wherein, the transmitting side marking of the tenth encryption message corresponding with each group members include the 11st node public key and The signature of 11st node, the destination mark of the tenth encryption message corresponding with each group members be each group at The public key of member, enters the public key that group invitation message includes the 12nd node as group's node.
8. a kind of method for realizing social networks, comprising:
Receive the 11st encryption message of the public key that destination mark is the 12nd node;
Verify whether public key and signature included in the transmitting side marking of the 11st encryption message match;
When public key and signatures match included in the transmitting side marking of the 11st encryption message, according to the private of the 12nd node The 11st encryption message is decrypted to obtain the 11st message in key;
When the 11st message is received into group invitation message or group's update of basic information request message, based on the 11st encryption Included public key encrypts group's essential information to obtain the 12nd encryption message in the transmitting side marking of message;
Broadcast the 12nd encryption message, wherein the 12nd encryption message transmitting side marking include the 12nd node public key and The signature of 12nd node, the destination mark of the 12nd encryption message are wrapped in the 11st transmitting side marking for encrypting message The public key included,
Wherein, group's essential information includes the public key of each group member node.
9. a kind of method for realizing social networks, comprising:
Receive the tenth encryption message of the public key that destination mark is the 13rd node;
Verify whether public key and signature included in the transmitting side marking of the tenth encryption message match;
When public key and signatures match included in the transmitting side marking of the tenth encryption message, according to the private key of the 13rd node Tenth encryption message is decrypted to obtain the tenth message;
When the tenth message is into group invitation message, agree to that the user into group inputs, and is based on the 12nd node in response to receiving Public key the 11st encryption message is obtained to receiving to be encrypted into group invitation message, and broadcast the 11st encryption message, Wherein, the transmitting side marking of the 11st encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the 11st The destination mark of encryption message is the public key of the 12nd node as group's node included in group invitation message.
10. a kind of system for realizing social networks, including at least two nodes, wherein any at least two node One node executes the method as described in any claim in claims 1 to 9.
CN201811307529.2A 2018-11-05 2018-11-05 Method and system for realizing social network Active CN109302281B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811307529.2A CN109302281B (en) 2018-11-05 2018-11-05 Method and system for realizing social network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811307529.2A CN109302281B (en) 2018-11-05 2018-11-05 Method and system for realizing social network

Publications (2)

Publication Number Publication Date
CN109302281A true CN109302281A (en) 2019-02-01
CN109302281B CN109302281B (en) 2021-12-14

Family

ID=65145115

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811307529.2A Active CN109302281B (en) 2018-11-05 2018-11-05 Method and system for realizing social network

Country Status (1)

Country Link
CN (1) CN109302281B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114827074A (en) * 2021-01-28 2022-07-29 腾讯科技(深圳)有限公司 Social message processing method, device, server, terminal and medium
US11463244B2 (en) * 2019-01-10 2022-10-04 Samsung Electronics Co., Ltd. Electronic apparatus, method of controlling the same, and network system thereof

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1665184A (en) * 2004-03-05 2005-09-07 微软公司 Using a flexible rights template to obtain a signed rights label (SRL) for digital content
US20150113283A1 (en) * 2012-06-23 2015-04-23 Pomian & Corella Protecting credentials against physical capture of a computing device
CN105850168A (en) * 2013-12-31 2016-08-10 华为终端有限公司 Secure connection method for network device, and related device and system
CN106529973A (en) * 2016-11-02 2017-03-22 深圳市幻实科技有限公司 Anti-counterfeiting method and apparatus based on augmented reality
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1665184A (en) * 2004-03-05 2005-09-07 微软公司 Using a flexible rights template to obtain a signed rights label (SRL) for digital content
US20150113283A1 (en) * 2012-06-23 2015-04-23 Pomian & Corella Protecting credentials against physical capture of a computing device
CN105850168A (en) * 2013-12-31 2016-08-10 华为终端有限公司 Secure connection method for network device, and related device and system
CN106529973A (en) * 2016-11-02 2017-03-22 深圳市幻实科技有限公司 Anti-counterfeiting method and apparatus based on augmented reality
CN107103252A (en) * 2017-04-27 2017-08-29 电子科技大学 Data access control method based on block chain
CN108009825A (en) * 2017-11-29 2018-05-08 江苏安凰领御科技有限公司 A kind of identity management system and method based on block chain technology

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11463244B2 (en) * 2019-01-10 2022-10-04 Samsung Electronics Co., Ltd. Electronic apparatus, method of controlling the same, and network system thereof
CN114827074A (en) * 2021-01-28 2022-07-29 腾讯科技(深圳)有限公司 Social message processing method, device, server, terminal and medium
CN114827074B (en) * 2021-01-28 2024-04-09 腾讯科技(深圳)有限公司 Social message processing method, device, server, terminal and medium

Also Published As

Publication number Publication date
CN109302281B (en) 2021-12-14

Similar Documents

Publication Publication Date Title
Huang et al. The application of the blockchain technology in voting systems: A review
He et al. Certificateless public key authenticated encryption with keyword search for industrial internet of things
WO2019227457A1 (en) Method and apparatus for decentralized trust evaluation in a distributed network
CN113256290B (en) Decentralized encrypted communication and transaction system
CN105959307A (en) Existence certification and authentication service method and system based on block chain technology
Zhang et al. Message in a sealed bottle: Privacy preserving friending in mobile social networks
US11177955B2 (en) Device-to-device messaging protocol
CN104079574A (en) User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment
US20120191973A1 (en) Online presence of users
CN107667515A (en) Synchronization group and validation group in relevant device
US11658963B2 (en) Cooperative communication validation
KR20180105196A (en) Service Implementation Methods and Devices
US20230059173A1 (en) Password concatenation for secure command execution in a secure network device
CN103685255A (en) File encryption method based on two-dimension code scanning
CN109302281A (en) Realize the method and system of social networks
CN115396115A (en) Block chain data privacy protection method, device, equipment and readable storage medium
Buccafurri et al. A protocol for anonymous short communications in social networks and its application to proximity-based services
Ahmed et al. A secured peer-to-peer messaging system based on blockchain
Vashishtha et al. Key Spreading and Mutual Validation schemes for Privacy Protection in Fog Computing Environment using MNSOR Protocols.
CN106254341A (en) Data fingerprint extracting method and system for centralized electronic data safety system
Dimitriou et al. “I wasn’t there”—Deniable, privacy-aware scheme for decentralized Location-based Services
Akhtar et al. IoT-chain: security of things for pervasive, sustainable and efficient computing using blockchain
Zhang et al. Secure and accountable data access control against malicious behavior in smart grids
Rivero‐García et al. Using blockchain in the follow‐up of emergency situations related to events
Xu et al. A review of the technology and application of deposit and traceability based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant