CN109302281A - Realize the method and system of social networks - Google Patents
Realize the method and system of social networks Download PDFInfo
- Publication number
- CN109302281A CN109302281A CN201811307529.2A CN201811307529A CN109302281A CN 109302281 A CN109302281 A CN 109302281A CN 201811307529 A CN201811307529 A CN 201811307529A CN 109302281 A CN109302281 A CN 109302281A
- Authority
- CN
- China
- Prior art keywords
- message
- node
- public key
- encryption
- encryption message
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0861—Generation of secret information including derivation or calculation of cryptographic keys or passwords
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0894—Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
Abstract
Provide a kind of method and system for realizing social networks.The method can include: the private key based on the first node generates the signature of the first node;Public key based on the second node encrypts first message to obtain the first encryption message;Broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the public key of the first node and the signature of the first node, and the destination mark of the first encryption message is the public key of the second node.According to the method for the present invention and system, information transmission security can be improved and reduce privacy leakage.
Description
Technical field
All things considered of the present invention is related to social networks technology, more particularly, is related to a kind of method for realizing social networks
And system.
Background technique
The high speed development of internet and various internet the relevant technologies, brings convenience to people's lives, and still, also produces
Give birth to following new problem:
1, privacy leakage problem.Personal information security is paid close attention to by the whole world.Social software is while offering convenience
Also the hidden danger of privacy leakage is brought.In order to avoid privacy leakage, some people is even abandoned using social software.
2, information authenticity and integrity problem.The development of internet improves the spread speed of information, while also making not
Meet actual information, fuzzy message, even flame largely to be transmitted, seriously affects normal life.People are by a
The human-subject test of people screens information, and judgement is limited, so that the space that spoofing has existence and grows.In addition, false
Range is wider, life cycle is longer for message spreading in internet.
3, information problem at random.Social networks is the important channel for obtaining daily information.However, in existing social networks
The information spread is not classified effectively, and the acquisition modes of information have contingency and limitation, and the information needed cannot be timely
Effectively obtain.
4, the unsound problem of credit rating system.Sincerity is the important foundation of exchange, and existing social networks has not been set up
The information evaluation mechanism of effect.
5, the unsound problem of personal information management mechanism.Individual is needing and mechanism (bank, post office, government department, business
Mechanism etc.) when establishing connection, the means usually using the personal information such as name, address, phone, mailbox as identification individual.By
Know in the easy third party by other than mechanism and individual of personal closely related information, and different institutions are identifying
The means difference that uses when personal is to be managed collectively personal information, therefore, lead to leakage of personal information, organization management at
The problems such as this is high.
6, with the cumbersome problem of mechanism interactive operation.When individual interacts with different institutions, need to be submitted repeatedly including individual
The list of information.Not only bank queuing phenomenon is obvious, but also personal cumbersome.
Summary of the invention
The purpose of the present invention is to provide a kind of social networks of decentralization, which includes two or more
By the information unit (node) of individual autonomy management, to improve information exchange and the efficiency of management, security and reliability.The present invention
Basic thought include: that the data such as personal essential information, social networks belong to personal property as physical item, by owning
Person's full powers management.
In the present invention, decentralization means to weaken server capability or is detached from server admin, information unit and the external world
It is communicated between (another) information unit;It can ensure safety by asymmetric encryption techniques;Between information unit can direct communication with
It improves efficiency;The transmission (circulation) of resource information and reputation information can be achieved;It can be protected by predefining the corresponding identity of public key
Demonstrate,prove the reliability in information source.
The exemplary embodiment of the disclosure is intended to overcome at least part defect existing in the prior art, and at least provides
Following beneficial effect.
According to an exemplary embodiment of the present disclosure, a kind of method for realizing social networks is provided, which comprises base
The signature of the first node is generated in the private key of the first node;Public key based on the second node encrypts to obtain first message
First encryption message;Broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the public key of the first node
Destination mark with the signature of the first node, the first encryption message is the public key of the second node.
Optionally, the method further include: receive the second encryption message;Judge the transmitting side marking of the second encryption message
Whether include sign and judge the second encryption message destination mark whether be the first node public key, when second encrypt message
Transmitting side marking do not include signature and the second encryption message destination mark when not being the public key of the first node, forwarding second
Encrypt message;Or whether included public key and signature matches and judges in the transmitting side marking of verifying the second encryption message
Second encryption message destination mark whether be the first node public key, when the verifying the result is that matching and second plus
When the destination mark of close message is not the public key of the first node, forwarding the second encryption message.
Optionally, the method also includes: forwarding second encrypt message before, judge second encrypt message there are when
Between whether reach time limit of the second encryption message, when it is described do not reach described there are the time when prescribe a time limit, forwarding the second encryption message.
Optionally, the method also includes: obtain the public key of the second node, and the public key of the second node be stored in first
In the relation list of node.
Optionally, first message includes the message being read for indicating message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks, the method packet are provided
It includes: receiving the first encryption message of the public key that destination mark is the second node;The transmitting side marking of verifying the first encryption message
In included public key and signature whether match;When public key and signature included in the transmitting side marking of the first encryption message
User's input of the first encryption message is read in timing in response to receiving, according to the private key of the second node to the first encryption message
It is decrypted to obtain first message.
Optionally, the method also includes: display with first encryption message transmitting side marking in included by public key phase
Associated information.
Optionally, the method also includes: receive second encryption message;Judging the transmitting side marking of the second encryption message is
It is no include sign and judge the second encryption message destination mark whether be the second node public key, when the second encryption message
When transmitting side marking does not include signature and the second destination mark for encrypting message is not the public key of the second node, forwarding second adds
Close message;Or whether included public key and signature matches and judges the in the transmitting side marking of verifying the second encryption message
Two encryption message destination mark whether be the second node public key, when the verifying the result is that matching and second encryption
When the destination mark of message is not the public key of the second node, forwarding the second encryption message.
Optionally, the method also includes: forwarding second encrypt message before, judge second encrypt message there are when
Between whether reach time limit of the second encryption message, when it is described be not up to described there are the time when prescribe a time limit, forwarding the second encryption message.
Optionally, the method also includes: obtain the public key of the first node, and the public key of the first node be stored in second
In the relation list of node.
Optionally, first message includes the message being read for indicating message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate day
Normal dynamic message;Receive the third encryption message for the public key that destination mark is third node;Verify the hair of third encryption message
Whether included public key and signature match in the side's of sending mark;When public key included in the transmitting side marking of third encryption message
When with signatures match, third encryption message is decrypted to obtain third message in the private key based on third node;When third disappears
When breath is daily dynamic acquisition request message, daily dynamic message is obtained, institute in the transmitting side marking based on third encryption message
Including public key to the daily dynamic message of acquisition encrypted with obtain the 4th encryption message, and broadcast the 4th encryption disappear
Breath, wherein the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, and the 4th encryption disappears
The destination mark of breath is public key included in the transmitting side marking of third encryption message.
Optionally, the method also includes: when generating daily dynamic message, specify the permission group of daily dynamic message;
Wherein, the step of obtaining daily dynamic message comprises determining that public key institute included in the transmitting side marking of third encryption message
Permission group, and obtain the corresponding daily dynamic message of permission group with determination;Or the sender when third encryption message
When included public key is in the relation list of third node in mark, determines and wrapped in the transmitting side marking of third encryption message
Permission group where the public key included, and obtain daily dynamic message corresponding with the permission group determined.
Optionally, the step of obtaining daily dynamic message include: according in following item at least one of from the daily of generation
Dynamic message obtains corresponding daily dynamic message: included time and generation day in daily dynamic acquisition request message
The time of normal dynamic message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on the
The public key of three nodes encrypts daily dynamic acquisition request message to obtain third encryption message;Broadcast third encryption disappears
Breath, wherein the transmitting side marking of third encryption message includes the public key of the 4th node and the signature of the 4th node, and third encryption disappears
The destination mark of breath is the public key of third node;Receive the 4th encryption message of the public key that destination mark is the 4th node;
Verify whether public key and signature included in the transmitting side marking of the 4th encryption message match;When the transmission of the 4th encryption message
Included public key and when signatures match in side's mark, the 4th encryption message is decrypted to obtain in the private key based on the 4th node
Obtain the 4th message.
According to the another exemplary embodiment of the disclosure, provide a kind of method for realizing social networks, comprising: obtain to
The template filled in;The template for obtaining and filling in is inputted based on user;Public key based on the 6th node is to including the of the template filled in
Five message are encrypted to obtain the 5th encryption message;Broadcast the 5th encryption message, wherein sender's mark of the 5th encryption message
Knowing includes the public key of the 5th node and the signature of the 5th node, and the destination mark of the 5th encryption message is the public affairs of the 6th node
Key.
Optionally, the 5th message further includes the supplemental messages of user's input.
Optionally, the step of obtaining in blank template includes: to obtain in blank template from Resource Server.
Optionally, before executing the step of obtaining the 5th encryption message, the method also includes: receive destination mark
It is the 6th encryption message of the public key of the 5th node;Verify public key and label included in the transmitting side marking of the 6th encryption message
Whether name matches;When public key and signatures match included in the transmitting side marking of the 6th encryption message, it is based on the 5th node
Private key to the 6th encryption message be decrypted to obtain the 6th message;When the 6th message is resource acquisition request message, hold
Row obtains the step of the 5th encryption message of the step of the 5th encryption message and broadcast.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh
Ground mark be the 6th node public key the 5th encryption message;Included by verifying in the transmitting side marking of the 5th encryption message
Whether public key and signature match;When public key and signatures match included in the transmitting side marking of the 5th encryption message, it is based on
The 5th encryption message is decrypted to obtain the 5th message in the private key of 6th node.
Optionally, before receiving the 5th encryption message, the method also includes: the public key based on the 5th node is to resource
Acquisition request message is encrypted to obtain the 6th encryption message;Broadcast the 6th encryption message, wherein the hair of the 6th encryption message
The side's of sending mark includes the public key of the 6th node and the signature of the 6th node, and the destination mark of the 6th encryption message is the 5th node
Public key.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate needle
To the evaluation information of special object;Receive the 7th encryption message of the public key that destination mark is the 7th node;The 7th is verified to add
Whether included public key and signature match in the transmitting side marking of close message;When institute in the transmitting side marking of the 7th encryption message
Including public key and when signatures match, the 7th encryption message is decrypted to obtain the 7th and disappear in the private key based on the 7th node
Breath;When the 7th message is evaluation information acquisition request message, evaluation information is obtained, sender's mark based on the 7th encryption message
Included public key encrypts the evaluation information of acquisition to obtain the 8th encryption message in knowledge, and broadcasts the 8th encryption and disappear
Breath, wherein the transmitting side marking of the 8th encryption message includes the public key of the 7th node and the signature of the 7th node, and the 8th encryption disappears
The destination mark of breath is public key included in the transmitting side marking of the 7th encryption message.
Optionally, the method also includes: when generating evaluation information, the permission group of specified evaluation information;
Wherein, the step of obtaining evaluation information comprises determining that public affairs included in the transmitting side marking of the 7th encryption message
Permission group where key, and obtain evaluation information corresponding with the permission group determined;Or the sender when the 7th encryption message
When included public key is in the relation list of the 7th node in mark, determines and wrapped in the transmitting side marking of the 7th encryption message
Permission group where the public key included, and obtain evaluation information corresponding with the permission group determined.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on the
The public key of seven nodes encrypts evaluation information acquisition request message to obtain the 7th encryption message;The 7th encryption is broadcasted to disappear
Breath, wherein the transmitting side marking of the 7th encryption message includes the public key of the 8th node and the signature of the 8th node, and the 7th encryption disappears
The destination mark of breath is the public key of the 7th node;Receive the 8th encryption message of the public key that destination mark is the 8th node;
Verify whether public key and signature included in the transmitting side marking of the 8th encryption message match;When the transmission of the 8th encryption message
Included public key and when signatures match in side's mark, the 8th encryption message is decrypted to obtain in the private key based on the 8th node
Obtain the 8th message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: from the tenth
Node obtains the public key and signature of in blank template and the tenth node;Verify the tenth node public key and signature whether
Match and whether the public key of the tenth node is effective;When the public key and signatures match of the tenth node and the public key of the tenth node is effective
When, the data of the 9th node of template extraction based on acquisition, data and user based on extraction, which input, generates node information, to production
Raw node information is encrypted to obtain the 9th encryption message, and broadcasts the 9th encryption message, wherein the 9th encryption message
Transmitting side marking include the public key of the 9th node and the signature of the 9th node, the destination mark of the 9th encryption message is the tenth
The public key of node.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: generate simultaneously
Display includes the two dimensional code of in blank template, the public key of the tenth node and signature;Receiving destination mark is the tenth node
9th encryption message of public key;Verify whether public key and signature included in the transmitting side marking of the 9th encryption message match;
When public key and signatures match included in the transmitting side marking of the 9th encryption message, according to the private key of the tenth node to the 9th
Encryption message is decrypted to obtain the 9th message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: based on every
The public key of a group members is encrypted to group invitation message is entered to obtain and encrypt message with each group members the corresponding tenth;
Broadcast encrypts message with each group members the corresponding tenth, wherein encrypts and disappears with each group members the corresponding tenth
The transmitting side marking of breath includes the public key of the 11st node and the signature of the 11st node, and corresponding with each group members
The destination mark of ten encryption message is the public key of each group members, and entering group invitation message includes the tenth as group's node
The public key of two nodes.
Optionally, the method also includes: generate as group's node the 12nd node public key and private key.
Optionally, message is managed to group the method also includes: the public key based on the 12nd node to be encrypted to obtain
11st encryption message, and broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the tenth
The destination mark of the signature of the public key of one node and the 11st node, the 11st encryption message is the public key of the 12nd node,
Wherein, it includes at least one in following item that the group, which manages message: group members kick out of message, group's essential information changes message,
The publication of group's bulletin or update message, group's title editor message and group's rules customization message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh
Ground mark be the 12nd node public key the 11st encryption message;Verify institute in the transmitting side marking of the 11st encryption message
Including public key and signature whether match;When public key and signatures match included in the transmitting side marking of the 11st encryption message
When, the 11st encryption message is decrypted to obtain the 11st message according to the private key of the 12nd node;When the 11st message
It is transmitting side marking when receiving into group invitation message or group's update of basic information request message, based on the 11st encryption message
In included public key group's essential information is encrypted to obtain the 12nd encryption message;The 12nd encryption message is broadcasted,
Wherein, the transmitting side marking of the 12nd encryption message includes the public key of the 12nd node and the signature of the 12nd node, and the 12nd
The destination mark of encryption message is public key included in the transmitting side marking of the 11st encryption message, wherein the group
Essential information includes the public key of each group member node.
Optionally, the method also includes: when the 11st message is to move back group message, or when the 11st message is group's pipe
When included public key belongs to the public key of administrator's node in the transmitting side marking of reason message and the 11st encryption message, institute is updated
State group's essential information, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, group's base
This information changes message, group announces publication or update message, group's title editor message and group's rules customization message.
Optionally, the method also includes: receive destination mark be the 12nd node public key the 13rd encryption disappear
Breath;Verify whether public key and signature included in the transmitting side marking of the 13rd encryption message match;When the 13rd encryption disappears
Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 12nd node to the 13rd encryption message
It is decrypted to obtain the 13rd message;When the 13rd message is message in group, the 13rd encryption message of storage.
Optionally, the method also includes: receive destination mark be the 12nd node public key the 14th encryption disappear
Breath;Verify whether public key and signature included in the transmitting side marking of the 14th encryption message match;When the 14th encryption disappears
Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 12nd node to the 14th encryption message
It is decrypted to obtain the 14th message;When the 14th message is message acquisition request message in group, extracts and broadcast the tenth
Three encryption message, wherein the destination mark of the 13rd encryption message is changed to the transmitting side marking of the 14th encryption message
In included public key.
Optionally, the step of extracting the 13rd encryption message include: according in group in message acquisition request message it is included
Time come extract the 13rd encryption message.
According to the another exemplary embodiment of the disclosure, a kind of method for realizing social networks is provided, comprising: receive mesh
Ground mark be the 13rd node public key the tenth encryption message;It verifies included in the transmitting side marking of the tenth encryption message
Public key and signature whether match;When public key and signatures match included in the transmitting side marking of the tenth encryption message, root
The tenth encryption message is decrypted to obtain the tenth message according to the private key of the 13rd node;When the tenth message is disappeared into group invitation
When breath, in response to receive agree into group user input, the public key based on the 12nd node to receive into group invitation message into
Row encryption broadcasts the 11st encryption message to obtain the 11st encryption message, wherein the sender of the 11st encryption message
Mark includes the public key of the 13rd node and the signature of the 13rd node, and the destination mark of the 11st encryption message is invited into group
The public key of the 12nd node as group's node that please be included in message.
Optionally, the method also includes: receive destination mark be the 13rd node public key the 12nd encryption disappear
Breath;Verify whether public key and signature included in the transmitting side marking of the 12nd encryption message match;When the 12nd encryption disappears
Included public key and when signatures match in the transmitting side marking of breath, according to the private key of the 13rd node to the 12nd encryption message
It is decrypted to obtain the 12nd message;When the 12nd message is group's essential information, storage cluster essential information, wherein
Group's essential information includes the public key of each group member node.
Optionally, the method also includes: the cryptographic Hash of the public key based on collective group member's node to message in group into
Row encryption broadcasts the 13rd encryption message to obtain the 13rd encryption message, wherein the sender of the 13rd encryption message
Mark includes the public key of the 13rd node and the signature of the 13rd node, and the destination mark of the 13rd encryption message is group node
Public key.
Optionally, the method also includes: the public key based on the 12nd node carries out message acquisition request message in group
Encryption is to obtain the 14th encryption message, the 14th encryption message of broadcast, wherein the transmitting side marking packet of the 14th encryption message
The public key of the 13rd node and the signature of the 13rd node are included, the destination mark of the 14th encryption message is the public affairs of group node
Key;Receive the 13rd encryption message of the public key that destination mark is the 13rd node;Verify the transmission of the 13rd encryption message
Whether included public key and signature match in side's mark;When public key included in the transmitting side marking of the 13rd encryption message
When with signatures match, the 13rd encryption message is decrypted to obtain the 13rd message according to the private key of the 13rd node;When
It when 13rd message is message in group, is inputted in response to the user for reading message in group, shows message in group.
Optionally, the method also includes: the public keys based on the 13rd node to moving back group message or group's essential information more
New request message is encrypted to obtain the 11st encryption message, and broadcasts the 11st encryption message, wherein the 11st encryption
The transmitting side marking of message includes the public key of the 13rd node and the signature of the 13rd node, the destination of the 11st encryption message
Mark is the public key of group node.
Optionally, in the group message include group's essential information renewal time, the method also includes: will be local
The renewal time of group's essential information is compared with the renewal time of included group's essential information in message in the group;Root
Group's update of basic information request message is obtained according to the comparison result.
According to the another exemplary embodiment of the disclosure, a kind of computer readable storage medium of store instruction is provided,
Wherein, when described instruction is run by least one computing device, at least one described computing device is promoted to execute as described above
Method.
According to the another exemplary embodiment of the disclosure, a kind of system for realizing social networks, including at least two are provided
A node, wherein method as described above can be performed in any one node at least two node.
Method and system of the invention at least can provide it is following the utility model has the advantages that
1, information security is improved.Under several scenes, information is transmitted using asymmetric encryption mode, information security obtains
Raising is arrived.The scene includes: circle of friends information (daily dynamic message) transmission, general information transmission, sensitive information (individual
Privacy information) transmission, resource information transfer, evaluation information transmission, the transmission of group's relevant information.
2, information authenticity and reliability are improved.It can know identity corresponding to public key, in advance so as to disappear by encryption
The identity for the public key accurate judgement sender for including in the transmitting side marking of breath, to guarantee the reliable of information source or can lead to
Cross authenticity and reliability that information source judges information.
3, effectively classify to information.The information of needs can be targetedly obtained, for example, with daily dynamic, money
The related information such as source, evaluation can also automatically extract information based on template.In this case, can targetedly obtain needs
The information wanted, improves information acquisition efficiency, and effective mode classification can also be convenient for information management.
4, credit rating system is improved.Evaluation is established for node or not a node, be easy to distinguish appraiser and is evaluated the person
Part, thus the process of Speed-up Establishment credit rating system.
5, personal information management mechanism is improved.Individual is needing and mechanism (bank, post office, government department, business place
Deng) establish connection when, the personal information such as information, such as name, address, phone, mailbox that template rapidly extracting can be used to need
And mechanism is submitted to, individual directly interacts with mechanism, without the third party, and information security can be improved, when reducing third party's participation
The information management cost of waste.
6, the quick execution of repetitive operation when convenient for being interacted with mechanism.When individual interacts with different institutions, pass through template
It extracts information and is submitted directly to bank.Treatment effeciency is improved, the queuing phenomena of the mechanisms such as bank can be reduced, reduces the numerous of individual
Trivial operation.
Part in following description is illustrated into the other aspect and/or advantage of disclosure general plotting, there are also one
Point will be apparent by description, or can implementation Jing Guo disclosure general plotting and learn.
Detailed description of the invention
By below with reference to be exemplarily illustrated embodiment attached drawing carry out description, disclosure exemplary embodiment it is upper
Stating will become apparent with other purposes and feature, in which:
Fig. 1 shows the flow chart of the method for the realization social networks of the first exemplary embodiment according to the present invention;
Fig. 2 shows the flow charts of the method for the realization social networks of the second exemplary embodiment according to the present invention;
Fig. 3 shows the flow chart of the method for the realization social networks of third exemplary embodiment according to the present invention;
Fig. 4 shows the flow chart of the method for the realization social networks of the 4th exemplary embodiment according to the present invention;
Fig. 5 shows the flow chart of the method for the realization social networks of the 5th exemplary embodiment according to the present invention;
Fig. 6 shows the flow chart of the method for the realization social networks of the 6th exemplary embodiment according to the present invention
Fig. 7 shows the flow chart of the method for the realization social networks of the 7th exemplary embodiment according to the present invention;
Fig. 8 shows the flow chart of the method for the realization social networks of the 8th exemplary embodiment according to the present invention;
Fig. 9 shows the flow chart of the method for the realization social networks of the 9th exemplary embodiment according to the present invention;
Figure 10 shows the flow chart of the method for the realization social networks of the tenth exemplary embodiment according to the present invention;
Figure 11 shows the flow chart of the method for the realization social networks of the 11st exemplary embodiment according to the present invention;
Figure 12 shows the flow chart of the method for the realization social networks of the 12nd exemplary embodiment according to the present invention;
Figure 13 to Figure 17 shows the stream of the method for the realization social networks of the 13rd exemplary embodiment according to the present invention
Cheng Tu;
Figure 18 shows the block diagram of the system of the realization social networks of the 14th exemplary embodiment according to the present invention.
Specific embodiment
It reference will now be made in detail embodiment of the disclosure, examples of the embodiments are shown in the accompanying drawings, wherein identical mark
Number identical component is referred to always.It will illustrate the embodiment, by referring to accompanying drawing below to explain the disclosure.
In an exemplary embodiment of the present invention, it can be held by another node using the method or operation that a node executes
Row, for example, the first node execute method or operation can by other than the first node any one or more node hold
Row;It the private key of one node can be used to decrypt using the message of the public key encryption of a node, use one node
Public key can verify that whether the signature of one node effective;Node is also known as node, can be application (for example, answering
With program) or information related with user set.
The method provided in each exemplary embodiment of the invention may each comprise: create node operation and generate with
The operation of the node of creation corresponding public key and private key.
Fig. 1 show the first exemplary embodiment according to the present invention realization social networks method flow chart, first
The method of exemplary embodiment can realize that the first node can be used for carrying out encrypting and transmitting to first message in the first node.
As shown in fig. 1, the method includes the steps S110 to S130.In step S110, the private key based on the first node
Generate the signature of the first node.In step S120, the public key based on the second node encrypts to obtain first first message
Encrypt message.In step S130, broadcast the first encryption message, wherein the transmitting side marking of the first encryption message includes the first knot
The destination mark of the public key of point and the signature of the first node, the first encryption message is the public key of the second node.
As an example, first message is to be sent to the message of the second node from the first node (for example, hello messages, daily
Exchange message etc.).First node is the sender of the first encryption message, and the second node is the destination of the first encryption message.
As an example, the first node and the second node all have respective public key and private key.The two nodes can be by pre-
Other side's hair public key is known in first interaction (for example, scanning the two-dimensional code face-to-face).
As an example, judgement or verification operation can be carried out after receiving encryption message.For example, receiving the second encryption
Message;Whether the transmitting side marking for judging the second encryption message includes signing and judging that the destination mark of the second encryption message is
No is the public key of the first node, when the transmitting side marking of the second encryption message does not include the destination of signature and the second encryption message
When mark is not the public key of the first node, forwarding the second encryption message;Or in the transmitting side marking of verifying the second encryption message
Included public key and signature whether match and judge the second encryption message destination mark whether be the first node public affairs
Key, when the verifying the result is that matching and second encryption message destination mark be not the public key of the first node when, turn
Hair the second encryption message.
As an example, the method may also include that before forwarding second encrypts message, depositing for the second encryption message is judged
The time limit for whether reaching the second encryption message in the time, when it is described do not reach described there are the time when prescribe a time limit, forwarding second encryption disappears
Breath.
As an example, obtaining the public key of the second node, and the relationship that the public key of the second node is stored in the first node is arranged
In table.
As an example, first message includes the message being read for indicating message.
By the present exemplary embodiment, encryption message can be transmitted between two nodes.Using particular public key and private key
It is encrypted or is decrypted, so as to ensure information security;It is whether reliable using signature verification message sender, to guarantee to believe
Reliability, authenticity or the validity of breath;It can be judged by signature or verify or judge the time limit to reject interference message, avoided
Harmful information transmission;The storage of node public key can be carried out, by relation list so as to promptly and accurately know informed source;It can lead to
The message that message has been read is crossed to know message status, consequently facilitating judge message is sent to state.
Fig. 2 shows the second exemplary embodiment according to the present invention realization social networks method flow chart, second
The method of exemplary embodiment can realize that the second node can be used for receiving the first encryption message and be decrypted in the second node.
As shown in Figure 2, which comprises step S210 to step S230.In step S210, receiving destination mark is
First encryption message of the public key of the second node.It is included in step S220, the transmitting side marking of verifying the first encryption message
Public key and signature whether match.In step S230, when public key and label included in the transmitting side marking of the first encryption message
When name matching, user's input of the first encryption message is read in response to receiving, and is encrypted according to the private key of the second node to first
Message is decrypted to obtain first message.
As an example, the method also includes: display and public key included in the transmitting side marking of the first encryption message
Associated information.
As an example, the method also includes: receive the second encryption message;Judge the transmitting side marking of the second encryption message
Whether include sign and judge the second encryption message destination mark whether be the second node public key, when second encrypt message
Transmitting side marking do not include signature and the second encryption message destination mark when not being the public key of the second node, forwarding second
Encrypt message;Or whether included public key and signature matches and judges in the transmitting side marking of verifying the second encryption message
Second encryption message destination mark whether be the second node public key, when the verifying the result is that matching and second plus
When the destination mark of close message is not the public key of the second node, forwarding the second encryption message.
As an example, the method also includes: before forwarding second encrypts message, judge the presence of the second encryption message
Whether the time reaches the time limit of the second encryption message, when it is described be not up to described there are the time when prescribe a time limit, forwarding second encryption disappears
Breath.
As an example, the method also includes: the public key of the first node is obtained, and the public key of the first node is stored in the
In the relation list of two nodes.
As an example, first message includes the message being read for indicating message.
By the present exemplary embodiment, the second node can receive the broadcast of the first node and by addition to the first node and second
First encryption message of the node forwarding except node;Since the first encryption message is added by the public key of the second node
Close, therefore, the second node can be decrypted the first encryption message using the private key of itself;What the second node can also sign
The judgement in the time limit of judgement or verifying or message, to reject unwanted messages;Second node can also be saved by relation list
The public key of node, so as to be compareed with the public key for including from the transmitting side marking of the first encryption message, to determine the
The source of one encryption message.First node and the second node can exchange public key (for example, by mutual scanning phase other side two dimensional code in advance
To know other side's public key) and the public key received is stored in relation list, relation list can storage of public keys, public affairs can also be stored
The corresponding contact identity of key (for example, friend, household, company personnel, classmate, leader etc.).
Fig. 3 shows the flow chart of the method for the realization social networks of third exemplary embodiment according to the present invention, third
The method of exemplary embodiment can realize that third node can be used for generating daily dynamic message and according to request in third node
(for example, request of the 4th node) sends the daily dynamic message generated.
As shown in Figure 3, the method can include: step S310 to step S350.In step S310, daily dynamic is generated
Message.In step S320, the third encryption message for the public key that destination mark is third node is received.In step S330, verifying
Third encrypt public key and signature (for example, public key and signature of the 4th node) included in the transmitting side marking of message whether
Match.Third knot is based on when public key and signatures match included in the transmitting side marking of third encryption message in step S340
Third encryption message is decrypted to obtain third message in the private key of point.In step S350, when third message is daily dynamic
When acquisition request message, daily dynamic message is obtained, included public key (example in the transmitting side marking based on third encryption message
Such as, the public key of the 4th node) the daily dynamic message of acquisition is encrypted to obtain the 4th encryption message, and broadcast the 4th
Encrypting message, wherein the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, and the 4th
The destination mark of encryption message is public key included in the transmitting side marking of third encryption message (for example, the 4th node
Public key).
The daily dynamic of the node of daily dynamic message is requested to disappear as an example, can determine and be issued to based on permission group
Breath.For example, the method can include: when generating daily dynamic message, specify the permission group of daily dynamic message;Wherein, it obtains
The step of taking daily dynamic message comprises determining that the permission where public key included in the transmitting side marking of third encryption message
Group, and obtain daily dynamic message corresponding with the permission group determined;Or when institute in the transmitting side marking of third encryption message
Including public key in the relation list of third node when, determine public key included in the transmitting side marking of third encryption message
The permission group at place, and obtain daily dynamic message corresponding with the permission group determined.
As an example, permission group can indicate the permission of node (for example, public key of node), it may be assumed which day node can be seen
Normal dynamic message.
The daily dynamic of the node of daily dynamic message is requested to disappear as an example, can also determine to be issued to based on the time
Breath.For example, the step of obtaining daily dynamic message includes: the daily dynamic message according at least one in following item from generation
Obtain corresponding daily dynamic message: included time and the daily dynamic of generation disappear in daily dynamic acquisition request message
The time of breath.For example, it can will be wrapped after the time for generating daily dynamic message and in daily dynamic acquisition request message
Daily dynamic message within the time range included is sent to the 4th node.
In the present example embodiment, third message can be daily dynamic acquisition request message, and the 4th message can be
The daily dynamic message of request;Third node receives the daily dynamic acquisition request of the 4th node, and by corresponding daily dynamic
Message is sent to the 4th node.
According to the present exemplary embodiment, daily dynamic message can be transmitted by encryption message, ensure that information security;It is daily
Dynamic message is based on request and is sent, rather than active push, effectively limits the spread scope of daily dynamic message, ensure that
Individual privacy;Daily dynamic message can be also limited by permission group knows range, convenient for the management of daily dynamic message.
Fig. 4 show the 4th exemplary embodiment according to the present invention realization social networks method flow chart, the 4th
The method of exemplary embodiment can realize that the 4th node can be used for requesting daily dynamic message (for example, to third in the 4th node
Node requests daily dynamic message).
As shown in Figure 4, the method can include: step S410 to step S450.In step S410, it is based on third node
Public key daily dynamic acquisition request message is encrypted with obtain third encryption message.In step S420, broadcasts third and add
Close message, wherein the transmitting side marking that third encrypts message includes the public key of the 4th node and the signature of the 4th node, and third adds
The destination mark of close message is the public key of third node.In step S430, the public key that destination mark is the 4th node is received
The 4th encryption message.Included public key and signature (example in step S440, the transmitting side marking of the 4th encryption message of verifying
Such as, the public key and signature of third node) whether match.In step S450, wrapped when in the transmitting side marking of the 4th encryption message
When the public key and signatures match that include, the 4th encryption message is decrypted to obtain the 4th message in the private key based on the 4th node.
Fig. 5 show the 5th exemplary embodiment according to the present invention realization social networks method flow chart, the 5th
The method of exemplary embodiment can realize that the 5th node can be used for (for example, to the 6th node) and send resource letter in the 5th node
Breath (for example, job hunting information, search notice etc.).
As shown in Figure 5, the method includes the steps S510 to step S540.In step S510, in blank mould is obtained
Plate.In step S520, the template for obtaining and filling in is inputted based on user.In step S530, the public key based on the 6th node is to including
5th message of the template filled in is encrypted to obtain the 5th encryption message.In step S540, broadcast the 5th encrypts message,
In, the transmitting side marking of the 5th encryption message includes the public key of the 5th node and the signature of the 5th node, and the 5th encrypts message
Destination mark is the public key of the 6th node.Here, the 5th node actively can send message (for example, resource disappears to the 6th node
Breath), the 6th node receives the message that the 5th node is sent, and the 5th message can be resource information.
As an example, the 5th message further includes the supplemental messages of user's input, to supplement the template filled in.
As an example, the step of obtaining in blank template includes: to obtain in blank template from Resource Server.Resource
Server can be public server, which can store various templates.Template can be including multiple items of information.It changes
Yan Zhi, template can be with multiple tables to fill message item.
As an example, the 5th encryption message can be sent based on request.For example, the method also includes: step S521: reception
Destination mark is the 6th encryption message of the public key of the 5th node;Step S522: sender's mark of the 6th encryption message of verifying
Whether included public key and signature match in knowledge;Step S523: when included in the transmitting side marking of the 6th encryption message
When public key and signatures match, the 6th encryption message is decrypted to obtain the 6th message in the private key based on the 5th node;When
When six message are resource acquisition request messages, the step of the 5th encryption message of the step of obtaining the 5th encryption message and broadcast is executed
Suddenly.Here, the 6th node sends to the 5th node and requests, and therefore, the 6th message can be the resource acquisition from the 6th node
Request message.
According to the present exemplary embodiment, can by the format of template-setup message to be transmitted (for example, the 5th message), from
And convenient for the quick management formed with information (resource information) of message.
Fig. 6 show the 6th exemplary embodiment according to the present invention realization social networks method flow chart, the 6th
The method of exemplary embodiment can realize that the 6th node can be used for receiving (for example, the 5th node) and send information in the 6th node
(for example, job hunting information, search notice etc.), it may also be used for (for example, to the 5th node) sends request, to request resource information.
As shown in Figure 6, the method may include step S610 to step S630.In step S610, purpose terrestrial reference is received
Knowledge is the 5th encryption message of the public key of the 6th node.The institute in step S620, the transmitting side marking of the 5th encryption message of verifying
Including public key and signature whether match.In step S630, when public key included in the transmitting side marking of the 5th encryption message
When with signatures match, the 5th encryption message is decrypted to obtain the 5th message in the private key based on the 6th node.
As an example, the transmittable request of the 6th node to the 5th node (for example, send out before receiving the 5th encryption message
Send resource acquisition request message).In this case, the method can include: the public key based on the 5th node is to resource acquisition
Request message is encrypted to obtain the 6th encryption message;Broadcast the 6th encryption message, wherein the sender of the 6th encryption message
Mark includes the public key of the 6th node and the signature of the 6th node, and the destination mark of the 6th encryption message is the public affairs of the 5th node
Key.
Fig. 7 show the 7th exemplary embodiment according to the present invention realization social networks method flow chart, the 7th
The method of exemplary embodiment can realize that the 7th node can be used for passively sending evaluation information based on request in the 7th node
(for example, good, bad, general, degrees of comparison etc.).
As shown in Figure 7, the method may include step S710 to step S750.In step S710, generate for specific
The evaluation information of object.In step S720, the 7th encryption message of the public key that destination mark is the 7th node is received.In step
S730, verifying the 7th encrypt whether public key and signature included in the transmitting side marking of message match.In step S740, when
Included public key and when signatures match in the transmitting side marking of seven encryption message, the private key based on the 7th node is encrypted to the 7th
Message is decrypted to obtain the 7th message.In step S750, when the 7th message is evaluation information acquisition request message, obtain
Evaluation information, in the transmitting side marking based on the 7th encryption message included public key to the evaluation information of acquisition encrypted with
The 8th encryption message is obtained, and broadcasts the 8th encryption message, wherein the transmitting side marking of the 8th encryption message includes the 7th knot
The public key of point and the signature of the 7th node, the destination mark of the 8th encryption message are in the transmitting side marking of the 7th encryption message
Included public key.
As an example, the 7th node receives the 7th message (for example, evaluation information acquisition request) from the 8th node, and will comment
Valence information (for example, the 8th message) is sent to the 8th node.
As an example, the method further include: when generating evaluation information, the permission group of specified evaluation information;Wherein,
The step of obtaining evaluation information comprises determining that the permission where public key included in the transmitting side marking of the 7th encryption message
Group, and obtain evaluation information corresponding with the permission group determined;Or when included in the transmitting side marking of the 7th encryption message
Public key in the relation list of the 7th node when, where determining public key included in the transmitting side marking of the 7th encryption message
Permission group, and obtain the corresponding evaluation information of permission group with determination.
In the present example embodiment, evaluation information can passively be transmitted, due to knowing other side between node mutually
Identity (is known) by exchanging public key, therefore the reliability of evaluation information and authenticity are high.
Fig. 8 show the 8th exemplary embodiment according to the present invention realization social networks method flow chart, the 8th
The method of exemplary embodiment can realize that the 8th node can be used for (for example, to the 7th node) request evaluation letter in the 8th node
Breath.
As shown in Figure 8, the method may include step S810 to step S850.In step S810, it is based on the 7th node
Public key to evaluation information acquisition request message encrypted with obtain the 7th encryption message.In step S820, broadcast the 7th adds
Close message, wherein the transmitting side marking of the 7th encryption message includes the public key of the 8th node and the signature of the 8th node, and the 7th adds
The destination mark of close message is the public key of the 7th node.In step S830, the public key that destination mark is the 8th node is received
The 8th encryption message.Included public key and signature are in step S840, the transmitting side marking of the 8th encryption message of verifying
No matching.In step S850, when public key and signatures match included in the transmitting side marking of the 8th encryption message, based on the
The 8th encryption message is decrypted to obtain the 8th message in the private key of eight nodes.
Here, the step of step S810 and step S820 is for sending the request for obtaining evaluation information, step
The step of S830 to step S850 is for receiving evaluation information in response to request.
Fig. 9 show the 9th exemplary embodiment according to the present invention realization social networks method flow chart, the 9th
The method of exemplary embodiment can realize that the 9th node can be used for and as mechanism (bank, post office, portion of government in the 9th node
Door, business place etc.) the tenth node interaction.
As shown in Figure 9, the method can include: step S910 to step S930.In step S910, obtained from the tenth node
The public key and signature for taking in blank template and the tenth node by modes such as the two dimensional codes of sweep mechanism (for example, can be obtained
It takes).In step S920, verifies the public key of the tenth node and whether signature matches and whether the public key of the tenth node is effective.?
Step S930, when the public key of the public key of the tenth node and signatures match and the tenth node is effective, the template extraction based on acquisition
The data of 9th node, data and user based on extraction, which input, generates node information, and the public key based on the tenth node is to generation
Node information encrypted to obtain the 9th encryption message, and broadcast the 9th encryption message, wherein the 9th encryption message
Transmitting side marking includes the public key of the 9th node and the signature of the 9th node, and the destination mark of the 9th encryption message is the tenth knot
The public key of point.
As an example, user's input may include input for the data of extraction to be selected or confirmed and/or be used for
The input of supplemental information.
As an example, whether the public key that the tenth node can be verified by public server is effective.
By the present exemplary embodiment, can judge to determine the reliable of node with public key Effective judgement by signatures match
Property, so that the information as the 9th personal node be effectively ensured (for example, telephone number, name, identification card number, Bank Account Number
Deng) safety.
Figure 10 show the tenth exemplary embodiment according to the present invention realization social networks method flow chart, the tenth
The method of exemplary embodiment can realize that the tenth node can be used as mechanism (bank, post office, government department, business in the tenth node
Place etc.) and information can be obtained from as the 9th personal node.
As shown in Figure 10, the method may include step S1010 to step S1040.In step S1010, generates and show
Show the two dimensional code including in blank template, the public key of the tenth node and signature.In step S1020, receiving destination mark is
9th encryption message of the public key of the tenth node.It is included in step S1030, the transmitting side marking of the 9th encryption message of verifying
Public key and signature whether match.In step S1040, when public key and label included in the transmitting side marking of the 9th encryption message
When name matching, the 9th encryption message is decrypted to obtain the 9th message according to the private key of the tenth node.
Figure 11 shows the flow chart of the method for the realization social networks of the 11st exemplary embodiment according to the present invention, the
The method of 11 exemplary embodiments can realize that the 11st node can be the group's major node for establishing group in the 11st node, or
Administrator's node of group.
As shown in Figure 11, the method may include step S1110 and step S1120.In step S1110, based on each
The public key of group members is encrypted to group invitation message is entered to obtain and encrypt message with each group members the corresponding tenth.?
Step S1120, broadcast encrypt message with each group members the corresponding tenth, wherein corresponding with each group members
The transmitting side marking of tenth encryption message includes the public key of the 11st node and the signature of the 11st node, with each group at
The destination mark of the corresponding tenth encryption message of member is the public key of each group members, and entering group invitation message includes as group
The public key of 12nd node of node.
As an example, the method also includes: by group's major node or create group node generate as group's node the
The public key and private key of 12 nodes.
As an example, group's node (12 node) is also node, public server can be stored in or existed with group's major node
Same terminal, terminal can be the various electronic equipments such as mobile phone, tablet computer.
As an example, the method also includes: the public key based on the 12nd node manages message to group and is encrypted to obtain
The 11st encryption message, and broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the
The destination mark of the signature of the public key of 11 nodes and the 11st node, the 11st encryption message is the public affairs of the 12nd node
Key, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, the change of group's essential information disappears
Breath, group announce publication or update message, group's title editor message and group's rules customization message.
Figure 12 shows the flow chart of the method for the realization social networks of the 12nd exemplary embodiment according to the present invention, the
The method of 12 exemplary embodiments can realize that the 12nd node can be group's node in the 12nd node.
As shown in Figure 12, the method includes the steps S1210 to step S1250.In step S1210, destination is received
Mark is the 11st encryption message of the public key of the 12nd node.In step S1220, the sender of the 11st encryption message of verifying
Whether included public key and signature match in mark.In step S1230, when institute in the transmitting side marking of the 11st encryption message
Including public key and when signatures match, the 11st encryption message is decrypted to obtain the tenth according to the private key of the 12nd node
One message.In step S1240, when the 11st message is received into group invitation message or group's update of basic information request message
When, included public key encrypts group's essential information to obtain the in the transmitting side marking based on the 11st encryption message
12 encryption message.In step S1250, the 12nd encryption message of broadcast, wherein the transmitting side marking packet of the 12nd encryption message
The public key of the 12nd node and the signature of the 12nd node are included, the destination mark of the 12nd encryption message is that the 11st encryption disappears
Included public key in the transmitting side marking of breath, wherein group's essential information includes the public key of each group member node.
As an example, the method also includes: when the 11st message is to move back group message, or when the 11st message is group
When included public key belongs to the public key of administrator's node in the transmitting side marking of management message and the 11st encryption message, update
Group's essential information, wherein it includes at least one in following item that the group, which manages message: group members kick out of message, group
Essential information changes message, group announces publication or update message, group's title editor message and group's rules customization message.
As an example, the method also includes: receive the 13rd encryption of the public key that destination mark is the 12nd node
Message;Verify whether public key and signature included in the transmitting side marking of the 13rd encryption message match;When the 13rd encryption
Included public key and when signatures match in the transmitting side marking of message, disappears to the 13rd encryption according to the private key of the 12nd node
Breath is decrypted to obtain the 13rd message;When the 13rd message is message in group, the 13rd encryption message of storage.
As an example, the method also includes: receive the 14th encryption of the public key that destination mark is the 12nd node
Message;Verify whether public key and signature included in the transmitting side marking of the 14th encryption message match;When the 14th encryption
Included public key and when signatures match in the transmitting side marking of message, disappears to the 14th encryption according to the private key of the 12nd node
Breath is decrypted to obtain the 14th message;When the 14th message is message acquisition request message in group, extracts and broadcast
13 encryption message, wherein the destination mark of the 13rd encryption message is changed to sender's mark of the 14th encryption message
Included public key in knowledge.
As an example, the step of extracting the 13rd encryption message includes: according to being wrapped in message acquisition request message in group
The time included extracts the 13rd encryption message.
As an example, receiving group invitation message, group's update of basic information request message, moving back group message, message in group
Message can be the 13rd node transmission as common group members in acquisition request message and group.Group's management message is the tenth
What one node was sent.
Figure 13 to Figure 17 shows the stream of the method for the realization social networks of the 13rd exemplary embodiment according to the present invention
The method of Cheng Tu, the 13rd exemplary embodiment can realize that the 13rd node can be common group members in the 13rd node
Node.
As shown in Figure 13, the method includes the steps S1310 to step S1340.In step S1310, destination is received
Mark is the tenth encryption message of the public key of the 13rd node (group members node).In step S1320, the tenth encryption message of verifying
Transmitting side marking in included public key and signature whether match.In step S1330, when sender's mark of the tenth encryption message
Included public key and when signatures match in knowledge, is decrypted to obtain the tenth encryption message according to the private key of the 13rd node
Tenth message.In step S1340, when the tenth message is into group invitation message, agree to that the user into group is defeated in response to receiving
Enter, the public key based on the 12nd node obtains the 11st encryption message to receiving to be encrypted into group invitation message, and wide
Broadcast the 11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the public key and the 13rd of the 13rd node
The destination mark of the signature of node, the 11st encryption message is the ten as group's node included in group invitation message
The public key of two nodes.
As an example, as shown in Figure 14, the method also includes: step S1410: receiving destination mark is the 13rd
12nd encryption message of the public key of node;Step S1420: included by the transmitting side marking of the 12nd encryption message of verifying
Whether public key and signature match;Step S1430: when public key and signature included in the transmitting side marking of the 12nd encryption message
When matching, the 12nd encryption message is decrypted to obtain the 12nd message according to the private key of the 13rd node;Step
S1440: when the 12nd message is group's essential information, storage cluster essential information, wherein group's essential information includes
The public key of each group member node.
As an example, as shown in Figure 15, the method also includes: step S1510: based on collective group member's node
The cryptographic Hash of public key encrypts message in group to obtain the 13rd encryption message;Step S1520: the 13rd encryption of broadcast disappears
Breath, wherein the transmitting side marking of the 13rd encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the tenth
The destination mark of three encryption message is the public key of group node.
As an example, as shown in Figure 16, the method also includes: step S1610: the public key pair based on the 12nd node
Message acquisition request message is encrypted to obtain the 14th encryption message in group, step S1620: the 14th encryption of broadcast disappears
Breath, wherein the transmitting side marking of the 14th encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the tenth
The destination mark of four encryption message is the public key of group node;Step S1630: the public affairs that destination mark is the 13rd node are received
13rd encryption message of key;Step S1640: included public key and label in the transmitting side marking of the 13rd encryption message of verifying
Whether name matches;Step S1650: when public key and signatures match included in the transmitting side marking of the 13rd encryption message,
The 13rd encryption message is decrypted to obtain the 13rd message according to the private key of the 13rd node;Step S1660: when the tenth
It when three message are message in group, is inputted in response to the user for reading message in group, shows message in group.
As an example, as shown in Figure 17, the method also includes: step S1710: the public key pair based on the 13rd node
It moves back group message or group's update of basic information request message is encrypted to obtain the 11st encryption message;Step S1720: broadcast
11st encryption message, wherein the transmitting side marking of the 11st encryption message includes the public key and the 13rd knot of the 13rd node
The destination mark of the signature of point, the 11st encryption message is the public key of group node.
As an example, message includes the renewal time of group's essential information in the group, and the method also includes: it will be local
Renewal time of group's essential information be compared with the renewal time of included group's essential information in message in the group;
Group's update of basic information request message is obtained according to the comparison result.
As an example, the cryptographic Hash is by all public affairs based on hash function to whole group member nodes of group
Key is calculated and is obtained, and the present invention is not intended to limit the hash function used.In other words, any for calculating the Kazakhstan of multiple public keys
The hash function of uncommon value is feasible.
Figure 18 shows the block diagram of the system of the realization social networks of the 14th exemplary embodiment according to the present invention.It is described
System may include at least two nodes, and method as described above can be performed in any one node at least two node.
It is any one in the executable the above exemplary embodiments of any one node in node 1810 and node 1820 in Figure 18
Method as described in the examples.
In accordance with an alternative illustrative embodiment of the present invention, a kind of computer readable storage medium of store instruction is provided,
Wherein, when described instruction is run by least one computing device, at least one described computing device is promoted to execute as described above
Method.
Computer readable storage medium is the arbitrary data storage device that can store the data read by computer system.Meter
The example of calculation machine readable storage medium storing program for executing includes: read-only memory, random access memory, CD-ROM, tape, floppy disk, light number
According to storage device and carrier wave (such as being transmitted via wired or wireless transmission path by the data of internet).
Moreover, it should be understood that according to each node of disclosure exemplary embodiment can be implemented as hardware component and/or
Component software.Those skilled in the art's processing according to performed by each unit of restriction can for example use site may be programmed
Gate array (FPGA) or specific integrated circuit (ASIC) realize each node.
In addition, may be implemented as the meter in computer readable storage medium according to the method for disclosure exemplary embodiment
Calculation machine code.Those skilled in the art can realize the computer code according to the description to the above method.When the meter
Calculation machine code is performed the above method for realizing the disclosure in computer (especially processor).
The present invention for each user provide a safety, can be with the external personal information management for carrying out information exchange
Scheme.Based on this, it will be embodied in IT application process with everyone conscientiously, it will the daily of people is greatly improved
The mode of the efficiency of information processing and the real-life information processing of improvement in life.
The foregoing describe each exemplary embodiments of the disclosure, it should be appreciated that foregoing description is merely exemplary, and exhaustive
Property, the present disclosure is not limited to disclosed each exemplary embodiments.It is right without departing from the scope of the present disclosure and spirit
Many modifications and changes are obvious for those skilled in the art.Therefore, the protection of the disclosure
Range should be subject to the scope of the claims.
Claims (10)
1. a kind of method for realizing social networks, comprising:
Private key based on the first node generates the signature of the first node;
Public key based on the second node encrypts first message to obtain the first encryption message;
Broadcast the first encryption message,
Wherein, the transmitting side marking of the first encryption message includes the public key of the first node and the signature of the first node, the first encryption
The destination mark of message is the public key of the second node.
2. a kind of method for realizing social networks, comprising:
Generate daily dynamic message;
Receive the third encryption message for the public key that destination mark is third node;
Whether included public key and signature match in the transmitting side marking of verifying third encryption message;
When public key and signatures match included in the transmitting side marking of third encryption message, the private key pair based on third node
Third encryption message is decrypted to obtain third message;
When third message is daily dynamic acquisition request message, daily dynamic message is obtained, the hair based on third encryption message
Included public key encrypts the daily dynamic message of acquisition to obtain the 4th encryption message in the side's of sending mark, and broadcasts
4th encryption message,
Wherein, the transmitting side marking of the 4th encryption message includes the public key of third node and the signature of third node, the 4th encryption
The destination mark of message is public key included in the transmitting side marking of third encryption message.
3. a kind of method for realizing social networks, comprising:
Obtain in blank template;
The template for obtaining and filling in is inputted based on user;
Public key based on the 6th node encrypts the 5th message for including the template filled in obtain the 5th encryption message;
The 5th encryption message is broadcasted,
Wherein, the transmitting side marking of the 5th encryption message includes the public key of the 5th node and the signature of the 5th node, the 5th encryption
The destination mark of message is the public key of the 6th node.
4. a kind of method for realizing social networks, comprising:
Generate the evaluation information for being directed to special object;
Receive the 7th encryption message of the public key that destination mark is the 7th node;
Verify whether public key and signature included in the transmitting side marking of the 7th encryption message match;
When public key and signatures match included in the transmitting side marking of the 7th encryption message, the private key pair based on the 7th node
7th encryption message is decrypted to obtain the 7th message;
When the 7th message is evaluation information acquisition request message, evaluation information is obtained, the sender based on the 7th encryption message
Included public key encrypts the evaluation information of acquisition to obtain the 8th encryption message in mark, and broadcasts the 8th encryption
Message,
Wherein, the transmitting side marking of the 8th encryption message includes the public key of the 7th node and the signature of the 7th node, the 8th encryption
The destination mark of message is public key included in the transmitting side marking of the 7th encryption message.
5. a kind of method for realizing social networks, comprising:
The public key and signature of in blank template and the tenth node are obtained from the tenth node;
It verifies the public key of the tenth node and whether signature matches and whether the public key of the tenth node is effective;
When the public key of the public key of the tenth node and signatures match and the tenth node is effective, the 9th knot of template extraction based on acquisition
The data of point, data and user based on extraction, which input, generates node information, is encrypted the node information of generation to obtain
9th encryption message, and the 9th encryption message is broadcasted,
Wherein, the transmitting side marking of the 9th encryption message includes the public key of the 9th node and the signature of the 9th node, the 9th encryption
The destination mark of message is the public key of the tenth node.
6. a kind of method for realizing social networks, comprising:
It generates and shows the two dimensional code including in blank template, the public key of the tenth node and signature;
Receive the 9th encryption message of the public key that destination mark is the tenth node;
Verify whether public key and signature included in the transmitting side marking of the 9th encryption message match;
When public key and signatures match included in the transmitting side marking of the 9th encryption message, according to the private key pair of the tenth node
9th encryption message is decrypted to obtain the 9th message.
7. a kind of method for realizing social networks, comprising:
Public key based on each group members is encrypted to group invitation message is entered to obtain corresponding with each group members the
Ten encryption message;
Broadcast encrypts message with each group members the corresponding tenth,
Wherein, the transmitting side marking of the tenth encryption message corresponding with each group members include the 11st node public key and
The signature of 11st node, the destination mark of the tenth encryption message corresponding with each group members be each group at
The public key of member, enters the public key that group invitation message includes the 12nd node as group's node.
8. a kind of method for realizing social networks, comprising:
Receive the 11st encryption message of the public key that destination mark is the 12nd node;
Verify whether public key and signature included in the transmitting side marking of the 11st encryption message match;
When public key and signatures match included in the transmitting side marking of the 11st encryption message, according to the private of the 12nd node
The 11st encryption message is decrypted to obtain the 11st message in key;
When the 11st message is received into group invitation message or group's update of basic information request message, based on the 11st encryption
Included public key encrypts group's essential information to obtain the 12nd encryption message in the transmitting side marking of message;
Broadcast the 12nd encryption message, wherein the 12nd encryption message transmitting side marking include the 12nd node public key and
The signature of 12nd node, the destination mark of the 12nd encryption message are wrapped in the 11st transmitting side marking for encrypting message
The public key included,
Wherein, group's essential information includes the public key of each group member node.
9. a kind of method for realizing social networks, comprising:
Receive the tenth encryption message of the public key that destination mark is the 13rd node;
Verify whether public key and signature included in the transmitting side marking of the tenth encryption message match;
When public key and signatures match included in the transmitting side marking of the tenth encryption message, according to the private key of the 13rd node
Tenth encryption message is decrypted to obtain the tenth message;
When the tenth message is into group invitation message, agree to that the user into group inputs, and is based on the 12nd node in response to receiving
Public key the 11st encryption message is obtained to receiving to be encrypted into group invitation message, and broadcast the 11st encryption message,
Wherein, the transmitting side marking of the 11st encryption message includes the public key of the 13rd node and the signature of the 13rd node, and the 11st
The destination mark of encryption message is the public key of the 12nd node as group's node included in group invitation message.
10. a kind of system for realizing social networks, including at least two nodes, wherein any at least two node
One node executes the method as described in any claim in claims 1 to 9.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811307529.2A CN109302281B (en) | 2018-11-05 | 2018-11-05 | Method and system for realizing social network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811307529.2A CN109302281B (en) | 2018-11-05 | 2018-11-05 | Method and system for realizing social network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109302281A true CN109302281A (en) | 2019-02-01 |
CN109302281B CN109302281B (en) | 2021-12-14 |
Family
ID=65145115
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811307529.2A Active CN109302281B (en) | 2018-11-05 | 2018-11-05 | Method and system for realizing social network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109302281B (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114827074A (en) * | 2021-01-28 | 2022-07-29 | 腾讯科技(深圳)有限公司 | Social message processing method, device, server, terminal and medium |
US11463244B2 (en) * | 2019-01-10 | 2022-10-04 | Samsung Electronics Co., Ltd. | Electronic apparatus, method of controlling the same, and network system thereof |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1665184A (en) * | 2004-03-05 | 2005-09-07 | 微软公司 | Using a flexible rights template to obtain a signed rights label (SRL) for digital content |
US20150113283A1 (en) * | 2012-06-23 | 2015-04-23 | Pomian & Corella | Protecting credentials against physical capture of a computing device |
CN105850168A (en) * | 2013-12-31 | 2016-08-10 | 华为终端有限公司 | Secure connection method for network device, and related device and system |
CN106529973A (en) * | 2016-11-02 | 2017-03-22 | 深圳市幻实科技有限公司 | Anti-counterfeiting method and apparatus based on augmented reality |
CN107103252A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | Data access control method based on block chain |
CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
-
2018
- 2018-11-05 CN CN201811307529.2A patent/CN109302281B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1665184A (en) * | 2004-03-05 | 2005-09-07 | 微软公司 | Using a flexible rights template to obtain a signed rights label (SRL) for digital content |
US20150113283A1 (en) * | 2012-06-23 | 2015-04-23 | Pomian & Corella | Protecting credentials against physical capture of a computing device |
CN105850168A (en) * | 2013-12-31 | 2016-08-10 | 华为终端有限公司 | Secure connection method for network device, and related device and system |
CN106529973A (en) * | 2016-11-02 | 2017-03-22 | 深圳市幻实科技有限公司 | Anti-counterfeiting method and apparatus based on augmented reality |
CN107103252A (en) * | 2017-04-27 | 2017-08-29 | 电子科技大学 | Data access control method based on block chain |
CN108009825A (en) * | 2017-11-29 | 2018-05-08 | 江苏安凰领御科技有限公司 | A kind of identity management system and method based on block chain technology |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11463244B2 (en) * | 2019-01-10 | 2022-10-04 | Samsung Electronics Co., Ltd. | Electronic apparatus, method of controlling the same, and network system thereof |
CN114827074A (en) * | 2021-01-28 | 2022-07-29 | 腾讯科技(深圳)有限公司 | Social message processing method, device, server, terminal and medium |
CN114827074B (en) * | 2021-01-28 | 2024-04-09 | 腾讯科技(深圳)有限公司 | Social message processing method, device, server, terminal and medium |
Also Published As
Publication number | Publication date |
---|---|
CN109302281B (en) | 2021-12-14 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Huang et al. | The application of the blockchain technology in voting systems: A review | |
He et al. | Certificateless public key authenticated encryption with keyword search for industrial internet of things | |
WO2019227457A1 (en) | Method and apparatus for decentralized trust evaluation in a distributed network | |
CN113256290B (en) | Decentralized encrypted communication and transaction system | |
CN105959307A (en) | Existence certification and authentication service method and system based on block chain technology | |
Zhang et al. | Message in a sealed bottle: Privacy preserving friending in mobile social networks | |
US11177955B2 (en) | Device-to-device messaging protocol | |
CN104079574A (en) | User privacy protection method based on attribute and homomorphism mixed encryption under cloud environment | |
US20120191973A1 (en) | Online presence of users | |
CN107667515A (en) | Synchronization group and validation group in relevant device | |
US11658963B2 (en) | Cooperative communication validation | |
KR20180105196A (en) | Service Implementation Methods and Devices | |
US20230059173A1 (en) | Password concatenation for secure command execution in a secure network device | |
CN103685255A (en) | File encryption method based on two-dimension code scanning | |
CN109302281A (en) | Realize the method and system of social networks | |
CN115396115A (en) | Block chain data privacy protection method, device, equipment and readable storage medium | |
Buccafurri et al. | A protocol for anonymous short communications in social networks and its application to proximity-based services | |
Ahmed et al. | A secured peer-to-peer messaging system based on blockchain | |
Vashishtha et al. | Key Spreading and Mutual Validation schemes for Privacy Protection in Fog Computing Environment using MNSOR Protocols. | |
CN106254341A (en) | Data fingerprint extracting method and system for centralized electronic data safety system | |
Dimitriou et al. | “I wasn’t there”—Deniable, privacy-aware scheme for decentralized Location-based Services | |
Akhtar et al. | IoT-chain: security of things for pervasive, sustainable and efficient computing using blockchain | |
Zhang et al. | Secure and accountable data access control against malicious behavior in smart grids | |
Rivero‐García et al. | Using blockchain in the follow‐up of emergency situations related to events | |
Xu et al. | A review of the technology and application of deposit and traceability based on blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |