CN109460993A - A kind of information processing method, device and storage medium - Google Patents

A kind of information processing method, device and storage medium Download PDF

Info

Publication number
CN109460993A
CN109460993A CN201811027778.6A CN201811027778A CN109460993A CN 109460993 A CN109460993 A CN 109460993A CN 201811027778 A CN201811027778 A CN 201811027778A CN 109460993 A CN109460993 A CN 109460993A
Authority
CN
China
Prior art keywords
information
user
node
type
communication network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811027778.6A
Other languages
Chinese (zh)
Inventor
柏洪涛
李琳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MIGU Culture Technology Co Ltd
Original Assignee
MIGU Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MIGU Culture Technology Co Ltd filed Critical MIGU Culture Technology Co Ltd
Priority to CN201811027778.6A priority Critical patent/CN109460993A/en
Publication of CN109460993A publication Critical patent/CN109460993A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L51/00User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
    • H04L51/52User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0822Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key

Abstract

The invention discloses a kind of information processing methods, the information processing method is applied to the communication network comprising block chain node, it include: the first information for receiving the first user and sending, the first information is used to characterize the first user and passes through the information including at least social content that client is issued;According to the type of the received first information perform corresponding processing, will be sent by the respective treated first information to first node, the first node is used to characterize node corresponding to all social interaction server providers in the communication network;The received first information of institute is stored in the block chain node by the first node.The invention also discloses a kind of information processing unit and storage mediums.

Description

A kind of information processing method, device and storage medium
Technical field
The present invention relates to the information processing technology in the communication network comprising block chain node, especially a kind of information processing Method, apparatus and storage medium.
Background technique
In the prior art, the social networks system of centralization is being attacked due to the data information of centrally stored user When, the data information that user is stored easily is lost, also, in the social networks system of centralization, the operator of social networks Possess the absolute permission for checking all customer data, also affects the safety of user data.Simultaneously as different social softwares It not can be carried out data exchange between service provider, so that the message that same user is issued may only be taken by same social software The user of business provider sees, increases the use burden of user, influences the usage experience of user.
Summary of the invention
In view of this, can be realized an embodiment of the present invention is intended to provide a kind of information processing method by communication network Block chain node storage user data information, realize that user to data absolutely control, avoids in Heart service provider fully controls the defect of user data.Meanwhile solving centralization storing data when by attacking, it uses The problem of user data is lost completely.Also, user no longer needs to download the application program for installing different social software service providers, i.e., Data general-purpose can be achieved, avoid the operating burden of user, the user experience is improved.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of information processing method, the information processing method is applied to include block chain link The communication network of point, comprising:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network Node;
The received first information of institute is stored in the block chain node by the first node.
In above scheme, before receiving the first information that the first user sends, the method also includes:
Receive the login authentication information that first user sends;
Based on the received login authentication information of institute, the logon rights of first user are verified.
In above scheme, the login authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code Information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of the first kind, the second information is obtained;
By the block head cryptographic Hash of the block node of the second information institute save location to the first information into Row encryption;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in Previous information of the first information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of Second Type, based on corresponding to first user first encryption Key is encrypted, and the Second Type is stored in respective area by the communication network for characterizing first user Block chain node but underground information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of third type, based on corresponding to first user second encryption The first information is encrypted in key;
By with public key corresponding to user pointed by the first information, to corresponding to first user second plus Key is encrypted, and obtains the second encryption key Jing Guo encryption;
By second encryption key by encryption, and first by second encryption keys processing Information is handled jointly, forms encryption envelope;
The third type is directed toward disclosed in specific user for characterizing first user by the communication network Information.
In above scheme, the received first information of institute is stored in the block chain node by the first node, comprising:
The first node obtains the parameter information of block chain node corresponding with the first node;
Based on the parameter information of the block chain node corresponding with first node, the first information is stored in accordingly Block chain node in.
In above scheme, the method also includes:
The first node obtains the storage information of whole block chain nodes in the communication network.
In above scheme, the parameter information of the block chain node corresponding with the first node, comprising:
The block header information and block body information of block chain node corresponding with the first node;
The block header information includes at least one:
It is the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block, current The timestamp information of block and the credible tree information of current block;
The block body information includes at least one:
The first information transmitted by serial number information, user identity information, first user and/or second user.
In above scheme, the method also includes:
At least one node in the first node receives the solicited message that second user is sent;
Information in response to the request obtains the third information that block chain node is saved in the communication network;
According to the type of the third information, Xiang Suoshu second user pushes the third information.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information, Include:
When the third information is the information of the first kind, the acquired third information is decrypted, Third information Jing Guo decryption processing is pushed to the second user.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information, Include:
When the third information is the information of Second Type, the acquired third information is abandoned, and to described Second user issues the first prompt information, and first prompt information prompts the second user that can not obtain such for characterizing Type information.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information, Include:
When the third information be third type information when, according in the third information encryption envelope obtain and institute State the corresponding decruption key of third information;
The third information is decrypted according to the acquired decruption key, by the by decryption processing Three information are pushed to the second user.
In above scheme, the encryption envelope according in the third information obtains solution corresponding with the third information Before key, the method also includes:
The second user sends authentication to first user by least one node in the first node and asks It asks;
First user response is in the authentication request, Xiang Suoshu second user and the node for sending the authentication request The second prompt information is sent, second prompt information is used to that second user described in the node for sending authentication request to be prompted to obtain Obtain or do not obtain the permission for browsing the third information.
The embodiment of the invention also provides a kind of information processing unit, applied to the communication network comprising block chain node, Include:
Signal dispatcher module, for receiving the first information of the first user transmission, the first information is for characterizing first User passes through the information including at least social content that client is issued;
Message processing module, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module, for that will be sent by the respective treated first information to first node, described first Node is used to characterize node corresponding to all social interaction server providers in the communication network;
The message processing module, for the received first information of institute to be stored in the block chain node.
In above scheme,
The signal dispatcher module, the Sign-On authentication information sent for receiving first user;
The message processing module, for being stepped on to first user based on the received login authentication information Land permission is verified.
In above scheme, the Sign-On authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code Information.
In above scheme,
The message processing module when for judging the first information for the information of the first kind, obtains the second information;
The message processing module, the block head for the block node by the second information institute save location are breathed out The first information is encrypted in uncommon value;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in Previous information of the first information.
In above scheme,
The message processing module, for based on being carried out at encryption with the first encryption key corresponding to first user Reason, the Second Type are stored in respective block chain node but injustice by the communication network for characterizing first user The information opened.
In above scheme,
The message processing module, for based on the second encryption key corresponding to first user, to described One information is encrypted;
The message processing module, for by with public key corresponding to user pointed by the first information, to described Second encryption key corresponding to first user is encrypted, and obtains the second encryption key Jing Guo encryption;
The message processing module for by second encryption key by encryption, and passes through described second The first information of encryption keys processing is handled jointly, forms encryption envelope;
The third type is directed toward disclosed in specific user for characterizing first user by the communication network Information.
In above scheme,
The message processing module, for obtaining the parameter information of block chain node corresponding with the first node;
The message processing module will for the parameter information based on the block chain node corresponding with first node The first information is stored in corresponding block chain node.
In above scheme,
The message processing module, for obtaining the storage information of whole block chain nodes in the communication network.
In above scheme, the parameter information of the block chain node corresponding with the first node, comprising:
The block header information and block body information of block chain node corresponding with the first node;
The block header information includes at least one:
It is the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block, current The timestamp information of block and the credible tree information of current block;
The block body information includes at least one:
The first information transmitted by serial number information, user identity information, first user and/or second user.
In above scheme,
The signal dispatcher module, for receiving the solicited message of second user transmission;
The message processing module obtains block chain node in the communication network for information in response to the request The third information saved;
The signal dispatcher module, for the type according to the third information, Xiang Suoshu second user push described the Three information.
In above scheme,
The message processing module will be by decryption for the acquired third information to be decrypted The third information of reason is pushed to the second user.
In above scheme,
The message processing module for abandoning the acquired third information, and is issued to the second user First prompt information, first prompt information prompt the second user that can not obtain the type information for characterizing.
In above scheme,
The message processing module, for being obtained and the third information pair according to the encryption envelope in the third information The decruption key answered;
The message processing module, for place to be decrypted to the third information according to the acquired decruption key Reason;
The signal dispatcher module, the third information for that will pass through decryption processing are pushed to the second user.
In above scheme,
The signal dispatcher module, for sending authentication request to first user;
The message processing module, in response to the authentication request, Xiang Suoshu second user and the transmission authentication The node of request sends the second prompt information, and second prompt information is used to prompt described in the node for sending authentication request Second user obtains or does not obtain the permission for browsing the third information.
The embodiment of the invention also provides a kind of information processing units, comprising:
Processor and memory for storing the computer program that can be run on a processor,
Wherein, the processor is for when running the computer program, executing following operation:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network Node;
The received first information of institute is stored in the block chain node by the first node.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, special Sign is that the computer program is executed by processor:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network Node;
The received first information of institute is stored in the block chain node by the first node.
User information can be directly stored in the block chain node by the embodiment of the present invention, avoid some service The problem of provider closes down or is attacked and relevant user information is lost completely.Meanwhile user may be implemented to itself The control of data, improves user information safety, improves the experience of user.
Detailed description of the invention
Fig. 1 is one optional process schematic of information processing method provided in an embodiment of the present invention;
Fig. 2 is an optional structural schematic diagram of information processing unit provided in an embodiment of the present invention;
Fig. 3 is one use environment schematic diagram of information processing method provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram that user is registered in a communication network by client realization in the embodiment of the present invention;
Fig. 5 is one optional process schematic of information processing method provided in an embodiment of the present invention;
Fig. 6 is one composition schematic diagram of information processing unit of the embodiment of the present invention.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present invention and technology contents, with reference to the accompanying drawing to this hair The realization of bright embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the present invention.
Before the present invention will be described in further detail, noun involved in the embodiment of the present invention and term are said Bright, noun involved in the embodiment of the present invention and term are suitable for following explanation.
1) user information, for characterizing the information of user's sending, such as social information.
2) first information passes through the information including at least social content that client is issued for characterizing the first user.
3) the second information is for characterizing, described the transmitted by first user stored as the block chain node Previous information of one information.
4) first kind passes through information disclosed in the communication network for characterizing first user.
5) Second Type, for characterize first user by the communication network be stored in respective block chain node but Underground information.
6) third type is directed toward letter disclosed in specific user by the communication network for characterizing first user Breath.
7) the first encryption key, for characterizing the private key of the first user, for encrypting first user in communication network Middle saved Second Type information.
8) the second encryption key includes at least social content by what client was issued to first user for characterizing Key used in information ciphering process.
Fig. 1 is one optional process schematic of information processing method provided in an embodiment of the present invention, as shown in Figure 1, this Inventive embodiments provide information processing method one optional process the following steps are included:
Step 101: receiving the first information that the first user sends;
Wherein, the first information be used to characterize the first user by client issued including at least social content Information.
Step 102: according to the type of the received first information perform corresponding processing, will pass through respective treated The first information is sent to first node;
Wherein, the first node is used to characterize section corresponding to all social interaction server providers in the communication network Point;
Step 103: the received first information of institute is stored in the block chain node by the first node.
In one embodiment of the invention, before receiving the first information that the first user sends, the method also includes: Receive the Sign-On authentication information that first user sends;Based on the received login authentication information of institute, use described first The load right at family is verified.Since after logining successfully, user can modify and delete to the corresponding information saved It removes, therefore, during initiating logon operation, needs the load right to the first user to verify, to prevent user from believing Breath is illegally distorted.
In one embodiment of the invention, the Sign-On authentication information includes at least one: first user Username information, first user password information, the verification code information of first user.It is stepped on by a variety of different The combination of land verification information can effectively promote the safety in first process of user login.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly Reason, comprising: when judging the first information for the information of the first kind, obtain the second information;It is protected by second information The first information is encrypted in the block head cryptographic Hash for depositing the block node of position;The first kind is used for table It levies first user and passes through information disclosed in the communication network;Second information is for characterizing, by the block chain link Previous information of the first information transmitted by first user that point is stored.Technology shown in through this embodiment Scheme, when the received information type of institute be first user by information disclosed in the communication network when, show described the One user wishes all with that can watch this information per family in communication network, therefore, passes through being protected previous information The first information is encrypted in the block head cryptographic Hash for depositing the block node of position, optionally, uses previous item The block head hash value of block where information is as the institute being sent in the communication network after password progress cleartext information encryption There is service provider node, so that all service provider nodes in the communication network can obtain first user Wish the first kind information shown.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly Reason, comprising: when judging the first information for the information of Second Type, based on corresponding to first user first encrypt Key is encrypted, and the Second Type is stored in respective area by the communication network for characterizing first user Block chain node but underground information.Technical solution shown in through this embodiment, when user uses the process of relative client In, it is desirable to when corresponding user information is only saved in a communication network, by being added using first user corresponding first The close corresponding Second Type information of key pair is encrypted, wherein first encryption key is first user's Private key, hereby it is achieved that for the kept secure of user information.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly Reason, comprising: when judging the first information for the information of third type, based on corresponding to first user second encrypt The first information is encrypted in key;By with public key corresponding to user pointed by the first information, to institute It states the second encryption key corresponding to the first user to be encrypted, obtains the second encryption key Jing Guo encryption;It will Second encryption key by encryption, and by second encryption keys processing the first information jointly into Row processing forms encryption envelope;The third type is specific by communication network direction for characterizing first user Information disclosed in user.Technical solution shown in through this embodiment is deposited in first user by the communication network When storing up the information of third type, viewing the type is enjoyed since first user is intended merely to a part of user in communication network The permission of information, therefore, can by with public key corresponding to user pointed by the first information, to the first user institute Corresponding second encryption key is encrypted, and obtains the second encryption key Jing Guo encryption;By described by encryption Second encryption key of processing, and handled jointly by the first information that second encryption keys are handled, it is formed The server of related service quotient after from encryption envelope to the communication network is sent, to realize that target user can watch accordingly Third type information.
In one embodiment of the invention, the received first information of institute is stored in the block chain by the first node In node, comprising: the first node obtains the parameter information of block chain node corresponding with the first node;Based on described The parameter information of block chain node corresponding with first node, the first information is stored in corresponding block chain node. Further, the method also includes the storage letters that: the first node obtains whole block chain nodes in the communication network Breath.The parameter information of the block chain node corresponding with the first node, comprising: block corresponding with the first node The block header information and block body information of chain node;The block header information includes at least one: current block Block head cryptographic Hash, the block head cryptographic Hash of a upper block for the current block, current block timestamp information and The credible tree information of current block;The block body information includes at least one: serial number information, user identity information, institute State the first information transmitted by the first user and/or second user.Technical solution shown in through this embodiment, by obtaining phase The block head information and block body information in block chain network are answered, the information that can timely send first user is protected There are in corresponding block.Further, previous information institute has been all made of since first user issues every information It is encrypted in the block head Hash of block as key, service provider needs to store complete chain, can just decrypt every Message;If chain is imperfect, there are part messages can not decrypt the risk being shown, and therefore, service provider only has All information that all users are issued all are actively added in the chain of oneself maintenance, are just had and are provided all displaying users of user The ability of any transmitted information, it is possible thereby to guarantee, the integrality of user data.
It in one embodiment of the invention, can be by institute after first user completes the publication and storage of information It states any user in communication network to initiate to check the request of the relevant information of first user, specifically include:
At least one node in the first node receives the solicited message that second user is sent;In response to the request Information obtains the third information that block chain node is saved in the communication network;According to the type of the third information, to institute It states second user and pushes the third information.Technical solution shown in through this embodiment, can be according in the communication network The type for the information that block chain node is saved pushes corresponding information to the user for initiating request.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user The third information, comprising:
When the third information is the information of the first kind, the acquired third information is decrypted, Third information Jing Guo decryption processing is pushed to the second user.Technical solution shown in through this embodiment, when described The type of third information be the first kind information when, show in the communication network use can watch per family it is described first use Therefore the user information that family is saved pushes the third information Jing Guo decryption processing to the second user, it is ensured that institute It states all with the information that can check the first kind per family in communication network.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user The third information, comprising:
When the third information is the information of Second Type, the acquired third information is abandoned, and to described Second user issues the first prompt information, and first prompt information prompts the second user that can not obtain such for characterizing Type information.Technical solution shown in through this embodiment, when the second user to be checked be the information of Second Type when, Node can be leaked by automatically abandoning the acquired third information to avoid the information of user, while by institute It states second user and issues the first prompt information to prompt the second user lack of competence to check the information;Further, the section Point can also send prompt information to first user, prompt described first user someone to wish to check Second Type to realize Information, but it is failed.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user The third information, comprising:
When the third information be third type information when, according in the third information encryption envelope obtain and institute State the corresponding decruption key of third information;The third information is decrypted according to the acquired decruption key, Third information Jing Guo decryption processing is pushed to the second user.
In one embodiment of the invention, the encryption envelope according in the third information obtains and the third Before the corresponding decruption key of information, the method also includes:
The second user sends authentication to first user by least one node in the first node and asks It asks;First user response is sent in the authentication request, Xiang Suoshu second user and the node for sending the authentication request Second prompt information, second prompt information be used for prompt it is described send authentication request node described in second user obtain or The permission for browsing the third information is not obtained.Technical solution shown in through this embodiment, when the second user requests to see When seeing the information of third type, determine whether the second user has the power for checking the type information by authentication request first Limit, when determining that the second user can check the type information, by being obtained according to the encryption envelope in the third information Take decruption key corresponding with the third information;The third information is decrypted according to the acquired decruption key Processing, the third information Jing Guo decryption processing is pushed to the second user, realizes that target user watches the letter of third type Breath, it is preferred that when carrying out the operation of same type again for the user by authentication, it is convenient to omit authentication operations, to promote use Family obtains the speed of corresponding information, promotes the use feeling of user.
Fig. 2 is an optional structural schematic diagram of information processing unit provided in an embodiment of the present invention, as shown in Fig. 2, One optional structure of information processing unit provided in an embodiment of the present invention, comprising:
Signal dispatcher module 201, for receiving the first information of the first user transmission, the first information is for characterizing the One user passes through the information including at least social content that client is issued;
Message processing module 202, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module 201, for that will be sent by the respective treated first information to first node, described the One node is used to characterize node corresponding to all social interaction server providers in the communication network;
The message processing module 202, for the received first information of institute to be stored in the block chain node.
In one embodiment of the invention, the signal dispatcher module 201, for receiving the first user transmission Sign-On authentication information;The message processing module 202, for being based on the received login authentication information of institute, to described first The load right of user is verified.
In one embodiment of the invention, the Sign-On authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code Information.Since after logining successfully, user can modify and delete to the corresponding information saved, therefore, initiating to step on During land operates, the load right to the first user is needed to verify, to prevent user information from illegally being distorted.Pass through The combination of a variety of different Sign-On authentication information can effectively promote the safety in first process of user login.
In one embodiment of the invention, the message processing module 202, for judging the first information for first When the information of type, the second information is obtained;
The message processing module 202, the block head for the block node by the second information institute save location The first information is encrypted in portion's cryptographic Hash;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in Previous information of the first information.Technical solution shown in through this embodiment, when the received information type of institute is described first When user is by information disclosed in the communication network, show that first user wishes that all use in communication network per family may be used To watch this information, therefore, by by the block head cryptographic Hash pair of the block node of institute's save location of previous information The first information is encrypted, and optionally, uses the block head hash value of previous information place block as password All service provider nodes being sent to after progress cleartext information encryption in the communication network, so that in the communication network All service provider nodes can obtain first user wish show first kind information.
In one embodiment of the invention, the message processing module 202, for based on right with first user The first encryption key answered is encrypted, and the Second Type passes through the communication network for characterizing first user It is stored in respective block chain node but underground information.Technical solution shown in through this embodiment, when user uses accordingly During client, it is desirable to when corresponding user information is only saved in a communication network, by utilizing first user Corresponding Second Type information is encrypted in corresponding first encryption key, wherein the first encryption code key is institute The private key of the first user is stated, hereby it is achieved that for the kept secure of user information.
In one embodiment of the invention, the message processing module 202, for based on right with first user The second encryption key answered, is encrypted the first information;The message processing module 202, for by with institute Public key corresponding to user pointed by the first information is stated, the second encryption key corresponding to first user is carried out at encryption Reason obtains the second encryption key Jing Guo encryption;The message processing module 202, for passing through encryption for described The second encryption key, and by second encryption keys processing the first information handled jointly, formed encryption Envelope;The third type is directed toward letter disclosed in specific user by the communication network for characterizing first user Breath.Technical solution shown in through this embodiment stores the letter of third type in first user by the communication network When breath, since first user is intended merely to the permission that a part of user in communication network enjoys viewing the type information, because This, can by with public key corresponding to user pointed by the first information, to corresponding to first user second plus Key is encrypted, and obtains the second encryption key Jing Guo encryption;Second by encryption is added Key, and handled jointly by the first information that second encryption keys are handled, it is backward to form encryption envelope The server of related service quotient in the communication network is sent, to realize that target user can watch corresponding third type Information.
In one embodiment of the invention, the message processing module 202, it is corresponding with the first node for obtaining Block chain node parameter information;The message processing module 202, for based on the block chain corresponding with first node The first information is stored in corresponding block chain node by the parameter information of node.
In one embodiment of the invention, the message processing module 202, for obtaining in the communication network all The storage information of block chain node.Wherein, the parameter information of the block chain node corresponding with the first node, comprising: The block header information and block body information of block chain node corresponding with the first node;The block header information includes At least one: the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block, The timestamp information of current block and the credible tree information of current block;The block body information includes at least one: sequence The first information transmitted by number information, user identity information, first user and/or second user.Institute through this embodiment The technical solution shown can be timely by institute by obtaining block head information and block body information in respective block chain network The information for stating the first user transmission, is stored in corresponding block.Further, since first user issues every letter The block head Hash of block is encrypted as key where breath has been all made of previous information, and service provider needs to have stored Whole chain can just decrypt every message;If chain is imperfect, there are part messages can not decrypt the wind being shown Danger, therefore, all information that service provider is only issued all users are all actively added in the chain of oneself maintenance, are just had It is standby that all abilities for showing any transmitted information of user of user are provided, it is possible thereby to guarantee, the integrality of user data.
In one embodiment of the invention, the signal dispatcher module 201, for receiving the request of second user transmission Information;The message processing module 202 obtains block chain node in the communication network for information in response to the request The third information saved;The signal dispatcher module 201, for the type according to the third information, Xiang Suoshu second is used Family pushes the third information.Technical solution shown in the present embodiment is crossed, it can be according to block chain node in the communication network The type of the information saved pushes corresponding information to the user for initiating request.
In one embodiment of the invention, the message processing module 202, for the acquired third information It is decrypted, the third information Jing Guo decryption processing is pushed to the second user.Cross technology shown in the present embodiment Scheme, when the type of the third information is the information of the first kind, show in the communication network with can see per family It sees the user information that first user is saved, therefore, the third information Jing Guo decryption processing is pushed away to the second user It send, it is ensured that all with the information that can check the first kind per family in the communication network.
In one embodiment of the invention, the message processing module 202, for by the acquired third information It abandons, and issues the first prompt information to the second user, first prompt information is used for characterizing prompt described second Family can not obtain the type information.Technical solution shown in through this embodiment, what is checked when the second user is When the information of two types, node can be let out by automatically abandoning the acquired third information to avoid the information of user Dew, while by issuing the first prompt information to the second user to prompt the second user lack of competence to check the information; Further, the node can also send prompt information to first user, prompt described first user someone to realize Wish to check the information of Second Type, but failed.
In one embodiment of the invention, the message processing module 202, for according to adding in the third information Secret letter envelope obtains decruption key corresponding with the third information;The message processing module 202, for according to acquired institute Decruption key is stated the third information is decrypted;The signal dispatcher module 201, for decryption processing will to be passed through Third information is pushed to the second user.
In one embodiment of the invention, the signal dispatcher module 201 is authenticated for sending to first user Request;The message processing module 202, in response to the authentication request, Xiang Suoshu second user and the transmission authentication The node of request sends the second prompt information, and second prompt information is used to prompt described in the node for sending authentication request Second user obtains or does not obtain the permission for browsing the third information.Technical solution shown in through this embodiment, when described When the information of second user request viewing third type, determine whether the second user checks this by authentication request first The permission of type information, when determining that the second user can check the type information, by according in the third information Encryption envelope obtain corresponding with third information decruption key;According to the acquired decruption key to the third Information is decrypted, and the third information Jing Guo decryption processing is pushed to the second user, realizes target user's viewing The information of third type.Meanwhile user is in use, for third information be third type (such as personal letter) the case where, When the group that can read personal letter to one sends information, it may not be necessary to this process is authenticated, only (someone can be with to more people Read personal letter, someone's lack of competence read) send when just may require that authentication process, it is possible thereby to realize enhancing user handle it is flexible Property.
Fig. 3 is one use environment schematic diagram of information processing method provided in an embodiment of the present invention, as shown in figure 3, diagram Information processing method is applied to the communication network comprising block chain node, wherein user 1 and user 2 is in the communication networks Different user, service provider 1, service provider 2, service provider 3, service provider 4 are not by application program Provider server constitutes communication network by being in communication with each other between corresponding server.Its provided application program It can be different types of social program.Further, shape between social platform or social interaction server provider node and user At the communication network, user node generates and consumes node as user social contact data, and social platform or social interaction server provide Quotient's server node is accounting nodes, is responsible for collecting the social information that user mass-sends in the communication network.Meanwhile it is social flat Platform or social interaction server provider provide client software, and user shows user social contact information.User management uses central node machine System, user can register in any client, and different clients uses the subscriber management service of the same central node Device realizes the registration of user, logs in the account management operations such as management.
Fig. 4 is the schematic diagram that user is registered in a communication network by client realization in the embodiment of the present invention, such as Fig. 4 institute Show, comprising the following steps:
Step 401: user issues register instruction;
Step 402: user submits registration information;
Step 403: the registration information of user is committed to subscriber management server by client;
Step 404: subscriber management server completes user's registration according to the registration information;
Step 405: subscriber management server registers customers as result and sends to the client;
Step 406: the registering result of user is notified the user by the client.
Since the user issues the block head Hash conduct of block where every information has been all made of previous information Key encrypts, and service provider needs to store complete chain, can just decrypt every message;If chain is imperfect, There are part messages can not decrypt the risk being shown, and therefore, service provider is only issued all users all Information is all actively added in the chain of oneself maintenance, is just had and is provided all energy for showing any transmitted information of user of user Power, it is possible thereby to guarantee, the integrality of user data.Therefore, user is in registration process no matter using in the communication network Any client, can complete to register, increase the selection flexibility of user, the user experience is improved.
Fig. 5 is one optional process schematic of information processing method provided in an embodiment of the present invention, as shown in figure 5, this Inventive embodiments provide information processing method one optional process the following steps are included:
Step 501: user issues login instruction;
Step 502: user submits login authentication information to client;
Step 503: the client submits the login authentication information of the user to subscriber management server;
Step 504: the subscriber management server verifies the log-on message of the user;
Step 505: subscriber management server issues the response message of verification result to the client;
Step 506: when the user logins successfully, being based on corresponding account information, read in respective block and saved User information, Xiang Suoshu user show;
Step 507: when user login is failed, user being prompted to log in again.
In one embodiment of the invention, when the client is microblogging client, any clothes are can be used in user The client that business provider is issued, editor user's microblogging, and it is sent to all service provider nodes.
In one embodiment of the invention, the information of full disclosure is thought for user, then using where previous information The block head hash value of block is mentioned as all services that password be sent in the communication network after cleartext information encryption For quotient's node.
Further, it is not desired to disclosed information for user, then the information is encrypted by the customized key of user and is formed Cipher-text information is sent to all service provider nodes in the communication network.
Further, for user just for the addressable information of specific user, such as personal letter can be by encrypting the information After form cipher-text information, and with the corresponding encryption key of the public key encryption of the specific user, be formed together number with cipher-text information Encrypt envelope, all service providers being sent in the communication network.
Service provider receives after user is published to user's micro-blog information of the communication network, by user's micro-blog information It is added in chain.
In one embodiment of the invention, close towards information disclosed in all users for the user for issuing micro-blog information Literary form enters chain, i.e., disclosed social information, then the accessible browsing of other users.
Enter chain towards the ciphertext form of specific user for the user for issuing micro-blog information, i.e. the part that is only facing of personal letter is used The social informations such as microblogging disclosed in family, then client synchronous obtain when user releases news from server when showing is sent out simultaneously The digital envelope of cloth obtains decruption key, to carry out the displaying of personal letter information.Or it is intended to access the users of these information and can lead to Cross client to issue micro-blog information user initiate information browse request, by sending micro-blog information user by client into It can be checked after row authorization.
Simultaneously as all service providers can receive the social datas such as the microblogging of user's publication, therefore other are used The wall between different service providers is broken using the micro-blog information of the accessible user for issuing micro-blog information of any client in family It builds, the user for issuing micro-blog information does not need repeatedly to issue same message in different clients.
Fig. 6 is one composition schematic diagram of information processing unit of the embodiment of the present invention, as shown in fig. 6, information processing unit 600 It can be with including mobile phone, computer, digital broadcast terminal, information transceiving equipment, trip with the information processing function Play console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..Information processing unit 600 shown in fig. 6 wraps It includes: at least one processor 601, memory 602, at least one network interface 604 and user interface 603.Information processing unit Various components in 600 are coupled by bus system 605.It is understood that bus system 605 for realizing these components it Between connection communication.Bus system 605 further includes power bus, control bus and status signal in addition to including data/address bus Bus.But for the sake of clear explanation, various buses are all designated as bus system 605 in Fig. 6.
Wherein, user interface 603 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch Plate or touch screen etc..
It is appreciated that memory 602 can be volatile memory or nonvolatile memory, may also comprise volatibility and Both nonvolatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory), Programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM (EPROM, Erasable Programmable Read-Only Memory), electrically erasable programmable read-only memory The storage of (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited Reservoir, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as Static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory (SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM, Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM, Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited Reservoir 602 is intended to include the memory of these and any other suitable type.
Memory 602 in the embodiment of the present invention is for various types of data including storing user information to support to believe Cease the operation of processing unit 600.The example of these data includes: any calculating for operating on information processing unit 600 Machine program, such as operating system 6021 and application program 6022;Contact data;Telephone book data;Message;Picture;Video etc..Its In, operating system 6021 includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various bases Business and the hardware based task of processing.Application program 6022 may include various application programs, such as with information processing Client, media player (Media Player), browser (Browser) of function etc., for realizing including information processing Various applied business including program.Realize that the program of present invention implementation node scheduling method may be embodied in application program 6022 In.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601. Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each Step can be completed by the integrated logic circuit of the hardware in processor 601 or the operation of software form.Above-mentioned processing Device 601 can be general processor, digital signal processor (DSP, Digital Signal Processor) or other can Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 601 may be implemented or hold Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware decoding Reason device executes completion, or in decoding processor hardware and software module combine and execute completion.Software module can be located at In storage medium, which is located at memory 602, and processor 601 reads the information in memory 602, in conjunction with its hardware The step of completing preceding method.
In the exemplary embodiment, information processing unit 600 can be by one or more application specific integrated circuit (ASIC, Application Specific Integrated Circuit), DSP, programmable logic device (PLD, Programmable Logic Device), Complex Programmable Logic Devices (CPLD, Complex Programmable Logic Device), field programmable gate array (FPGA, Field-Programmable Gate Array), general processor, control Device, microcontroller (MCU, Micro Controller Unit), microprocessor (Microprocessor) or other electronics member Part is realized, for executing the storing information processing method.
In the exemplary embodiment, the embodiment of the invention also provides a kind of computer readable storage medium, for example including The memory 602 of computer program, above-mentioned computer program can be executed by the processor 601 of information processing unit 600, to complete Step described in preceding method.Computer readable storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash The memories such as Memory, magnetic surface storage, CD or CD-ROM;It is also possible to include one of above-mentioned memory or any group The various equipment closed, such as mobile phone, computer, tablet device, personal digital assistant.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the meter When calculation machine program is run by processor, execute:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network Node;
The received first information of institute is stored in the block chain node by the first node.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as the production of method, system or computer program Product.Therefore, hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the embodiment of the present invention Form.Moreover, it wherein includes the calculating of computer usable program code that the embodiment of the present invention, which can be used in one or more, The form for the computer program product implemented in machine usable storage medium (including magnetic disk storage and optical memory etc.).
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, equipment (system) and computer program product Flowchart and/or the block diagram describe.It should be understood that can be operated by computer program in implementation flow chart and/or block diagram The combination of process and/or box in each flow and/or block and flowchart and/or the block diagram.It can provide these calculating Processing of the machine procedure operation to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices Device is to generate a machine, so that being generated by the operation that computer or the processor of other programmable data processing devices execute For realizing the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram Device.
The operation of these computer programs, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes behaviour that operation stored in the computer readable memory, which generates, Make the manufacture of device, the operating device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
The operation of these computer programs also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The operation executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all Made any modifications, equivalent replacements, and improvements etc. within the spirit and principles in the present invention, should be included in protection of the invention Within the scope of.

Claims (11)

1. a kind of information processing method, the information processing method is applied to the communication network comprising block chain node, feature It is, which comprises
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network Point;
The received first information of institute is stored in the block chain node by the first node.
2. the method according to claim 1, wherein it is described according to the received first information type into The corresponding processing of row, comprising:
When judging the first information for the information of the first kind, the second information is obtained;
The first information is added by the block head cryptographic Hash of the block node of the second information institute save location Close processing;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information is for characterizing, described first transmitted by first user stored as the block chain node Previous information of information.
3. the method according to claim 1, wherein it is described according to the received first information type into The corresponding processing of row, comprising:
When judging the first information for the information of Second Type, based on the first encryption key corresponding to first user It is encrypted, the Second Type is stored in respective block chain by the communication network for characterizing first user Node but underground information.
4. the method according to claim 1, wherein it is described according to the received first information type into The corresponding processing of row, comprising:
When judging the first information for the information of third type, based on close with the second encryption corresponding to first user The first information is encrypted in key;
By with public key corresponding to user pointed by the first information, to corresponding to first user second encryption it is close Key is encrypted, and obtains the second encryption key Jing Guo encryption;
By second encryption key by encryption, and the first information by second encryption keys processing It is handled jointly, forms encryption envelope;
The third type is directed toward information disclosed in specific user by the communication network for characterizing first user.
5. the method according to claim 1, wherein the received first information of institute is stored in by the first node In the block chain node, comprising:
The first node obtains the parameter information of block chain node corresponding with the first node;
Based on the parameter information of the block chain node corresponding with first node, the first information is stored in corresponding area In block chain node.
6. the method according to claim 1, wherein the method also includes:
At least one node in the first node receives the solicited message that second user is sent;
Information in response to the request obtains the third information that block chain node is saved in the communication network;
According to the type of the third information, Xiang Suoshu second user pushes the third information.
7. according to the method described in claim 6, it is characterized in that, the type according to the third information, Xiang Suoshu Two users push the third information, comprising:
When the third information is the information of third type, obtained and described the according to the encryption envelope in the third information The corresponding decruption key of three information;
The third information is decrypted according to the acquired decruption key, the third Jing Guo decryption processing is believed It ceases and is pushed to the second user.
8. the method according to the description of claim 7 is characterized in that the encryption envelope according in the third information obtains Before decruption key corresponding with the third information, the method also includes:
The second user sends authentication request to first user by least one node in the first node;
First user response is sent in the authentication request, Xiang Suoshu second user and the node for sending the authentication request Second prompt information, second prompt information be used for prompt it is described send authentication request node described in second user obtain or The permission for browsing the third information is not obtained.
9. a kind of information processing unit, applied to the communication network comprising block chain node, which is characterized in that described device packet It includes:
Signal dispatcher module, for receiving the first information of the first user transmission, the first information is for characterizing the first user The information including at least social content issued by client;
Message processing module, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module, for that will be sent by the respective treated first information to first node, the first node For characterizing node corresponding to all social interaction server providers in the communication network;
The message processing module, for the received first information of institute to be stored in the block chain node.
10. a kind of information processing unit, which is characterized in that described device includes:
Processor and memory for storing the computer program that can be run on a processor,
Wherein, the processor is for when running the computer program, executing following operation:
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network Point;
The received first information of institute is stored in the block chain node by the first node.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt Processor executes:
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network Point;
The received first information of institute is stored in the block chain node by the first node.
CN201811027778.6A 2018-09-04 2018-09-04 A kind of information processing method, device and storage medium Pending CN109460993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811027778.6A CN109460993A (en) 2018-09-04 2018-09-04 A kind of information processing method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811027778.6A CN109460993A (en) 2018-09-04 2018-09-04 A kind of information processing method, device and storage medium

Publications (1)

Publication Number Publication Date
CN109460993A true CN109460993A (en) 2019-03-12

Family

ID=65606464

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811027778.6A Pending CN109460993A (en) 2018-09-04 2018-09-04 A kind of information processing method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109460993A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472874A (en) * 2019-08-16 2019-11-19 上海天地汇供应链科技有限公司 Getting rid of based on block chain hangs dispatching method and system, control centre's node
CN111182042A (en) * 2019-12-20 2020-05-19 周梦洁 Related information pushing system and method based on block chain
CN111865761A (en) * 2020-07-02 2020-10-30 中通服创发科技有限责任公司 Social chat information evidence storing method based on block chain intelligent contracts

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377560A (en) * 2010-08-19 2012-03-14 北京韩美智恒科技有限公司 Data encryption method and device for mobile communication terminal
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN107592293A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN108306819A (en) * 2018-04-20 2018-07-20 网易(杭州)网络有限公司 Instant communicating system implementation method, medium and computing device based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102377560A (en) * 2010-08-19 2012-03-14 北京韩美智恒科技有限公司 Data encryption method and device for mobile communication terminal
CN106100981A (en) * 2016-08-22 2016-11-09 布比(北京)网络技术有限公司 Social network data exchange method and device
CN107592293A (en) * 2017-07-26 2018-01-16 阿里巴巴集团控股有限公司 The means of communication, digital certificate management method, device and electronic equipment between block chain node
CN108306819A (en) * 2018-04-20 2018-07-20 网易(杭州)网络有限公司 Instant communicating system implementation method, medium and computing device based on block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110472874A (en) * 2019-08-16 2019-11-19 上海天地汇供应链科技有限公司 Getting rid of based on block chain hangs dispatching method and system, control centre's node
CN111182042A (en) * 2019-12-20 2020-05-19 周梦洁 Related information pushing system and method based on block chain
CN112395497A (en) * 2019-12-20 2021-02-23 周梦洁 Related information pushing system based on block chain
CN112417268A (en) * 2019-12-20 2021-02-26 周梦洁 Block chain-based related information pushing method
CN111865761A (en) * 2020-07-02 2020-10-30 中通服创发科技有限责任公司 Social chat information evidence storing method based on block chain intelligent contracts

Similar Documents

Publication Publication Date Title
CN103379098B (en) Content sharing method, device and network system thereof
US8666904B2 (en) System and method for trusted embedded user interface for secure payments
CN102595404B (en) For storing and executing the method and device of access control clients
US8220035B1 (en) System and method for trusted embedded user interface for authentication
RU2434352C2 (en) Reliable authentication method and device
US9397988B2 (en) Secure portable store for security skins and authentication information
KR100463736B1 (en) Method for permitting debugging and testing of software on mobile communication device in a secure environment
CN107743133A (en) Mobile terminal and its access control method and system based on trustable security environment
CN110324276A (en) A kind of method, system, terminal and electronic equipment logging in application
US9787672B1 (en) Method and system for smartcard emulation
AU2016259459B2 (en) Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon
CN106850699A (en) A kind of mobile terminal login authentication method and system
US20140156531A1 (en) System and Method for Authenticating Transactions Through a Mobile Device
CN106878245B (en) Graphic code information providing and obtaining method, device and terminal
US20130125197A1 (en) Relying Party Specifiable Format for Assertion Provider Token
US20100088236A1 (en) Secure software service systems and methods
CN103051451A (en) Encryption authentication of security service execution environment
JP2008527905A (en) Security code generation method, method using security code generation method, and programmable apparatus for security code generation method
US20140227999A1 (en) Method, server and system for authentication of a person
US9438595B2 (en) Network resource access control methods and systems using transactional artifacts
WO2023005838A1 (en) Data sharing method and electronic device
CN109460993A (en) A kind of information processing method, device and storage medium
KR102329221B1 (en) Blockchain-based user authentication model
CN107920060A (en) Data access method and device based on account
Casey et al. An interoperable architecture for usable password-less authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB03 Change of inventor or designer information

Inventor after: Bai Hongtao

Inventor after: Li Lin

Inventor after: Zhu Qi

Inventor before: Bai Hongtao

Inventor before: Li Lin

CB03 Change of inventor or designer information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190312

RJ01 Rejection of invention patent application after publication