CN109460993A - A kind of information processing method, device and storage medium - Google Patents
A kind of information processing method, device and storage medium Download PDFInfo
- Publication number
- CN109460993A CN109460993A CN201811027778.6A CN201811027778A CN109460993A CN 109460993 A CN109460993 A CN 109460993A CN 201811027778 A CN201811027778 A CN 201811027778A CN 109460993 A CN109460993 A CN 109460993A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- node
- type
- communication network
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L51/00—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail
- H04L51/52—User-to-user messaging in packet-switching networks, transmitted according to store-and-forward or real-time protocols, e.g. e-mail for supporting social networking services
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/0822—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using key encryption key
Abstract
The invention discloses a kind of information processing methods, the information processing method is applied to the communication network comprising block chain node, it include: the first information for receiving the first user and sending, the first information is used to characterize the first user and passes through the information including at least social content that client is issued;According to the type of the received first information perform corresponding processing, will be sent by the respective treated first information to first node, the first node is used to characterize node corresponding to all social interaction server providers in the communication network;The received first information of institute is stored in the block chain node by the first node.The invention also discloses a kind of information processing unit and storage mediums.
Description
Technical field
The present invention relates to the information processing technology in the communication network comprising block chain node, especially a kind of information processing
Method, apparatus and storage medium.
Background technique
In the prior art, the social networks system of centralization is being attacked due to the data information of centrally stored user
When, the data information that user is stored easily is lost, also, in the social networks system of centralization, the operator of social networks
Possess the absolute permission for checking all customer data, also affects the safety of user data.Simultaneously as different social softwares
It not can be carried out data exchange between service provider, so that the message that same user is issued may only be taken by same social software
The user of business provider sees, increases the use burden of user, influences the usage experience of user.
Summary of the invention
In view of this, can be realized an embodiment of the present invention is intended to provide a kind of information processing method by communication network
Block chain node storage user data information, realize that user to data absolutely control, avoids in
Heart service provider fully controls the defect of user data.Meanwhile solving centralization storing data when by attacking, it uses
The problem of user data is lost completely.Also, user no longer needs to download the application program for installing different social software service providers, i.e.,
Data general-purpose can be achieved, avoid the operating burden of user, the user experience is improved.
In order to achieve the above objectives, the technical solution of the embodiment of the present invention is achieved in that
The embodiment of the invention provides a kind of information processing method, the information processing method is applied to include block chain link
The communication network of point, comprising:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client
The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through
It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network
Node;
The received first information of institute is stored in the block chain node by the first node.
In above scheme, before receiving the first information that the first user sends, the method also includes:
Receive the login authentication information that first user sends;
Based on the received login authentication information of institute, the logon rights of first user are verified.
In above scheme, the login authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code
Information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of the first kind, the second information is obtained;
By the block head cryptographic Hash of the block node of the second information institute save location to the first information into
Row encryption;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in
Previous information of the first information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of Second Type, based on corresponding to first user first encryption
Key is encrypted, and the Second Type is stored in respective area by the communication network for characterizing first user
Block chain node but underground information.
In above scheme, it is described according to the type of the received first information perform corresponding processing, comprising:
When judging the first information for the information of third type, based on corresponding to first user second encryption
The first information is encrypted in key;
By with public key corresponding to user pointed by the first information, to corresponding to first user second plus
Key is encrypted, and obtains the second encryption key Jing Guo encryption;
By second encryption key by encryption, and first by second encryption keys processing
Information is handled jointly, forms encryption envelope;
The third type is directed toward disclosed in specific user for characterizing first user by the communication network
Information.
In above scheme, the received first information of institute is stored in the block chain node by the first node, comprising:
The first node obtains the parameter information of block chain node corresponding with the first node;
Based on the parameter information of the block chain node corresponding with first node, the first information is stored in accordingly
Block chain node in.
In above scheme, the method also includes:
The first node obtains the storage information of whole block chain nodes in the communication network.
In above scheme, the parameter information of the block chain node corresponding with the first node, comprising:
The block header information and block body information of block chain node corresponding with the first node;
The block header information includes at least one:
It is the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block, current
The timestamp information of block and the credible tree information of current block;
The block body information includes at least one:
The first information transmitted by serial number information, user identity information, first user and/or second user.
In above scheme, the method also includes:
At least one node in the first node receives the solicited message that second user is sent;
Information in response to the request obtains the third information that block chain node is saved in the communication network;
According to the type of the third information, Xiang Suoshu second user pushes the third information.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information,
Include:
When the third information is the information of the first kind, the acquired third information is decrypted,
Third information Jing Guo decryption processing is pushed to the second user.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information,
Include:
When the third information is the information of Second Type, the acquired third information is abandoned, and to described
Second user issues the first prompt information, and first prompt information prompts the second user that can not obtain such for characterizing
Type information.
In above scheme, the type according to the third information, Xiang Suoshu second user pushes the third information,
Include:
When the third information be third type information when, according in the third information encryption envelope obtain and institute
State the corresponding decruption key of third information;
The third information is decrypted according to the acquired decruption key, by the by decryption processing
Three information are pushed to the second user.
In above scheme, the encryption envelope according in the third information obtains solution corresponding with the third information
Before key, the method also includes:
The second user sends authentication to first user by least one node in the first node and asks
It asks;
First user response is in the authentication request, Xiang Suoshu second user and the node for sending the authentication request
The second prompt information is sent, second prompt information is used to that second user described in the node for sending authentication request to be prompted to obtain
Obtain or do not obtain the permission for browsing the third information.
The embodiment of the invention also provides a kind of information processing unit, applied to the communication network comprising block chain node,
Include:
Signal dispatcher module, for receiving the first information of the first user transmission, the first information is for characterizing first
User passes through the information including at least social content that client is issued;
Message processing module, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module, for that will be sent by the respective treated first information to first node, described first
Node is used to characterize node corresponding to all social interaction server providers in the communication network;
The message processing module, for the received first information of institute to be stored in the block chain node.
In above scheme,
The signal dispatcher module, the Sign-On authentication information sent for receiving first user;
The message processing module, for being stepped on to first user based on the received login authentication information
Land permission is verified.
In above scheme, the Sign-On authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code
Information.
In above scheme,
The message processing module when for judging the first information for the information of the first kind, obtains the second information;
The message processing module, the block head for the block node by the second information institute save location are breathed out
The first information is encrypted in uncommon value;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in
Previous information of the first information.
In above scheme,
The message processing module, for based on being carried out at encryption with the first encryption key corresponding to first user
Reason, the Second Type are stored in respective block chain node but injustice by the communication network for characterizing first user
The information opened.
In above scheme,
The message processing module, for based on the second encryption key corresponding to first user, to described
One information is encrypted;
The message processing module, for by with public key corresponding to user pointed by the first information, to described
Second encryption key corresponding to first user is encrypted, and obtains the second encryption key Jing Guo encryption;
The message processing module for by second encryption key by encryption, and passes through described second
The first information of encryption keys processing is handled jointly, forms encryption envelope;
The third type is directed toward disclosed in specific user for characterizing first user by the communication network
Information.
In above scheme,
The message processing module, for obtaining the parameter information of block chain node corresponding with the first node;
The message processing module will for the parameter information based on the block chain node corresponding with first node
The first information is stored in corresponding block chain node.
In above scheme,
The message processing module, for obtaining the storage information of whole block chain nodes in the communication network.
In above scheme, the parameter information of the block chain node corresponding with the first node, comprising:
The block header information and block body information of block chain node corresponding with the first node;
The block header information includes at least one:
It is the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block, current
The timestamp information of block and the credible tree information of current block;
The block body information includes at least one:
The first information transmitted by serial number information, user identity information, first user and/or second user.
In above scheme,
The signal dispatcher module, for receiving the solicited message of second user transmission;
The message processing module obtains block chain node in the communication network for information in response to the request
The third information saved;
The signal dispatcher module, for the type according to the third information, Xiang Suoshu second user push described the
Three information.
In above scheme,
The message processing module will be by decryption for the acquired third information to be decrypted
The third information of reason is pushed to the second user.
In above scheme,
The message processing module for abandoning the acquired third information, and is issued to the second user
First prompt information, first prompt information prompt the second user that can not obtain the type information for characterizing.
In above scheme,
The message processing module, for being obtained and the third information pair according to the encryption envelope in the third information
The decruption key answered;
The message processing module, for place to be decrypted to the third information according to the acquired decruption key
Reason;
The signal dispatcher module, the third information for that will pass through decryption processing are pushed to the second user.
In above scheme,
The signal dispatcher module, for sending authentication request to first user;
The message processing module, in response to the authentication request, Xiang Suoshu second user and the transmission authentication
The node of request sends the second prompt information, and second prompt information is used to prompt described in the node for sending authentication request
Second user obtains or does not obtain the permission for browsing the third information.
The embodiment of the invention also provides a kind of information processing units, comprising:
Processor and memory for storing the computer program that can be run on a processor,
Wherein, the processor is for when running the computer program, executing following operation:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client
The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through
It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network
Node;
The received first information of institute is stored in the block chain node by the first node.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, special
Sign is that the computer program is executed by processor:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client
The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through
It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network
Node;
The received first information of institute is stored in the block chain node by the first node.
User information can be directly stored in the block chain node by the embodiment of the present invention, avoid some service
The problem of provider closes down or is attacked and relevant user information is lost completely.Meanwhile user may be implemented to itself
The control of data, improves user information safety, improves the experience of user.
Detailed description of the invention
Fig. 1 is one optional process schematic of information processing method provided in an embodiment of the present invention;
Fig. 2 is an optional structural schematic diagram of information processing unit provided in an embodiment of the present invention;
Fig. 3 is one use environment schematic diagram of information processing method provided in an embodiment of the present invention;
Fig. 4 is the schematic diagram that user is registered in a communication network by client realization in the embodiment of the present invention;
Fig. 5 is one optional process schematic of information processing method provided in an embodiment of the present invention;
Fig. 6 is one composition schematic diagram of information processing unit of the embodiment of the present invention.
Specific embodiment
The characteristics of in order to more fully hereinafter understand the embodiment of the present invention and technology contents, with reference to the accompanying drawing to this hair
The realization of bright embodiment is described in detail, appended attached drawing purposes of discussion only for reference, is not used to limit the present invention.
Before the present invention will be described in further detail, noun involved in the embodiment of the present invention and term are said
Bright, noun involved in the embodiment of the present invention and term are suitable for following explanation.
1) user information, for characterizing the information of user's sending, such as social information.
2) first information passes through the information including at least social content that client is issued for characterizing the first user.
3) the second information is for characterizing, described the transmitted by first user stored as the block chain node
Previous information of one information.
4) first kind passes through information disclosed in the communication network for characterizing first user.
5) Second Type, for characterize first user by the communication network be stored in respective block chain node but
Underground information.
6) third type is directed toward letter disclosed in specific user by the communication network for characterizing first user
Breath.
7) the first encryption key, for characterizing the private key of the first user, for encrypting first user in communication network
Middle saved Second Type information.
8) the second encryption key includes at least social content by what client was issued to first user for characterizing
Key used in information ciphering process.
Fig. 1 is one optional process schematic of information processing method provided in an embodiment of the present invention, as shown in Figure 1, this
Inventive embodiments provide information processing method one optional process the following steps are included:
Step 101: receiving the first information that the first user sends;
Wherein, the first information be used to characterize the first user by client issued including at least social content
Information.
Step 102: according to the type of the received first information perform corresponding processing, will pass through respective treated
The first information is sent to first node;
Wherein, the first node is used to characterize section corresponding to all social interaction server providers in the communication network
Point;
Step 103: the received first information of institute is stored in the block chain node by the first node.
In one embodiment of the invention, before receiving the first information that the first user sends, the method also includes:
Receive the Sign-On authentication information that first user sends;Based on the received login authentication information of institute, use described first
The load right at family is verified.Since after logining successfully, user can modify and delete to the corresponding information saved
It removes, therefore, during initiating logon operation, needs the load right to the first user to verify, to prevent user from believing
Breath is illegally distorted.
In one embodiment of the invention, the Sign-On authentication information includes at least one: first user
Username information, first user password information, the verification code information of first user.It is stepped on by a variety of different
The combination of land verification information can effectively promote the safety in first process of user login.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly
Reason, comprising: when judging the first information for the information of the first kind, obtain the second information;It is protected by second information
The first information is encrypted in the block head cryptographic Hash for depositing the block node of position;The first kind is used for table
It levies first user and passes through information disclosed in the communication network;Second information is for characterizing, by the block chain link
Previous information of the first information transmitted by first user that point is stored.Technology shown in through this embodiment
Scheme, when the received information type of institute be first user by information disclosed in the communication network when, show described the
One user wishes all with that can watch this information per family in communication network, therefore, passes through being protected previous information
The first information is encrypted in the block head cryptographic Hash for depositing the block node of position, optionally, uses previous item
The block head hash value of block where information is as the institute being sent in the communication network after password progress cleartext information encryption
There is service provider node, so that all service provider nodes in the communication network can obtain first user
Wish the first kind information shown.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly
Reason, comprising: when judging the first information for the information of Second Type, based on corresponding to first user first encrypt
Key is encrypted, and the Second Type is stored in respective area by the communication network for characterizing first user
Block chain node but underground information.Technical solution shown in through this embodiment, when user uses the process of relative client
In, it is desirable to when corresponding user information is only saved in a communication network, by being added using first user corresponding first
The close corresponding Second Type information of key pair is encrypted, wherein first encryption key is first user's
Private key, hereby it is achieved that for the kept secure of user information.
In one embodiment of the invention, it is described according to the type of the received first information located accordingly
Reason, comprising: when judging the first information for the information of third type, based on corresponding to first user second encrypt
The first information is encrypted in key;By with public key corresponding to user pointed by the first information, to institute
It states the second encryption key corresponding to the first user to be encrypted, obtains the second encryption key Jing Guo encryption;It will
Second encryption key by encryption, and by second encryption keys processing the first information jointly into
Row processing forms encryption envelope;The third type is specific by communication network direction for characterizing first user
Information disclosed in user.Technical solution shown in through this embodiment is deposited in first user by the communication network
When storing up the information of third type, viewing the type is enjoyed since first user is intended merely to a part of user in communication network
The permission of information, therefore, can by with public key corresponding to user pointed by the first information, to the first user institute
Corresponding second encryption key is encrypted, and obtains the second encryption key Jing Guo encryption;By described by encryption
Second encryption key of processing, and handled jointly by the first information that second encryption keys are handled, it is formed
The server of related service quotient after from encryption envelope to the communication network is sent, to realize that target user can watch accordingly
Third type information.
In one embodiment of the invention, the received first information of institute is stored in the block chain by the first node
In node, comprising: the first node obtains the parameter information of block chain node corresponding with the first node;Based on described
The parameter information of block chain node corresponding with first node, the first information is stored in corresponding block chain node.
Further, the method also includes the storage letters that: the first node obtains whole block chain nodes in the communication network
Breath.The parameter information of the block chain node corresponding with the first node, comprising: block corresponding with the first node
The block header information and block body information of chain node;The block header information includes at least one: current block
Block head cryptographic Hash, the block head cryptographic Hash of a upper block for the current block, current block timestamp information and
The credible tree information of current block;The block body information includes at least one: serial number information, user identity information, institute
State the first information transmitted by the first user and/or second user.Technical solution shown in through this embodiment, by obtaining phase
The block head information and block body information in block chain network are answered, the information that can timely send first user is protected
There are in corresponding block.Further, previous information institute has been all made of since first user issues every information
It is encrypted in the block head Hash of block as key, service provider needs to store complete chain, can just decrypt every
Message;If chain is imperfect, there are part messages can not decrypt the risk being shown, and therefore, service provider only has
All information that all users are issued all are actively added in the chain of oneself maintenance, are just had and are provided all displaying users of user
The ability of any transmitted information, it is possible thereby to guarantee, the integrality of user data.
It in one embodiment of the invention, can be by institute after first user completes the publication and storage of information
It states any user in communication network to initiate to check the request of the relevant information of first user, specifically include:
At least one node in the first node receives the solicited message that second user is sent;In response to the request
Information obtains the third information that block chain node is saved in the communication network;According to the type of the third information, to institute
It states second user and pushes the third information.Technical solution shown in through this embodiment, can be according in the communication network
The type for the information that block chain node is saved pushes corresponding information to the user for initiating request.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user
The third information, comprising:
When the third information is the information of the first kind, the acquired third information is decrypted,
Third information Jing Guo decryption processing is pushed to the second user.Technical solution shown in through this embodiment, when described
The type of third information be the first kind information when, show in the communication network use can watch per family it is described first use
Therefore the user information that family is saved pushes the third information Jing Guo decryption processing to the second user, it is ensured that institute
It states all with the information that can check the first kind per family in communication network.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user
The third information, comprising:
When the third information is the information of Second Type, the acquired third information is abandoned, and to described
Second user issues the first prompt information, and first prompt information prompts the second user that can not obtain such for characterizing
Type information.Technical solution shown in through this embodiment, when the second user to be checked be the information of Second Type when,
Node can be leaked by automatically abandoning the acquired third information to avoid the information of user, while by institute
It states second user and issues the first prompt information to prompt the second user lack of competence to check the information;Further, the section
Point can also send prompt information to first user, prompt described first user someone to wish to check Second Type to realize
Information, but it is failed.
In one embodiment of the invention, the type according to the third information, the push of Xiang Suoshu second user
The third information, comprising:
When the third information be third type information when, according in the third information encryption envelope obtain and institute
State the corresponding decruption key of third information;The third information is decrypted according to the acquired decruption key,
Third information Jing Guo decryption processing is pushed to the second user.
In one embodiment of the invention, the encryption envelope according in the third information obtains and the third
Before the corresponding decruption key of information, the method also includes:
The second user sends authentication to first user by least one node in the first node and asks
It asks;First user response is sent in the authentication request, Xiang Suoshu second user and the node for sending the authentication request
Second prompt information, second prompt information be used for prompt it is described send authentication request node described in second user obtain or
The permission for browsing the third information is not obtained.Technical solution shown in through this embodiment, when the second user requests to see
When seeing the information of third type, determine whether the second user has the power for checking the type information by authentication request first
Limit, when determining that the second user can check the type information, by being obtained according to the encryption envelope in the third information
Take decruption key corresponding with the third information;The third information is decrypted according to the acquired decruption key
Processing, the third information Jing Guo decryption processing is pushed to the second user, realizes that target user watches the letter of third type
Breath, it is preferred that when carrying out the operation of same type again for the user by authentication, it is convenient to omit authentication operations, to promote use
Family obtains the speed of corresponding information, promotes the use feeling of user.
Fig. 2 is an optional structural schematic diagram of information processing unit provided in an embodiment of the present invention, as shown in Fig. 2,
One optional structure of information processing unit provided in an embodiment of the present invention, comprising:
Signal dispatcher module 201, for receiving the first information of the first user transmission, the first information is for characterizing the
One user passes through the information including at least social content that client is issued;
Message processing module 202, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module 201, for that will be sent by the respective treated first information to first node, described the
One node is used to characterize node corresponding to all social interaction server providers in the communication network;
The message processing module 202, for the received first information of institute to be stored in the block chain node.
In one embodiment of the invention, the signal dispatcher module 201, for receiving the first user transmission
Sign-On authentication information;The message processing module 202, for being based on the received login authentication information of institute, to described first
The load right of user is verified.
In one embodiment of the invention, the Sign-On authentication information includes at least one:
The username information of first user, the password information of first user, first user identifying code
Information.Since after logining successfully, user can modify and delete to the corresponding information saved, therefore, initiating to step on
During land operates, the load right to the first user is needed to verify, to prevent user information from illegally being distorted.Pass through
The combination of a variety of different Sign-On authentication information can effectively promote the safety in first process of user login.
In one embodiment of the invention, the message processing module 202, for judging the first information for first
When the information of type, the second information is obtained;
The message processing module 202, the block head for the block node by the second information institute save location
The first information is encrypted in portion's cryptographic Hash;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information for characterizing, transmitted by first user stored as the block chain node described in
Previous information of the first information.Technical solution shown in through this embodiment, when the received information type of institute is described first
When user is by information disclosed in the communication network, show that first user wishes that all use in communication network per family may be used
To watch this information, therefore, by by the block head cryptographic Hash pair of the block node of institute's save location of previous information
The first information is encrypted, and optionally, uses the block head hash value of previous information place block as password
All service provider nodes being sent to after progress cleartext information encryption in the communication network, so that in the communication network
All service provider nodes can obtain first user wish show first kind information.
In one embodiment of the invention, the message processing module 202, for based on right with first user
The first encryption key answered is encrypted, and the Second Type passes through the communication network for characterizing first user
It is stored in respective block chain node but underground information.Technical solution shown in through this embodiment, when user uses accordingly
During client, it is desirable to when corresponding user information is only saved in a communication network, by utilizing first user
Corresponding Second Type information is encrypted in corresponding first encryption key, wherein the first encryption code key is institute
The private key of the first user is stated, hereby it is achieved that for the kept secure of user information.
In one embodiment of the invention, the message processing module 202, for based on right with first user
The second encryption key answered, is encrypted the first information;The message processing module 202, for by with institute
Public key corresponding to user pointed by the first information is stated, the second encryption key corresponding to first user is carried out at encryption
Reason obtains the second encryption key Jing Guo encryption;The message processing module 202, for passing through encryption for described
The second encryption key, and by second encryption keys processing the first information handled jointly, formed encryption
Envelope;The third type is directed toward letter disclosed in specific user by the communication network for characterizing first user
Breath.Technical solution shown in through this embodiment stores the letter of third type in first user by the communication network
When breath, since first user is intended merely to the permission that a part of user in communication network enjoys viewing the type information, because
This, can by with public key corresponding to user pointed by the first information, to corresponding to first user second plus
Key is encrypted, and obtains the second encryption key Jing Guo encryption;Second by encryption is added
Key, and handled jointly by the first information that second encryption keys are handled, it is backward to form encryption envelope
The server of related service quotient in the communication network is sent, to realize that target user can watch corresponding third type
Information.
In one embodiment of the invention, the message processing module 202, it is corresponding with the first node for obtaining
Block chain node parameter information;The message processing module 202, for based on the block chain corresponding with first node
The first information is stored in corresponding block chain node by the parameter information of node.
In one embodiment of the invention, the message processing module 202, for obtaining in the communication network all
The storage information of block chain node.Wherein, the parameter information of the block chain node corresponding with the first node, comprising:
The block header information and block body information of block chain node corresponding with the first node;The block header information includes
At least one: the block head cryptographic Hash of current block, the block head cryptographic Hash of a upper block for the current block,
The timestamp information of current block and the credible tree information of current block;The block body information includes at least one: sequence
The first information transmitted by number information, user identity information, first user and/or second user.Institute through this embodiment
The technical solution shown can be timely by institute by obtaining block head information and block body information in respective block chain network
The information for stating the first user transmission, is stored in corresponding block.Further, since first user issues every letter
The block head Hash of block is encrypted as key where breath has been all made of previous information, and service provider needs to have stored
Whole chain can just decrypt every message;If chain is imperfect, there are part messages can not decrypt the wind being shown
Danger, therefore, all information that service provider is only issued all users are all actively added in the chain of oneself maintenance, are just had
It is standby that all abilities for showing any transmitted information of user of user are provided, it is possible thereby to guarantee, the integrality of user data.
In one embodiment of the invention, the signal dispatcher module 201, for receiving the request of second user transmission
Information;The message processing module 202 obtains block chain node in the communication network for information in response to the request
The third information saved;The signal dispatcher module 201, for the type according to the third information, Xiang Suoshu second is used
Family pushes the third information.Technical solution shown in the present embodiment is crossed, it can be according to block chain node in the communication network
The type of the information saved pushes corresponding information to the user for initiating request.
In one embodiment of the invention, the message processing module 202, for the acquired third information
It is decrypted, the third information Jing Guo decryption processing is pushed to the second user.Cross technology shown in the present embodiment
Scheme, when the type of the third information is the information of the first kind, show in the communication network with can see per family
It sees the user information that first user is saved, therefore, the third information Jing Guo decryption processing is pushed away to the second user
It send, it is ensured that all with the information that can check the first kind per family in the communication network.
In one embodiment of the invention, the message processing module 202, for by the acquired third information
It abandons, and issues the first prompt information to the second user, first prompt information is used for characterizing prompt described second
Family can not obtain the type information.Technical solution shown in through this embodiment, what is checked when the second user is
When the information of two types, node can be let out by automatically abandoning the acquired third information to avoid the information of user
Dew, while by issuing the first prompt information to the second user to prompt the second user lack of competence to check the information;
Further, the node can also send prompt information to first user, prompt described first user someone to realize
Wish to check the information of Second Type, but failed.
In one embodiment of the invention, the message processing module 202, for according to adding in the third information
Secret letter envelope obtains decruption key corresponding with the third information;The message processing module 202, for according to acquired institute
Decruption key is stated the third information is decrypted;The signal dispatcher module 201, for decryption processing will to be passed through
Third information is pushed to the second user.
In one embodiment of the invention, the signal dispatcher module 201 is authenticated for sending to first user
Request;The message processing module 202, in response to the authentication request, Xiang Suoshu second user and the transmission authentication
The node of request sends the second prompt information, and second prompt information is used to prompt described in the node for sending authentication request
Second user obtains or does not obtain the permission for browsing the third information.Technical solution shown in through this embodiment, when described
When the information of second user request viewing third type, determine whether the second user checks this by authentication request first
The permission of type information, when determining that the second user can check the type information, by according in the third information
Encryption envelope obtain corresponding with third information decruption key;According to the acquired decruption key to the third
Information is decrypted, and the third information Jing Guo decryption processing is pushed to the second user, realizes target user's viewing
The information of third type.Meanwhile user is in use, for third information be third type (such as personal letter) the case where,
When the group that can read personal letter to one sends information, it may not be necessary to this process is authenticated, only (someone can be with to more people
Read personal letter, someone's lack of competence read) send when just may require that authentication process, it is possible thereby to realize enhancing user handle it is flexible
Property.
Fig. 3 is one use environment schematic diagram of information processing method provided in an embodiment of the present invention, as shown in figure 3, diagram
Information processing method is applied to the communication network comprising block chain node, wherein user 1 and user 2 is in the communication networks
Different user, service provider 1, service provider 2, service provider 3, service provider 4 are not by application program
Provider server constitutes communication network by being in communication with each other between corresponding server.Its provided application program
It can be different types of social program.Further, shape between social platform or social interaction server provider node and user
At the communication network, user node generates and consumes node as user social contact data, and social platform or social interaction server provide
Quotient's server node is accounting nodes, is responsible for collecting the social information that user mass-sends in the communication network.Meanwhile it is social flat
Platform or social interaction server provider provide client software, and user shows user social contact information.User management uses central node machine
System, user can register in any client, and different clients uses the subscriber management service of the same central node
Device realizes the registration of user, logs in the account management operations such as management.
Fig. 4 is the schematic diagram that user is registered in a communication network by client realization in the embodiment of the present invention, such as Fig. 4 institute
Show, comprising the following steps:
Step 401: user issues register instruction;
Step 402: user submits registration information;
Step 403: the registration information of user is committed to subscriber management server by client;
Step 404: subscriber management server completes user's registration according to the registration information;
Step 405: subscriber management server registers customers as result and sends to the client;
Step 406: the registering result of user is notified the user by the client.
Since the user issues the block head Hash conduct of block where every information has been all made of previous information
Key encrypts, and service provider needs to store complete chain, can just decrypt every message;If chain is imperfect,
There are part messages can not decrypt the risk being shown, and therefore, service provider is only issued all users all
Information is all actively added in the chain of oneself maintenance, is just had and is provided all energy for showing any transmitted information of user of user
Power, it is possible thereby to guarantee, the integrality of user data.Therefore, user is in registration process no matter using in the communication network
Any client, can complete to register, increase the selection flexibility of user, the user experience is improved.
Fig. 5 is one optional process schematic of information processing method provided in an embodiment of the present invention, as shown in figure 5, this
Inventive embodiments provide information processing method one optional process the following steps are included:
Step 501: user issues login instruction;
Step 502: user submits login authentication information to client;
Step 503: the client submits the login authentication information of the user to subscriber management server;
Step 504: the subscriber management server verifies the log-on message of the user;
Step 505: subscriber management server issues the response message of verification result to the client;
Step 506: when the user logins successfully, being based on corresponding account information, read in respective block and saved
User information, Xiang Suoshu user show;
Step 507: when user login is failed, user being prompted to log in again.
In one embodiment of the invention, when the client is microblogging client, any clothes are can be used in user
The client that business provider is issued, editor user's microblogging, and it is sent to all service provider nodes.
In one embodiment of the invention, the information of full disclosure is thought for user, then using where previous information
The block head hash value of block is mentioned as all services that password be sent in the communication network after cleartext information encryption
For quotient's node.
Further, it is not desired to disclosed information for user, then the information is encrypted by the customized key of user and is formed
Cipher-text information is sent to all service provider nodes in the communication network.
Further, for user just for the addressable information of specific user, such as personal letter can be by encrypting the information
After form cipher-text information, and with the corresponding encryption key of the public key encryption of the specific user, be formed together number with cipher-text information
Encrypt envelope, all service providers being sent in the communication network.
Service provider receives after user is published to user's micro-blog information of the communication network, by user's micro-blog information
It is added in chain.
In one embodiment of the invention, close towards information disclosed in all users for the user for issuing micro-blog information
Literary form enters chain, i.e., disclosed social information, then the accessible browsing of other users.
Enter chain towards the ciphertext form of specific user for the user for issuing micro-blog information, i.e. the part that is only facing of personal letter is used
The social informations such as microblogging disclosed in family, then client synchronous obtain when user releases news from server when showing is sent out simultaneously
The digital envelope of cloth obtains decruption key, to carry out the displaying of personal letter information.Or it is intended to access the users of these information and can lead to
Cross client to issue micro-blog information user initiate information browse request, by sending micro-blog information user by client into
It can be checked after row authorization.
Simultaneously as all service providers can receive the social datas such as the microblogging of user's publication, therefore other are used
The wall between different service providers is broken using the micro-blog information of the accessible user for issuing micro-blog information of any client in family
It builds, the user for issuing micro-blog information does not need repeatedly to issue same message in different clients.
Fig. 6 is one composition schematic diagram of information processing unit of the embodiment of the present invention, as shown in fig. 6, information processing unit 600
It can be with including mobile phone, computer, digital broadcast terminal, information transceiving equipment, trip with the information processing function
Play console, tablet device, Medical Devices, body-building equipment, personal digital assistant etc..Information processing unit 600 shown in fig. 6 wraps
It includes: at least one processor 601, memory 602, at least one network interface 604 and user interface 603.Information processing unit
Various components in 600 are coupled by bus system 605.It is understood that bus system 605 for realizing these components it
Between connection communication.Bus system 605 further includes power bus, control bus and status signal in addition to including data/address bus
Bus.But for the sake of clear explanation, various buses are all designated as bus system 605 in Fig. 6.
Wherein, user interface 603 may include display, keyboard, mouse, trace ball, click wheel, key, button, sense of touch
Plate or touch screen etc..
It is appreciated that memory 602 can be volatile memory or nonvolatile memory, may also comprise volatibility and
Both nonvolatile memories.Wherein, nonvolatile memory can be read-only memory (ROM, Read Only Memory),
Programmable read only memory (PROM, Programmable Read-Only Memory), Erasable Programmable Read Only Memory EPROM
(EPROM, Erasable Programmable Read-Only Memory), electrically erasable programmable read-only memory
The storage of (EEPROM, Electrically Erasable Programmable Read-Only Memory), magnetic random access
Device (FRAM, ferromagnetic random access memory), flash memory (Flash Memory), magnetic surface are deposited
Reservoir, CD or CD-ROM (CD-ROM, Compact Disc Read-Only Memory);Magnetic surface storage can be
Magnetic disk storage or magnetic tape storage.Volatile memory can be random access memory (RAM, Random Access
Memory), it is used as External Cache.By exemplary but be not restricted explanation, the RAM of many forms is available, such as
Static random access memory (SRAM, Static Random Access Memory), synchronous static random access memory
(SSRAM, Synchronous Static Random Access Memory), dynamic random access memory (DRAM,
Dynamic Random Access Memory), Synchronous Dynamic Random Access Memory (SDRAM, Synchronous
Dynamic Random Access Memory), double data speed synchronous dynamic RAM (DDRSDRAM,
Double Data Rate Synchronous Dynamic Random Access Memory), enhanced synchronous dynamic random
Access memory (ESDRAM, Enhanced Synchronous Dynamic Random Access Memory), synchronized links
Dynamic random access memory (SLDRAM, SyncLink Dynamic Random Access Memory), direct rambus
Random access memory (DRRAM, Direct Rambus Random Access Memory).Description of the embodiment of the present invention is deposited
Reservoir 602 is intended to include the memory of these and any other suitable type.
Memory 602 in the embodiment of the present invention is for various types of data including storing user information to support to believe
Cease the operation of processing unit 600.The example of these data includes: any calculating for operating on information processing unit 600
Machine program, such as operating system 6021 and application program 6022;Contact data;Telephone book data;Message;Picture;Video etc..Its
In, operating system 6021 includes various system programs, such as ccf layer, core library layer, driving layer etc., for realizing various bases
Business and the hardware based task of processing.Application program 6022 may include various application programs, such as with information processing
Client, media player (Media Player), browser (Browser) of function etc., for realizing including information processing
Various applied business including program.Realize that the program of present invention implementation node scheduling method may be embodied in application program 6022
In.
The method that the embodiments of the present invention disclose can be applied in processor 601, or be realized by processor 601.
Processor 601 may be a kind of IC chip, the processing capacity with signal.During realization, the above method it is each
Step can be completed by the integrated logic circuit of the hardware in processor 601 or the operation of software form.Above-mentioned processing
Device 601 can be general processor, digital signal processor (DSP, Digital Signal Processor) or other can
Programmed logic device, discrete gate or transistor logic, discrete hardware components etc..Processor 601 may be implemented or hold
Disclosed each method, step and logic diagram in the row embodiment of the present invention.General processor can be microprocessor or appoint
What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present invention, can be embodied directly at hardware decoding
Reason device executes completion, or in decoding processor hardware and software module combine and execute completion.Software module can be located at
In storage medium, which is located at memory 602, and processor 601 reads the information in memory 602, in conjunction with its hardware
The step of completing preceding method.
In the exemplary embodiment, information processing unit 600 can be by one or more application specific integrated circuit
(ASIC, Application Specific Integrated Circuit), DSP, programmable logic device (PLD,
Programmable Logic Device), Complex Programmable Logic Devices (CPLD, Complex Programmable Logic
Device), field programmable gate array (FPGA, Field-Programmable Gate Array), general processor, control
Device, microcontroller (MCU, Micro Controller Unit), microprocessor (Microprocessor) or other electronics member
Part is realized, for executing the storing information processing method.
In the exemplary embodiment, the embodiment of the invention also provides a kind of computer readable storage medium, for example including
The memory 602 of computer program, above-mentioned computer program can be executed by the processor 601 of information processing unit 600, to complete
Step described in preceding method.Computer readable storage medium can be FRAM, ROM, PROM, EPROM, EEPROM, Flash
The memories such as Memory, magnetic surface storage, CD or CD-ROM;It is also possible to include one of above-mentioned memory or any group
The various equipment closed, such as mobile phone, computer, tablet device, personal digital assistant.
The embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer program, the meter
When calculation machine program is run by processor, execute:
The first information of the first user transmission is received, the first information is sent out for characterizing the first user by client
The information including at least social content out;
According to the type of the received first information perform corresponding processing, the respective treated first information will be passed through
It is sent to first node, the first node is used to characterize corresponding to all social interaction server providers in the communication network
Node;
The received first information of institute is stored in the block chain node by the first node.
It should be understood by those skilled in the art that, the embodiment of the present invention can provide as the production of method, system or computer program
Product.Therefore, hardware embodiment, software implementation or embodiment combining software and hardware aspects can be used in the embodiment of the present invention
Form.Moreover, it wherein includes the calculating of computer usable program code that the embodiment of the present invention, which can be used in one or more,
The form for the computer program product implemented in machine usable storage medium (including magnetic disk storage and optical memory etc.).
The embodiment of the present invention be referring to according to the method for the embodiment of the present invention, equipment (system) and computer program product
Flowchart and/or the block diagram describe.It should be understood that can be operated by computer program in implementation flow chart and/or block diagram
The combination of process and/or box in each flow and/or block and flowchart and/or the block diagram.It can provide these calculating
Processing of the machine procedure operation to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices
Device is to generate a machine, so that being generated by the operation that computer or the processor of other programmable data processing devices execute
For realizing the function of being specified in one or more flows of the flowchart and/or one or more blocks of the block diagram
Device.
The operation of these computer programs, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes behaviour that operation stored in the computer readable memory, which generates,
Make the manufacture of device, the operating device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
The operation of these computer programs also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The operation executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
The foregoing is only a preferred embodiment of the present invention, is not intended to limit the scope of the present invention, it is all
Made any modifications, equivalent replacements, and improvements etc. within the spirit and principles in the present invention, should be included in protection of the invention
Within the scope of.
Claims (11)
1. a kind of information processing method, the information processing method is applied to the communication network comprising block chain node, feature
It is, which comprises
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client
Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the
One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network
Point;
The received first information of institute is stored in the block chain node by the first node.
2. the method according to claim 1, wherein it is described according to the received first information type into
The corresponding processing of row, comprising:
When judging the first information for the information of the first kind, the second information is obtained;
The first information is added by the block head cryptographic Hash of the block node of the second information institute save location
Close processing;
The first kind passes through information disclosed in the communication network for characterizing first user;
Second information is for characterizing, described first transmitted by first user stored as the block chain node
Previous information of information.
3. the method according to claim 1, wherein it is described according to the received first information type into
The corresponding processing of row, comprising:
When judging the first information for the information of Second Type, based on the first encryption key corresponding to first user
It is encrypted, the Second Type is stored in respective block chain by the communication network for characterizing first user
Node but underground information.
4. the method according to claim 1, wherein it is described according to the received first information type into
The corresponding processing of row, comprising:
When judging the first information for the information of third type, based on close with the second encryption corresponding to first user
The first information is encrypted in key;
By with public key corresponding to user pointed by the first information, to corresponding to first user second encryption it is close
Key is encrypted, and obtains the second encryption key Jing Guo encryption;
By second encryption key by encryption, and the first information by second encryption keys processing
It is handled jointly, forms encryption envelope;
The third type is directed toward information disclosed in specific user by the communication network for characterizing first user.
5. the method according to claim 1, wherein the received first information of institute is stored in by the first node
In the block chain node, comprising:
The first node obtains the parameter information of block chain node corresponding with the first node;
Based on the parameter information of the block chain node corresponding with first node, the first information is stored in corresponding area
In block chain node.
6. the method according to claim 1, wherein the method also includes:
At least one node in the first node receives the solicited message that second user is sent;
Information in response to the request obtains the third information that block chain node is saved in the communication network;
According to the type of the third information, Xiang Suoshu second user pushes the third information.
7. according to the method described in claim 6, it is characterized in that, the type according to the third information, Xiang Suoshu
Two users push the third information, comprising:
When the third information is the information of third type, obtained and described the according to the encryption envelope in the third information
The corresponding decruption key of three information;
The third information is decrypted according to the acquired decruption key, the third Jing Guo decryption processing is believed
It ceases and is pushed to the second user.
8. the method according to the description of claim 7 is characterized in that the encryption envelope according in the third information obtains
Before decruption key corresponding with the third information, the method also includes:
The second user sends authentication request to first user by least one node in the first node;
First user response is sent in the authentication request, Xiang Suoshu second user and the node for sending the authentication request
Second prompt information, second prompt information be used for prompt it is described send authentication request node described in second user obtain or
The permission for browsing the third information is not obtained.
9. a kind of information processing unit, applied to the communication network comprising block chain node, which is characterized in that described device packet
It includes:
Signal dispatcher module, for receiving the first information of the first user transmission, the first information is for characterizing the first user
The information including at least social content issued by client;
Message processing module, for according to the type of the received first information perform corresponding processing;
The signal dispatcher module, for that will be sent by the respective treated first information to first node, the first node
For characterizing node corresponding to all social interaction server providers in the communication network;
The message processing module, for the received first information of institute to be stored in the block chain node.
10. a kind of information processing unit, which is characterized in that described device includes:
Processor and memory for storing the computer program that can be run on a processor,
Wherein, the processor is for when running the computer program, executing following operation:
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client
Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the
One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network
Point;
The received first information of institute is stored in the block chain node by the first node.
11. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program quilt
Processor executes:
The first information of the first user transmission is received, the first information is used to characterize what the first user was issued by client
Including at least the information of social content;
According to the type of the received first information perform corresponding processing, will be by the respective treated first information to the
One node is sent, and the first node is used to characterize section corresponding to all social interaction server providers in the communication network
Point;
The received first information of institute is stored in the block chain node by the first node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811027778.6A CN109460993A (en) | 2018-09-04 | 2018-09-04 | A kind of information processing method, device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811027778.6A CN109460993A (en) | 2018-09-04 | 2018-09-04 | A kind of information processing method, device and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109460993A true CN109460993A (en) | 2019-03-12 |
Family
ID=65606464
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811027778.6A Pending CN109460993A (en) | 2018-09-04 | 2018-09-04 | A kind of information processing method, device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109460993A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472874A (en) * | 2019-08-16 | 2019-11-19 | 上海天地汇供应链科技有限公司 | Getting rid of based on block chain hangs dispatching method and system, control centre's node |
CN111182042A (en) * | 2019-12-20 | 2020-05-19 | 周梦洁 | Related information pushing system and method based on block chain |
CN111865761A (en) * | 2020-07-02 | 2020-10-30 | 中通服创发科技有限责任公司 | Social chat information evidence storing method based on block chain intelligent contracts |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377560A (en) * | 2010-08-19 | 2012-03-14 | 北京韩美智恒科技有限公司 | Data encryption method and device for mobile communication terminal |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN107592293A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | The means of communication, digital certificate management method, device and electronic equipment between block chain node |
CN108306819A (en) * | 2018-04-20 | 2018-07-20 | 网易(杭州)网络有限公司 | Instant communicating system implementation method, medium and computing device based on block chain |
-
2018
- 2018-09-04 CN CN201811027778.6A patent/CN109460993A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102377560A (en) * | 2010-08-19 | 2012-03-14 | 北京韩美智恒科技有限公司 | Data encryption method and device for mobile communication terminal |
CN106100981A (en) * | 2016-08-22 | 2016-11-09 | 布比(北京)网络技术有限公司 | Social network data exchange method and device |
CN107592293A (en) * | 2017-07-26 | 2018-01-16 | 阿里巴巴集团控股有限公司 | The means of communication, digital certificate management method, device and electronic equipment between block chain node |
CN108306819A (en) * | 2018-04-20 | 2018-07-20 | 网易(杭州)网络有限公司 | Instant communicating system implementation method, medium and computing device based on block chain |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110472874A (en) * | 2019-08-16 | 2019-11-19 | 上海天地汇供应链科技有限公司 | Getting rid of based on block chain hangs dispatching method and system, control centre's node |
CN111182042A (en) * | 2019-12-20 | 2020-05-19 | 周梦洁 | Related information pushing system and method based on block chain |
CN112395497A (en) * | 2019-12-20 | 2021-02-23 | 周梦洁 | Related information pushing system based on block chain |
CN112417268A (en) * | 2019-12-20 | 2021-02-26 | 周梦洁 | Block chain-based related information pushing method |
CN111865761A (en) * | 2020-07-02 | 2020-10-30 | 中通服创发科技有限责任公司 | Social chat information evidence storing method based on block chain intelligent contracts |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103379098B (en) | Content sharing method, device and network system thereof | |
US8666904B2 (en) | System and method for trusted embedded user interface for secure payments | |
CN102595404B (en) | For storing and executing the method and device of access control clients | |
US8220035B1 (en) | System and method for trusted embedded user interface for authentication | |
RU2434352C2 (en) | Reliable authentication method and device | |
US9397988B2 (en) | Secure portable store for security skins and authentication information | |
KR100463736B1 (en) | Method for permitting debugging and testing of software on mobile communication device in a secure environment | |
CN107743133A (en) | Mobile terminal and its access control method and system based on trustable security environment | |
CN110324276A (en) | A kind of method, system, terminal and electronic equipment logging in application | |
US9787672B1 (en) | Method and system for smartcard emulation | |
AU2016259459B2 (en) | Method for phone authentication in e-business transactions and computer-readable recording medium having program for phone authentication in e-business transactions recorded thereon | |
CN106850699A (en) | A kind of mobile terminal login authentication method and system | |
US20140156531A1 (en) | System and Method for Authenticating Transactions Through a Mobile Device | |
CN106878245B (en) | Graphic code information providing and obtaining method, device and terminal | |
US20130125197A1 (en) | Relying Party Specifiable Format for Assertion Provider Token | |
US20100088236A1 (en) | Secure software service systems and methods | |
CN103051451A (en) | Encryption authentication of security service execution environment | |
JP2008527905A (en) | Security code generation method, method using security code generation method, and programmable apparatus for security code generation method | |
US20140227999A1 (en) | Method, server and system for authentication of a person | |
US9438595B2 (en) | Network resource access control methods and systems using transactional artifacts | |
WO2023005838A1 (en) | Data sharing method and electronic device | |
CN109460993A (en) | A kind of information processing method, device and storage medium | |
KR102329221B1 (en) | Blockchain-based user authentication model | |
CN107920060A (en) | Data access method and device based on account | |
Casey et al. | An interoperable architecture for usable password-less authentication |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
CB03 | Change of inventor or designer information |
Inventor after: Bai Hongtao Inventor after: Li Lin Inventor after: Zhu Qi Inventor before: Bai Hongtao Inventor before: Li Lin |
|
CB03 | Change of inventor or designer information | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190312 |
|
RJ01 | Rejection of invention patent application after publication |