CN109492993A - Date storage method, electronic device and the storage medium of social platform - Google Patents

Date storage method, electronic device and the storage medium of social platform Download PDF

Info

Publication number
CN109492993A
CN109492993A CN201811221237.7A CN201811221237A CN109492993A CN 109492993 A CN109492993 A CN 109492993A CN 201811221237 A CN201811221237 A CN 201811221237A CN 109492993 A CN109492993 A CN 109492993A
Authority
CN
China
Prior art keywords
information
user
performance information
contact details
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811221237.7A
Other languages
Chinese (zh)
Inventor
金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201811221237.7A priority Critical patent/CN109492993A/en
Publication of CN109492993A publication Critical patent/CN109492993A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/01Social networking

Abstract

The invention discloses a kind of date storage method of social platform, electronic device and storage mediums, wherein this method comprises: obtaining the registration information of target user, wherein includes: identity contact details and academic performance information in the registration information;The identity contact details are encrypted;Authenticity verification is carried out to the academic performance information by the node in block chain, and verification process and result save into chain;After certification passes through, the academic performance information and encrypted identity contact details are associated, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.It solves the problems, such as the problem of user identity contact details in the presence of existing social platform will be leaked and user inputs false academic energy-saving information through the above way, has reached the technical effect of the safety and authenticity that improve data.

Description

Date storage method, electronic device and the storage medium of social platform
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of date storage method of social platform, electronic device And storage medium.
Background technique
Traditional professional social platform can provide for user establishes human connection pass with career development experience based on receiving an education The platform of system.However, generally there are the following problems for meeting: professional social platform is mostly centralization during actual use Operation, the information such as real information, contact method of user needs actively submit to platform, then again by these information of platform courses Whether to other people as it can be seen that but these truthful datas have been exposed in fact, also there is the risk of leaking data.Into one Step, user is independently completed the submission of the information such as oneself learning experiences, professional history by user completely, and there is no to these numbers According to the verification and audit of authenticity, if user it is purposive make up study and professional history, platform default can recommend Corresponding associated user forms relationship among persons, the risk for obtaining human connection is forged there are identity, this will provide real information to other User cause bad user experience.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The purpose of the present invention is to provide a kind of date storage method of social platform, electronic device and storage medium, into And the identity information safety for solving user in existing social platform is not high, and the confidence level of the information of user oneself input is not High technical problem.
The present invention is to solve above-mentioned technical problem by following technical proposals:
According to an aspect of the invention, there is provided a kind of date storage method of social platform, includes the following steps:
Step 101: obtaining the registration information of target user, wherein include: in the registration information identity contact details and Academic performance information;
Step 102: the identity contact details are encrypted;
Step 103: authenticity verification being carried out to the academic performance information by the node in block chain, and will be authenticated Journey and result save into chain;
Step 104: after certification passes through, the academic performance information and encrypted identity contact details being closed Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
In one embodiment, the identity contact details are encrypted, comprising:
The identity contact details are encrypted by asymmetric encryption mode, wherein encrypted identity connection It is information, the node in block chain is only capable of viewing the submission state of every terms of information, and the true information content is hiding.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain, Include:
Authenticity verification is carried out to the academic performance information by the certification authority in the block chain;
Alternatively,
Authenticity verification is carried out to the academic performance information by the predetermined quantity user node in the block chain.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain, Include:
The academic performance information is sent to certification authority;
Receive the authenticity verification result to the academic performance information that the certification authority returns;
In the case where the authenticity verification result is that verification passes through, determine that the academic performance information passes through authenticity Certification.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain, Include:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, the academic technical ability letter is determined Breath passes through authenticity verification, wherein user node associated with target user is that there are social attributes with the target user Or the user node of family's attribute.
In one embodiment, the identity contact details include at least one of: ID card No., phone number Code, WeChat ID, mailbox, home address, unit address;The educational background performance information includes at least one of: educational background, work are carried out It goes through, technical ability certificate.
In one embodiment, the academic performance information and encrypted identity contact details are being associated it Afterwards, further includes:
The requesting node received in the block chain checks request to the encrypted identity contact details;
Request is checked in response to described, is sent to the user and is checked request;
Receive the user check authorization message after, Xiang Suoshu requesting node is open to the encrypted identity Information checks permission.
On the other hand, a kind of electronic device, including memory and processor are provided, the memory can quilt for storing The data-storage system for the social platform that the processor executes, the data-storage system of the social platform include:
Module is obtained, for obtaining the registration information of target user, wherein include: identity connection in the registration information Information and academic performance information;
Encrypting module, for being encrypted to the identity contact details;
Authentication module, for carrying out authenticity verification to the academic performance information by the node in block chain, and will Verification process and result save into chain;
Enter chain module, for after certification passes through, by the academic performance information and encrypted identity contact details into Row association, and saved into chain.
In one embodiment, the encrypting module is specifically used for contacting the identity by asymmetric encryption mode Information is encrypted, wherein encrypted identity contact details, the node in block chain are only capable of viewing every terms of information Submission state, the true information content are hiding.
In one embodiment, the authentication module is specifically used for:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, the academic technical ability letter is determined Breath passes through authenticity verification, wherein user node associated with target user is that there are social attributes with the target user Or the user node of family's attribute.
Another aspect provides a kind of computer equipment, comprising: memory and processor, wherein the processor is used for The step of executing the above method.
Another aspect provides a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, institute It states instruction and is performed the step of realizing the above method.
The positive effect of the present invention is that: the identity contact details and educational background performance information of target user are obtained, it is right It carries out saving into chain after encryption again in identity contact details, to guarantee that the basic identity contact details of user will not be let out Dew first carries out authenticity verification for academic performance information, to be certified to carry out saving into chain again after, to avoid user It plays tricks when registration to the academic technical ability of oneself.Data for entering chain preservation can be checked with the user in social platform. Solving the problems, such as the user identity contact details in the presence of existing social platform through the above way will be leaked and use The problem of academic energy-saving information of family input vacation, the technical effect of the safety and authenticity that improve data is reached.
Detailed description of the invention
Fig. 1 is the method flow diagram of the date storage method of social platform according to an embodiment of the present invention;
Fig. 2 is the structural block diagram of the data-storage system of social platform according to an embodiment of the present invention;
Fig. 3 is the structural block diagram of the data-storage system of social platform according to an embodiment of the present invention;
Fig. 4 is a kind of optional hardware structure schematic diagram of electronic device according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Identity contact details in view of in existing social platform, registering user cannot get effective safety protection, And there is the possibility of the false academic performance information of registration in user, in order to solve these problems, can based on block catenary system into Typing and registration of row information etc., and to there are the information of safety issue to carry out encryption storage and display, for there are accurate Property require information, carry out authenticity verification, so as to while assuring data security, guarantee data accuracy and Authenticity.
For this purpose, provide a kind of date storage method of social platform, electronic equipment in this example, below to this method and Electronic equipment is specifically described as follows:
Embodiment one
The date storage method of social platform provided by the invention is illustrated with reference to the accompanying drawing.
Fig. 1 is a kind of optional flow diagram of the date storage method of social platform of the present invention, as shown in Figure 1, should Method may comprise steps of:
Step 101: obtaining the registration information of target user, wherein include: in the registration information identity contact details and Academic performance information;
Wherein, above-mentioned identity contact details may include: these presence of ID card No., telephone number, WeChat ID etc. What privacy was not intended to be seen, but the information verified is not needed again.Above-mentioned academic performance information can be user Educational background, the track record of user, the technical ability certificate acquisition situation of user etc..
That is, above-mentioned identity contact details can include but is not limited at least one of: ID card No., telephone number, WeChat ID, mailbox, home address, unit address;Above-mentioned educational background performance information can include but is not limited at least one of: learn It goes through, track record, technical ability certificate.
Step 102: the identity contact details are encrypted;
Specifically, the crucial personal information default such as contact method can be carried out at encryption using asymmetric encryption mode Reason, the other users such as platform can only see the submission state of its every terms of information, can't see true content.It, can when realizing The identity contact details to be encrypted by asymmetric encryption mode, wherein encrypted identity contact details, Node in block chain is only capable of viewing the submission state of every terms of information, but is to look at less than the true information content.
Step 103: authenticity verification being carried out to the academic performance information by the node in block chain, and will be authenticated Journey and result save into chain;
In order to which the academic performance information to user carries out authenticity verification, two ways is provided in this example:
Mode 1: authenticity verification is carried out to the academic performance information by the certification authority in the block chain;
Wherein, certification node can be the certification authority being specifically incorporated, which accesses block linkwork as a node In system, the real effectiveness of the academic performance information of user is verified.
Specifically, authenticity verification is carried out to the academic performance information by the node in block chain, may include: by The educational background performance information is sent to certification authority;Receive that the certification authority returns to the true of the academic performance information Property check results;In the case where the authenticity verification result is that verification passes through, it is true to determine that the academic performance information passes through Reality certification.
Mode 2) the academic performance information progress authenticity is recognized by the predetermined quantity user node in block chain Card.
Specifically, authenticity verification is carried out to the academic performance information by the node in block chain, may include: by The educational background performance information is sent to multiple user nodes associated with the target user in block chain;Receive multiple users The validation of information result that node returns;In the case where the user node number of return information confirmation result exceeds preset threshold, really The fixed academic performance information passes through authenticity verification, wherein user node associated with target user is and the target There are social attribute or the user nodes of family's attribute by user.
For example, can choose other user's (example in block chain after user A has submitted the educational background of oneself, job information Such as: user B, user C and user D, these three users are to register in platform and recognize the people of user A) letter is carried out as it Validation verification is ceased, three of them enter chain to the verification result of the authenticity verification of the information of user A and identifier and protect It deposits, so that verification process is traceable, and can not arbitrarily distort.For each node in block chain, being all can be with Other nodal information validity authenticities are verified.
Step 104: after certification passes through, the academic performance information and encrypted identity contact details being closed Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
After establishing the block catenary system of above-mentioned social platform, can provide to the information of the user in block chain into The interface checked of row can be with for this purpose, after being associated the academic performance information and encrypted identity contact details Include:
S1: the requesting node received in the block chain checks request to the encrypted identity contact details;
S2: checking request in response to described, sends to the user and checks request;
S3: receive the user check authorization message after, Xiang Suoshu requesting node is open to described encrypted Identity information checks permission.
The above method is illustrated below with reference to a specific embodiment, it is important to note, however, that the specific implementation Example does not constitute an undue limitation on the present application merely to the application is better described.
In view of block chain technology can be introduced in professional social platform, by the cryptography means of block chain, use Family can submit the private informations such as personal contact method in platform, control it in the visibility of flat roof area by user itself.Into One step, user after the information such as learning experiences, the professional history of typing itself, can by third-party institution's node or he The mode of people's endorsement carries out authenticity examination to the information of input, to guarantee that the authenticity of the information of user's input is available Verifying.
Specifically, the function of the following aspects may be implemented in block chain and professional social platform:
1) user management: forming virtual identity on chain in user's registration, carry out encryption storage to the real information of user, To realize the secret protection to user;
For example, virtualization process can be carried out to the identity information of user, it can be and only show which user had submitted A little information, which information are not submitted, but the information content for specifically having been filed on information is not shown, or to the letter of submission Breath carries out encryption or specially treated, for example, cell-phone number is shown are as follows: 138********23, birthday are shown as 00 month 0000 00 Day, name can be using the camouflage name signal that user rises, for example, user Zhang San, gives oneself camouflage property name: One two three, that is, encryption processing is carried out to identity information of user etc., so that others will not arbitrarily get the true letter of user Breath.Cited by above-mentioned is that the virtual processing to cell-phone number, name, birthday etc. can also be to other when actually realizing Information virtually handled, such as: identification card number, native place etc. can be carried out certain data processing.It is, in chain The information of the user of upper display can not allow others to obtain true user information easily.
2) authenticity is checked: being introduced into the third-party institution as the node in block chain, is carried out to qualifications such as educational background, technical ability true Reality verification;
3) group verifies: for the personal information containing social attribute, being promoted by the way of group's verifying to information truth The checking ability of property;
4) data are anti-fake: the information of user is submitted, Information Authentication records overall process cochain, is formed for virtual identity on chain Complete experience record.
It is stored that is, block chain is used to share account book under professional social platform framework as bottom data, and introduces The agency nodes such as examination, the examination of technical ability certificate are gone through as verifying node.
Upon registration, such as the crucial personal information such as contact method can be defaulted using asymmetric encryption mode user It is encrypted, the other users such as platform can only see the submission state of its every terms of information, can't see true content.
The information such as educational background, the technical ability certificate submitted for user, firstly, being committed to mechanism verifying node carries out authenticity Verifying, after being verified, the personal information entry that can be used as user enters chain preservation, and records proofing state, actual effect, mentions Hand over the related informations such as time.
User can choose after submitting personal profession information and request his its artificial proof.All users are in platform The professional history of other users can be proved, all proofs and the process being proved to and result all cochains are protected It deposits, it is this in such a way that group verifies, it can effectively safeguard data validity.
For example, can choose other user's (example in block chain after user A has submitted the educational background of oneself, job information Such as: user B, user C and user D, these three users are to register in platform and recognize the people of user A) letter is carried out as it Validation verification is ceased, three of them enter chain to the verification result of the authenticity verification of the information of user A and identifier and protect It deposits, so that verification process is traceable, and can not arbitrarily distort.For each node in block chain, being all can be with Other nodal information validity authenticities are verified.
As soon as a special certifying organization can be increased in above-mentioned block chain as verifying node, the effect of the node It is to enter the user of chain and carrying out information authenticity verifying.
In upper example, the identity contact details and educational background performance information of target user are obtained, are existed for identity contact details It carries out saving into chain again after encryption, to guarantee that the basic identity contact details of user not will be leaked, academic technical ability is believed Breath first carries out authenticity verification, to be certified to carry out saving into chain again after, thus to oneself when avoiding user's registration Technical ability is gone through to play tricks.Data for entering chain preservation can be checked with the user in social platform.It solves through the above way The problem of user identity contact details in the presence of existing social platform will be leaked and user input false educational background energy conservation The problem of information, has reached the technical effect of the safety and authenticity that improve data.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.
Embodiment two
The date storage method of the social platform provided in one based on the above embodiment provides a kind of social activity in the present embodiment The data-storage system of platform, specifically, Fig. 2 and Fig. 3 show the optional structures of the data-storage system of the social platform Block diagram, the data-storage system of the social platform are divided into one or more program modules, one or more program module It is stored in storage medium, and as performed by one or more processors, to complete the present invention.The so-called program mould of the present invention Block is the series of computation machine program instruction section for referring to complete specific function, is more suitable for describing social platform than program itself Implementation procedure of the data-storage system in storage medium, the function of each program module of the present embodiment will specifically be introduced by being described below Can:
As shown in Fig. 2, the data-storage system 20 of social platform includes:
Module 201 is obtained, for obtaining the registration information of target user, wherein include: identity connection in the registration information It is information and academic performance information;
Encrypting module 202, for being encrypted to the identity contact details;
Authentication module 203, for carrying out authenticity verification to the academic performance information by the node in block chain, and Verification process and result save into chain;
Enter chain module 204, for after certification passes through, by the academic performance information and encrypted identity contact details It is associated, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
In one embodiment, encrypting module 202 can specifically contact the identity by asymmetric encryption mode Information is encrypted, wherein encrypted identity contact details, the node in block chain are only capable of viewing every terms of information Submission state, the true information content are hiding, to ensure that the safety of information.
In one embodiment, authentication module 203 specifically can be by the certification authority in the block chain to described Academic performance information carries out authenticity verification;Alternatively, by the predetermined quantity user node in the block chain to It goes through performance information and carries out authenticity verification.
In one embodiment, above-mentioned identity contact details can include but is not limited at least one of: identity card Number, telephone number, WeChat ID, mailbox, home address, unit address;The educational background performance information can include but is not limited to At least one of: educational background, track record, technical ability certificate.
In one embodiment, as shown in figure 3, the data storage of above-mentioned social platform can also include: receiving module 301, request is checked to the encrypted identity contact details for receiving the requesting node in block chain;Sending module 302, for checking request in response to described, is sent to the user and check request;Open module 303, for receiving the use Family checks after authorization message that the opening of Xiang Suoshu requesting node checks permission to the encrypted identity information.
About the device in above-described embodiment, wherein each unit, module execute the concrete mode of operation related It is described in detail in the embodiment of this method, no detailed explanation will be given here.
In each embodiment of the present embodiment, the identity contact details and educational background performance information of target user are obtained, Identity contact details are carried out again after encryption to save into chain, to guarantee that the basic identity contact details of user will not be let out Dew first carries out authenticity verification for academic performance information, to be certified to carry out saving into chain again after, to avoid user It plays tricks when registration to the academic technical ability of oneself.Data for entering chain preservation can be checked with the user in social platform. Solving the problems, such as the user identity contact details in the presence of existing social platform through the above way will be leaked and use The problem of academic energy-saving information of family input vacation, the technical effect of the safety and authenticity that improve data is reached.
Embodiment three
A kind of electronic device is provided in the preferred embodiment of the invention three.Fig. 4 is that electronic device one is real according to the present invention Apply the hardware structure schematic diagram of example.In the present embodiment, electronic device 2 is that one kind can be according to the finger for being previously set or storing It enables, the automatic equipment for carrying out numerical value calculating and/or information processing.For example, it may be smart phone, tablet computer, notebook are electric Brain, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server (including independent clothes Server cluster composed by business device or multiple servers) etc..As shown, electronic device 2 includes, but is not limited to: The data storage of connection memory 21, processor 22, network interface 23 and social platform can be in communication with each other by system bus System 20.Wherein:
Memory 21 includes at least a type of computer readable storage medium, and readable storage medium storing program for executing includes flash memory, hard Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM) Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 21 can be the inside of electronic device 2 Memory module, such as the hard disk or memory of the electronic device 2.In further embodiments, memory 21 is also possible to electronics dress Set the plug-in type hard disk being equipped on 2 External memory equipment, such as the electronic device 2, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 is gone back Can both including electronic device 2 storage inside module and also including its External memory equipment.In the present embodiment, memory 21 is usual For storing the operating system and types of applications software that are installed on electronic device 2, such as the data-storage system 20 of social platform Program code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU), Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control electronic device 2 Overall operation, such as execute control relevant to the progress data interaction of electronic device 2 or communication and processing etc..The present embodiment In, program code or processing data of the processor 22 for storing in run memory 21, such as the social platform of operation Data-storage system 20 etc..
Network interface 23 may include radio network interface or wired network interface, which is commonly used in electronics Communication connection is established between device 2 and other electronic devices.For example, network interface 23 be used for by network by electronic device 2 with Exterior terminal is connected, and establishes data transmission channel and communication connection etc. between electronic device 2 and exterior terminal.Network can be with It is intranet (Intranet), internet (Internet), global system for mobile communications (Global System of Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the wirelessly or non-wirelessly network such as Wi-Fi.
It should be pointed out that Fig. 4 illustrates only the electronic device with component 21-23, it should be understood that simultaneously should not Realistic to apply all components shown, the implementation that can be substituted is more or less component.
In the present embodiment, the data-storage system 20 for the social platform being stored in memory 21 can also be divided into One or more program module, one or more program module are stored in memory 21, and by one or more It is performed to manage device (the present embodiment is processor 22), to complete the present invention.
Example IV
The present embodiment also provides a kind of computer readable storage medium, is stored in computer readable storage medium social flat The data-storage system of platform, the data-storage system of social platform can performed by least one processor so that at least one Processor executes the step of date storage method such as the social platform of embodiment one.
In the present embodiment, computer readable storage medium include flash memory, hard disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), Electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD Deng.In some embodiments, computer readable storage medium can be the internal storage unit of computer equipment, such as the calculating The hard disk or memory of machine equipment.In further embodiments, computer readable storage medium is also possible to the outer of computer equipment The plug-in type hard disk being equipped in portion's storage equipment, such as the computer equipment, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, computer-readable storage medium Matter can also both including computer equipment internal storage unit and also including its External memory equipment.In the present embodiment, computer Readable storage medium storing program for executing is installed on the operating system and types of applications software of computer equipment, such as embodiment two commonly used in storage Client ensure analysis system program code etc..In addition, computer readable storage medium can be also used for temporarily storing Various types of data through exporting or will export.
Obviously, those skilled in the art should be understood that each module of the above-mentioned embodiment of the present invention or each step can be with It is realized with general computing device, they can be concentrated on a single computing device, or be distributed in multiple computing devices On composed network, optionally, they can be realized with the program code that computing device can perform, it is thus possible to by it Store and be performed by computing device in the storage device, and in some cases, can be held with the sequence for being different from herein The shown or described step of row, perhaps they are fabricated to each integrated circuit modules or will be multiple in them Module or step are fabricated to single integrated circuit module to realize.In this way, the embodiment of the present invention be not limited to it is any specific hard Part and software combine.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of date storage method of social platform, which comprises the steps of:
Step 101: obtaining the registration information of target user, wherein include: identity contact details and educational background in the registration information Performance information;
Step 102: the identity contact details are encrypted;
Step 103: authenticity verification is carried out to the academic performance information by the node in block chain, and by verification process and As a result it carries out saving into chain;
Step 104: after certification passes through, the academic performance information and encrypted identity contact details are associated, and Save into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
2. the method according to claim 1, wherein being encrypted to the identity contact details, comprising:
The identity contact details are encrypted by asymmetric encryption mode, wherein encrypted identity connection letter It ceases, the node in block chain is only capable of viewing the submission state of every terms of information, and the true information content is hiding.
3. the method according to claim 1, wherein by the node in block chain to the academic performance information Carry out authenticity verification, comprising:
The academic performance information is sent to certification authority;
Receive the authenticity verification result to the academic performance information that the certification authority returns;
In the case where the authenticity verification result is that verification passes through, determine that the academic performance information is recognized by authenticity Card.
4. the method according to claim 1, wherein by the node in block chain to the academic performance information Carry out authenticity verification, comprising:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, determine that the academic performance information is logical Cross authenticity verification, wherein user node associated with target user is that there are social attributes or family with the target user The user node of front yard attribute.
5. the method according to claim 1, wherein joining by the academic performance information and encrypted identity It is after information is associated, further includes:
The requesting node received in the block chain checks request to the encrypted identity contact details;
Request is checked in response to described, is sent to the user and is checked request;
Receive the user check authorization message after, Xiang Suoshu requesting node is open to the encrypted identity information Check permission.
6. a kind of electronic device, including memory and processor, which is characterized in that the memory can be by the place for storing The data-storage system for the social platform that device executes is managed, the data-storage system of the social platform includes:
Module is obtained, for obtaining the registration information of target user, wherein include: identity contact details in the registration information With academic performance information;
Encrypting module, for being encrypted to the identity contact details;
Authentication module, for carrying out authenticity verification to the academic performance information by the node in block chain, and will certification Process and result save into chain;
Enter chain module, for after certification passes through, the academic performance information and encrypted identity contact details to be closed Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
7. electronic device according to claim 6, which is characterized in that the encrypting module is specifically used for adding by asymmetric The identity contact details are encrypted in close mode, wherein encrypted identity contact details, the node in block chain It is only capable of viewing the submission state of every terms of information, the true information content is hiding.
8. device according to claim 6, which is characterized in that the authentication module is specifically used for:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, determine that the academic performance information is logical Cross authenticity verification, wherein user node associated with target user is that there are social attributes or family with the target user The user node of front yard attribute.
9. a kind of computer equipment, comprising: memory and processor, wherein the processor requires 1 to 5 for perform claim Any one of the method the step of.
10. a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, which is characterized in that the finger Order is performed the step of realizing any one of claims 1 to 5 the method.
CN201811221237.7A 2018-10-19 2018-10-19 Date storage method, electronic device and the storage medium of social platform Pending CN109492993A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811221237.7A CN109492993A (en) 2018-10-19 2018-10-19 Date storage method, electronic device and the storage medium of social platform

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811221237.7A CN109492993A (en) 2018-10-19 2018-10-19 Date storage method, electronic device and the storage medium of social platform

Publications (1)

Publication Number Publication Date
CN109492993A true CN109492993A (en) 2019-03-19

Family

ID=65692230

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811221237.7A Pending CN109492993A (en) 2018-10-19 2018-10-19 Date storage method, electronic device and the storage medium of social platform

Country Status (1)

Country Link
CN (1) CN109492993A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110032890A (en) * 2019-04-15 2019-07-19 京东方科技集团股份有限公司 A kind of secure network and a kind of safety access method
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information
CN110188109A (en) * 2019-04-03 2019-08-30 阿里巴巴集团控股有限公司 Approaches to IM, device and equipment and storage medium based on block chain

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158960A1 (en) * 2000-05-22 2003-08-21 Engberg Stephan J. System and method for establishing a privacy communication path
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107483498A (en) * 2017-09-22 2017-12-15 中国联合网络通信集团有限公司 Academic authentication method and system based on block chain
CN108171068A (en) * 2017-12-31 2018-06-15 天津大学 A kind of student status certification alliance catenary system and its operation method

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20030158960A1 (en) * 2000-05-22 2003-08-21 Engberg Stephan J. System and method for establishing a privacy communication path
CN107181765A (en) * 2017-07-25 2017-09-19 光载无限(北京)科技有限公司 Network digital identity identifying method based on block chain technology
CN107483498A (en) * 2017-09-22 2017-12-15 中国联合网络通信集团有限公司 Academic authentication method and system based on block chain
CN108171068A (en) * 2017-12-31 2018-06-15 天津大学 A kind of student status certification alliance catenary system and its operation method

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
陈嘉兴等: "《现代通信技术导论 第2版》", 北京邮电大学出版社, pages: 186 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110188109A (en) * 2019-04-03 2019-08-30 阿里巴巴集团控股有限公司 Approaches to IM, device and equipment and storage medium based on block chain
CN110188109B (en) * 2019-04-03 2023-10-31 创新先进技术有限公司 Block chain-based information management method, device and equipment and storage medium
CN110032890A (en) * 2019-04-15 2019-07-19 京东方科技集团股份有限公司 A kind of secure network and a kind of safety access method
CN110059503A (en) * 2019-04-24 2019-07-26 成都派沃特科技股份有限公司 The retrospective leakage-preventing method of social information

Similar Documents

Publication Publication Date Title
TWI706368B (en) Block chain-based service leasing method, device, system and electronic equipment
CN108898389B (en) Content verification method and device based on block chain and electronic equipment
CN109862041A (en) A kind of digital identification authentication method, unit, system and storage medium
CN109951489A (en) A kind of digital identification authentication method, unit, system and storage medium
CN107257340A (en) A kind of authentication method, authentication data processing method and equipment based on block chain
CN110046482A (en) Identity verification method and its system
CN106911641A (en) For authorizing the client terminal device for accessing, server unit and access control system
CN108701276A (en) System and method for managing digital identity
WO2018213519A1 (en) Secure electronic transaction authentication
US20200213296A1 (en) Providing verified claims of user identity
US20190141048A1 (en) Blockchain identification system
CN108256303A (en) Electronic device, auth method and storage medium
CN110046156A (en) Content Management System and method, apparatus, electronic equipment based on block chain
CN109492993A (en) Date storage method, electronic device and the storage medium of social platform
CN109379360A (en) Auditing method, electronic device and computer readable storage medium
US11550892B2 (en) Presentation of a verifiable credential having usage data
CN110071809A (en) Virtual and true identity and its associate management system and method, device and medium
EP4107639A1 (en) Derived child verifiable credential with selective claims
KR102628504B1 (en) Method and apparatus for providing user profile
CN113779637B (en) Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium
CN110348988A (en) Arbitration process method, electronic device and computer readable storage medium
CN109710692A (en) User information processing method, device and storage medium in a kind of block chain network
US20230179588A1 (en) Verifiable credential with dynamic claim
US20230179402A1 (en) Device asserted verifiable credential
CN115345634A (en) Academic degree authentication management system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination