CN109492993A - Date storage method, electronic device and the storage medium of social platform - Google Patents
Date storage method, electronic device and the storage medium of social platform Download PDFInfo
- Publication number
- CN109492993A CN109492993A CN201811221237.7A CN201811221237A CN109492993A CN 109492993 A CN109492993 A CN 109492993A CN 201811221237 A CN201811221237 A CN 201811221237A CN 109492993 A CN109492993 A CN 109492993A
- Authority
- CN
- China
- Prior art keywords
- information
- user
- performance information
- contact details
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 44
- 238000012795 verification Methods 0.000 claims abstract description 51
- 238000004321 preservation Methods 0.000 claims abstract description 10
- 230000008569 process Effects 0.000 claims abstract description 10
- 238000013500 data storage Methods 0.000 claims description 18
- 238000010200 validation analysis Methods 0.000 claims description 7
- 238000012790 confirmation Methods 0.000 claims description 5
- 238000013475 authorization Methods 0.000 claims description 4
- 230000004044 response Effects 0.000 claims description 4
- 230000000694 effects Effects 0.000 abstract description 7
- 238000010586 diagram Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 7
- 238000004891 communication Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000010295 mobile communication Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 238000012550 audit Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 210000004556 brain Anatomy 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 238000004134 energy conservation Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000008092 positive effect Effects 0.000 description 1
- 238000012797 qualification Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/105—Human resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
- G06Q50/01—Social networking
Abstract
The invention discloses a kind of date storage method of social platform, electronic device and storage mediums, wherein this method comprises: obtaining the registration information of target user, wherein includes: identity contact details and academic performance information in the registration information;The identity contact details are encrypted;Authenticity verification is carried out to the academic performance information by the node in block chain, and verification process and result save into chain;After certification passes through, the academic performance information and encrypted identity contact details are associated, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.It solves the problems, such as the problem of user identity contact details in the presence of existing social platform will be leaked and user inputs false academic energy-saving information through the above way, has reached the technical effect of the safety and authenticity that improve data.
Description
Technical field
The present invention relates to block chain technical fields, and in particular to a kind of date storage method of social platform, electronic device
And storage medium.
Background technique
Traditional professional social platform can provide for user establishes human connection pass with career development experience based on receiving an education
The platform of system.However, generally there are the following problems for meeting: professional social platform is mostly centralization during actual use
Operation, the information such as real information, contact method of user needs actively submit to platform, then again by these information of platform courses
Whether to other people as it can be seen that but these truthful datas have been exposed in fact, also there is the risk of leaking data.Into one
Step, user is independently completed the submission of the information such as oneself learning experiences, professional history by user completely, and there is no to these numbers
According to the verification and audit of authenticity, if user it is purposive make up study and professional history, platform default can recommend
Corresponding associated user forms relationship among persons, the risk for obtaining human connection is forged there are identity, this will provide real information to other
User cause bad user experience.
In view of the above-mentioned problems, currently no effective solution has been proposed.
Summary of the invention
The purpose of the present invention is to provide a kind of date storage method of social platform, electronic device and storage medium, into
And the identity information safety for solving user in existing social platform is not high, and the confidence level of the information of user oneself input is not
High technical problem.
The present invention is to solve above-mentioned technical problem by following technical proposals:
According to an aspect of the invention, there is provided a kind of date storage method of social platform, includes the following steps:
Step 101: obtaining the registration information of target user, wherein include: in the registration information identity contact details and
Academic performance information;
Step 102: the identity contact details are encrypted;
Step 103: authenticity verification being carried out to the academic performance information by the node in block chain, and will be authenticated
Journey and result save into chain;
Step 104: after certification passes through, the academic performance information and encrypted identity contact details being closed
Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
In one embodiment, the identity contact details are encrypted, comprising:
The identity contact details are encrypted by asymmetric encryption mode, wherein encrypted identity connection
It is information, the node in block chain is only capable of viewing the submission state of every terms of information, and the true information content is hiding.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain,
Include:
Authenticity verification is carried out to the academic performance information by the certification authority in the block chain;
Alternatively,
Authenticity verification is carried out to the academic performance information by the predetermined quantity user node in the block chain.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain,
Include:
The academic performance information is sent to certification authority;
Receive the authenticity verification result to the academic performance information that the certification authority returns;
In the case where the authenticity verification result is that verification passes through, determine that the academic performance information passes through authenticity
Certification.
In one embodiment, authenticity verification is carried out to the academic performance information by the node in block chain,
Include:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, the academic technical ability letter is determined
Breath passes through authenticity verification, wherein user node associated with target user is that there are social attributes with the target user
Or the user node of family's attribute.
In one embodiment, the identity contact details include at least one of: ID card No., phone number
Code, WeChat ID, mailbox, home address, unit address;The educational background performance information includes at least one of: educational background, work are carried out
It goes through, technical ability certificate.
In one embodiment, the academic performance information and encrypted identity contact details are being associated it
Afterwards, further includes:
The requesting node received in the block chain checks request to the encrypted identity contact details;
Request is checked in response to described, is sent to the user and is checked request;
Receive the user check authorization message after, Xiang Suoshu requesting node is open to the encrypted identity
Information checks permission.
On the other hand, a kind of electronic device, including memory and processor are provided, the memory can quilt for storing
The data-storage system for the social platform that the processor executes, the data-storage system of the social platform include:
Module is obtained, for obtaining the registration information of target user, wherein include: identity connection in the registration information
Information and academic performance information;
Encrypting module, for being encrypted to the identity contact details;
Authentication module, for carrying out authenticity verification to the academic performance information by the node in block chain, and will
Verification process and result save into chain;
Enter chain module, for after certification passes through, by the academic performance information and encrypted identity contact details into
Row association, and saved into chain.
In one embodiment, the encrypting module is specifically used for contacting the identity by asymmetric encryption mode
Information is encrypted, wherein encrypted identity contact details, the node in block chain are only capable of viewing every terms of information
Submission state, the true information content are hiding.
In one embodiment, the authentication module is specifically used for:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, the academic technical ability letter is determined
Breath passes through authenticity verification, wherein user node associated with target user is that there are social attributes with the target user
Or the user node of family's attribute.
Another aspect provides a kind of computer equipment, comprising: memory and processor, wherein the processor is used for
The step of executing the above method.
Another aspect provides a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, institute
It states instruction and is performed the step of realizing the above method.
The positive effect of the present invention is that: the identity contact details and educational background performance information of target user are obtained, it is right
It carries out saving into chain after encryption again in identity contact details, to guarantee that the basic identity contact details of user will not be let out
Dew first carries out authenticity verification for academic performance information, to be certified to carry out saving into chain again after, to avoid user
It plays tricks when registration to the academic technical ability of oneself.Data for entering chain preservation can be checked with the user in social platform.
Solving the problems, such as the user identity contact details in the presence of existing social platform through the above way will be leaked and use
The problem of academic energy-saving information of family input vacation, the technical effect of the safety and authenticity that improve data is reached.
Detailed description of the invention
Fig. 1 is the method flow diagram of the date storage method of social platform according to an embodiment of the present invention;
Fig. 2 is the structural block diagram of the data-storage system of social platform according to an embodiment of the present invention;
Fig. 3 is the structural block diagram of the data-storage system of social platform according to an embodiment of the present invention;
Fig. 4 is a kind of optional hardware structure schematic diagram of electronic device according to an embodiment of the present invention.
Specific embodiment
In order to make the objectives, technical solutions, and advantages of the present invention clearer, with reference to the accompanying drawings and embodiments, right
The present invention is further elaborated.It should be appreciated that described herein, specific examples are only used to explain the present invention, not
For limiting the present invention.Based on the embodiments of the present invention, those of ordinary skill in the art are not before making creative work
Every other embodiment obtained is put, shall fall within the protection scope of the present invention.
Identity contact details in view of in existing social platform, registering user cannot get effective safety protection,
And there is the possibility of the false academic performance information of registration in user, in order to solve these problems, can based on block catenary system into
Typing and registration of row information etc., and to there are the information of safety issue to carry out encryption storage and display, for there are accurate
Property require information, carry out authenticity verification, so as to while assuring data security, guarantee data accuracy and
Authenticity.
For this purpose, provide a kind of date storage method of social platform, electronic equipment in this example, below to this method and
Electronic equipment is specifically described as follows:
Embodiment one
The date storage method of social platform provided by the invention is illustrated with reference to the accompanying drawing.
Fig. 1 is a kind of optional flow diagram of the date storage method of social platform of the present invention, as shown in Figure 1, should
Method may comprise steps of:
Step 101: obtaining the registration information of target user, wherein include: in the registration information identity contact details and
Academic performance information;
Wherein, above-mentioned identity contact details may include: these presence of ID card No., telephone number, WeChat ID etc.
What privacy was not intended to be seen, but the information verified is not needed again.Above-mentioned academic performance information can be user
Educational background, the track record of user, the technical ability certificate acquisition situation of user etc..
That is, above-mentioned identity contact details can include but is not limited at least one of: ID card No., telephone number,
WeChat ID, mailbox, home address, unit address;Above-mentioned educational background performance information can include but is not limited at least one of: learn
It goes through, track record, technical ability certificate.
Step 102: the identity contact details are encrypted;
Specifically, the crucial personal information default such as contact method can be carried out at encryption using asymmetric encryption mode
Reason, the other users such as platform can only see the submission state of its every terms of information, can't see true content.It, can when realizing
The identity contact details to be encrypted by asymmetric encryption mode, wherein encrypted identity contact details,
Node in block chain is only capable of viewing the submission state of every terms of information, but is to look at less than the true information content.
Step 103: authenticity verification being carried out to the academic performance information by the node in block chain, and will be authenticated
Journey and result save into chain;
In order to which the academic performance information to user carries out authenticity verification, two ways is provided in this example:
Mode 1: authenticity verification is carried out to the academic performance information by the certification authority in the block chain;
Wherein, certification node can be the certification authority being specifically incorporated, which accesses block linkwork as a node
In system, the real effectiveness of the academic performance information of user is verified.
Specifically, authenticity verification is carried out to the academic performance information by the node in block chain, may include: by
The educational background performance information is sent to certification authority;Receive that the certification authority returns to the true of the academic performance information
Property check results;In the case where the authenticity verification result is that verification passes through, it is true to determine that the academic performance information passes through
Reality certification.
Mode 2) the academic performance information progress authenticity is recognized by the predetermined quantity user node in block chain
Card.
Specifically, authenticity verification is carried out to the academic performance information by the node in block chain, may include: by
The educational background performance information is sent to multiple user nodes associated with the target user in block chain;Receive multiple users
The validation of information result that node returns;In the case where the user node number of return information confirmation result exceeds preset threshold, really
The fixed academic performance information passes through authenticity verification, wherein user node associated with target user is and the target
There are social attribute or the user nodes of family's attribute by user.
For example, can choose other user's (example in block chain after user A has submitted the educational background of oneself, job information
Such as: user B, user C and user D, these three users are to register in platform and recognize the people of user A) letter is carried out as it
Validation verification is ceased, three of them enter chain to the verification result of the authenticity verification of the information of user A and identifier and protect
It deposits, so that verification process is traceable, and can not arbitrarily distort.For each node in block chain, being all can be with
Other nodal information validity authenticities are verified.
Step 104: after certification passes through, the academic performance information and encrypted identity contact details being closed
Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
After establishing the block catenary system of above-mentioned social platform, can provide to the information of the user in block chain into
The interface checked of row can be with for this purpose, after being associated the academic performance information and encrypted identity contact details
Include:
S1: the requesting node received in the block chain checks request to the encrypted identity contact details;
S2: checking request in response to described, sends to the user and checks request;
S3: receive the user check authorization message after, Xiang Suoshu requesting node is open to described encrypted
Identity information checks permission.
The above method is illustrated below with reference to a specific embodiment, it is important to note, however, that the specific implementation
Example does not constitute an undue limitation on the present application merely to the application is better described.
In view of block chain technology can be introduced in professional social platform, by the cryptography means of block chain, use
Family can submit the private informations such as personal contact method in platform, control it in the visibility of flat roof area by user itself.Into
One step, user after the information such as learning experiences, the professional history of typing itself, can by third-party institution's node or he
The mode of people's endorsement carries out authenticity examination to the information of input, to guarantee that the authenticity of the information of user's input is available
Verifying.
Specifically, the function of the following aspects may be implemented in block chain and professional social platform:
1) user management: forming virtual identity on chain in user's registration, carry out encryption storage to the real information of user,
To realize the secret protection to user;
For example, virtualization process can be carried out to the identity information of user, it can be and only show which user had submitted
A little information, which information are not submitted, but the information content for specifically having been filed on information is not shown, or to the letter of submission
Breath carries out encryption or specially treated, for example, cell-phone number is shown are as follows: 138********23, birthday are shown as 00 month 0000 00
Day, name can be using the camouflage name signal that user rises, for example, user Zhang San, gives oneself camouflage property name:
One two three, that is, encryption processing is carried out to identity information of user etc., so that others will not arbitrarily get the true letter of user
Breath.Cited by above-mentioned is that the virtual processing to cell-phone number, name, birthday etc. can also be to other when actually realizing
Information virtually handled, such as: identification card number, native place etc. can be carried out certain data processing.It is, in chain
The information of the user of upper display can not allow others to obtain true user information easily.
2) authenticity is checked: being introduced into the third-party institution as the node in block chain, is carried out to qualifications such as educational background, technical ability true
Reality verification;
3) group verifies: for the personal information containing social attribute, being promoted by the way of group's verifying to information truth
The checking ability of property;
4) data are anti-fake: the information of user is submitted, Information Authentication records overall process cochain, is formed for virtual identity on chain
Complete experience record.
It is stored that is, block chain is used to share account book under professional social platform framework as bottom data, and introduces
The agency nodes such as examination, the examination of technical ability certificate are gone through as verifying node.
Upon registration, such as the crucial personal information such as contact method can be defaulted using asymmetric encryption mode user
It is encrypted, the other users such as platform can only see the submission state of its every terms of information, can't see true content.
The information such as educational background, the technical ability certificate submitted for user, firstly, being committed to mechanism verifying node carries out authenticity
Verifying, after being verified, the personal information entry that can be used as user enters chain preservation, and records proofing state, actual effect, mentions
Hand over the related informations such as time.
User can choose after submitting personal profession information and request his its artificial proof.All users are in platform
The professional history of other users can be proved, all proofs and the process being proved to and result all cochains are protected
It deposits, it is this in such a way that group verifies, it can effectively safeguard data validity.
For example, can choose other user's (example in block chain after user A has submitted the educational background of oneself, job information
Such as: user B, user C and user D, these three users are to register in platform and recognize the people of user A) letter is carried out as it
Validation verification is ceased, three of them enter chain to the verification result of the authenticity verification of the information of user A and identifier and protect
It deposits, so that verification process is traceable, and can not arbitrarily distort.For each node in block chain, being all can be with
Other nodal information validity authenticities are verified.
As soon as a special certifying organization can be increased in above-mentioned block chain as verifying node, the effect of the node
It is to enter the user of chain and carrying out information authenticity verifying.
In upper example, the identity contact details and educational background performance information of target user are obtained, are existed for identity contact details
It carries out saving into chain again after encryption, to guarantee that the basic identity contact details of user not will be leaked, academic technical ability is believed
Breath first carries out authenticity verification, to be certified to carry out saving into chain again after, thus to oneself when avoiding user's registration
Technical ability is gone through to play tricks.Data for entering chain preservation can be checked with the user in social platform.It solves through the above way
The problem of user identity contact details in the presence of existing social platform will be leaked and user input false educational background energy conservation
The problem of information, has reached the technical effect of the safety and authenticity that improve data.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side
Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases
The former is more preferably embodiment.
Embodiment two
The date storage method of the social platform provided in one based on the above embodiment provides a kind of social activity in the present embodiment
The data-storage system of platform, specifically, Fig. 2 and Fig. 3 show the optional structures of the data-storage system of the social platform
Block diagram, the data-storage system of the social platform are divided into one or more program modules, one or more program module
It is stored in storage medium, and as performed by one or more processors, to complete the present invention.The so-called program mould of the present invention
Block is the series of computation machine program instruction section for referring to complete specific function, is more suitable for describing social platform than program itself
Implementation procedure of the data-storage system in storage medium, the function of each program module of the present embodiment will specifically be introduced by being described below
Can:
As shown in Fig. 2, the data-storage system 20 of social platform includes:
Module 201 is obtained, for obtaining the registration information of target user, wherein include: identity connection in the registration information
It is information and academic performance information;
Encrypting module 202, for being encrypted to the identity contact details;
Authentication module 203, for carrying out authenticity verification to the academic performance information by the node in block chain, and
Verification process and result save into chain;
Enter chain module 204, for after certification passes through, by the academic performance information and encrypted identity contact details
It is associated, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
In one embodiment, encrypting module 202 can specifically contact the identity by asymmetric encryption mode
Information is encrypted, wherein encrypted identity contact details, the node in block chain are only capable of viewing every terms of information
Submission state, the true information content are hiding, to ensure that the safety of information.
In one embodiment, authentication module 203 specifically can be by the certification authority in the block chain to described
Academic performance information carries out authenticity verification;Alternatively, by the predetermined quantity user node in the block chain to
It goes through performance information and carries out authenticity verification.
In one embodiment, above-mentioned identity contact details can include but is not limited at least one of: identity card
Number, telephone number, WeChat ID, mailbox, home address, unit address;The educational background performance information can include but is not limited to
At least one of: educational background, track record, technical ability certificate.
In one embodiment, as shown in figure 3, the data storage of above-mentioned social platform can also include: receiving module
301, request is checked to the encrypted identity contact details for receiving the requesting node in block chain;Sending module
302, for checking request in response to described, is sent to the user and check request;Open module 303, for receiving the use
Family checks after authorization message that the opening of Xiang Suoshu requesting node checks permission to the encrypted identity information.
About the device in above-described embodiment, wherein each unit, module execute the concrete mode of operation related
It is described in detail in the embodiment of this method, no detailed explanation will be given here.
In each embodiment of the present embodiment, the identity contact details and educational background performance information of target user are obtained,
Identity contact details are carried out again after encryption to save into chain, to guarantee that the basic identity contact details of user will not be let out
Dew first carries out authenticity verification for academic performance information, to be certified to carry out saving into chain again after, to avoid user
It plays tricks when registration to the academic technical ability of oneself.Data for entering chain preservation can be checked with the user in social platform.
Solving the problems, such as the user identity contact details in the presence of existing social platform through the above way will be leaked and use
The problem of academic energy-saving information of family input vacation, the technical effect of the safety and authenticity that improve data is reached.
Embodiment three
A kind of electronic device is provided in the preferred embodiment of the invention three.Fig. 4 is that electronic device one is real according to the present invention
Apply the hardware structure schematic diagram of example.In the present embodiment, electronic device 2 is that one kind can be according to the finger for being previously set or storing
It enables, the automatic equipment for carrying out numerical value calculating and/or information processing.For example, it may be smart phone, tablet computer, notebook are electric
Brain, desktop computer, rack-mount server, blade server, tower server or Cabinet-type server (including independent clothes
Server cluster composed by business device or multiple servers) etc..As shown, electronic device 2 includes, but is not limited to:
The data storage of connection memory 21, processor 22, network interface 23 and social platform can be in communication with each other by system bus
System 20.Wherein:
Memory 21 includes at least a type of computer readable storage medium, and readable storage medium storing program for executing includes flash memory, hard
Disk, multimedia card, card-type memory (for example, SD or DX memory etc.), random access storage device (RAM), static random-access
Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), may be programmed read-only storage at read-only memory (ROM)
Device (PROM), magnetic storage, disk, CD etc..In some embodiments, memory 21 can be the inside of electronic device 2
Memory module, such as the hard disk or memory of the electronic device 2.In further embodiments, memory 21 is also possible to electronics dress
Set the plug-in type hard disk being equipped on 2 External memory equipment, such as the electronic device 2, intelligent memory card (Smart Media
Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Certainly, memory 21 is gone back
Can both including electronic device 2 storage inside module and also including its External memory equipment.In the present embodiment, memory 21 is usual
For storing the operating system and types of applications software that are installed on electronic device 2, such as the data-storage system 20 of social platform
Program code etc..In addition, memory 21 can be also used for temporarily storing the Various types of data that has exported or will export.
Processor 22 can be in some embodiments central processing unit (Central Processing Unit, CPU),
Controller, microcontroller, microprocessor or other data processing chips.The processor 22 is commonly used in control electronic device 2
Overall operation, such as execute control relevant to the progress data interaction of electronic device 2 or communication and processing etc..The present embodiment
In, program code or processing data of the processor 22 for storing in run memory 21, such as the social platform of operation
Data-storage system 20 etc..
Network interface 23 may include radio network interface or wired network interface, which is commonly used in electronics
Communication connection is established between device 2 and other electronic devices.For example, network interface 23 be used for by network by electronic device 2 with
Exterior terminal is connected, and establishes data transmission channel and communication connection etc. between electronic device 2 and exterior terminal.Network can be with
It is intranet (Intranet), internet (Internet), global system for mobile communications (Global System of
Mobile communication, GSM), wideband code division multiple access (Wideband Code Division Multiple
Access, WCDMA), 4G network, 5G network, bluetooth (Bluetooth), the wirelessly or non-wirelessly network such as Wi-Fi.
It should be pointed out that Fig. 4 illustrates only the electronic device with component 21-23, it should be understood that simultaneously should not
Realistic to apply all components shown, the implementation that can be substituted is more or less component.
In the present embodiment, the data-storage system 20 for the social platform being stored in memory 21 can also be divided into
One or more program module, one or more program module are stored in memory 21, and by one or more
It is performed to manage device (the present embodiment is processor 22), to complete the present invention.
Example IV
The present embodiment also provides a kind of computer readable storage medium, is stored in computer readable storage medium social flat
The data-storage system of platform, the data-storage system of social platform can performed by least one processor so that at least one
Processor executes the step of date storage method such as the social platform of embodiment one.
In the present embodiment, computer readable storage medium include flash memory, hard disk, multimedia card, card-type memory (for example,
SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM),
Electrically erasable programmable read-only memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD
Deng.In some embodiments, computer readable storage medium can be the internal storage unit of computer equipment, such as the calculating
The hard disk or memory of machine equipment.In further embodiments, computer readable storage medium is also possible to the outer of computer equipment
The plug-in type hard disk being equipped in portion's storage equipment, such as the computer equipment, intelligent memory card (Smart Media Card,
SMC), secure digital (Secure Digital, SD) blocks, flash card (Flash Card) etc..Certainly, computer-readable storage medium
Matter can also both including computer equipment internal storage unit and also including its External memory equipment.In the present embodiment, computer
Readable storage medium storing program for executing is installed on the operating system and types of applications software of computer equipment, such as embodiment two commonly used in storage
Client ensure analysis system program code etc..In addition, computer readable storage medium can be also used for temporarily storing
Various types of data through exporting or will export.
Obviously, those skilled in the art should be understood that each module of the above-mentioned embodiment of the present invention or each step can be with
It is realized with general computing device, they can be concentrated on a single computing device, or be distributed in multiple computing devices
On composed network, optionally, they can be realized with the program code that computing device can perform, it is thus possible to by it
Store and be performed by computing device in the storage device, and in some cases, can be held with the sequence for being different from herein
The shown or described step of row, perhaps they are fabricated to each integrated circuit modules or will be multiple in them
Module or step are fabricated to single integrated circuit module to realize.In this way, the embodiment of the present invention be not limited to it is any specific hard
Part and software combine.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair
Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills
Art field, is included within the scope of the present invention.
Claims (10)
1. a kind of date storage method of social platform, which comprises the steps of:
Step 101: obtaining the registration information of target user, wherein include: identity contact details and educational background in the registration information
Performance information;
Step 102: the identity contact details are encrypted;
Step 103: authenticity verification is carried out to the academic performance information by the node in block chain, and by verification process and
As a result it carries out saving into chain;
Step 104: after certification passes through, the academic performance information and encrypted identity contact details are associated, and
Save into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
2. the method according to claim 1, wherein being encrypted to the identity contact details, comprising:
The identity contact details are encrypted by asymmetric encryption mode, wherein encrypted identity connection letter
It ceases, the node in block chain is only capable of viewing the submission state of every terms of information, and the true information content is hiding.
3. the method according to claim 1, wherein by the node in block chain to the academic performance information
Carry out authenticity verification, comprising:
The academic performance information is sent to certification authority;
Receive the authenticity verification result to the academic performance information that the certification authority returns;
In the case where the authenticity verification result is that verification passes through, determine that the academic performance information is recognized by authenticity
Card.
4. the method according to claim 1, wherein by the node in block chain to the academic performance information
Carry out authenticity verification, comprising:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, determine that the academic performance information is logical
Cross authenticity verification, wherein user node associated with target user is that there are social attributes or family with the target user
The user node of front yard attribute.
5. the method according to claim 1, wherein joining by the academic performance information and encrypted identity
It is after information is associated, further includes:
The requesting node received in the block chain checks request to the encrypted identity contact details;
Request is checked in response to described, is sent to the user and is checked request;
Receive the user check authorization message after, Xiang Suoshu requesting node is open to the encrypted identity information
Check permission.
6. a kind of electronic device, including memory and processor, which is characterized in that the memory can be by the place for storing
The data-storage system for the social platform that device executes is managed, the data-storage system of the social platform includes:
Module is obtained, for obtaining the registration information of target user, wherein include: identity contact details in the registration information
With academic performance information;
Encrypting module, for being encrypted to the identity contact details;
Authentication module, for carrying out authenticity verification to the academic performance information by the node in block chain, and will certification
Process and result save into chain;
Enter chain module, for after certification passes through, the academic performance information and encrypted identity contact details to be closed
Connection, and saved into chain, wherein the data for entering chain preservation can be checked by the registration user in social platform.
7. electronic device according to claim 6, which is characterized in that the encrypting module is specifically used for adding by asymmetric
The identity contact details are encrypted in close mode, wherein encrypted identity contact details, the node in block chain
It is only capable of viewing the submission state of every terms of information, the true information content is hiding.
8. device according to claim 6, which is characterized in that the authentication module is specifically used for:
The academic performance information is sent to multiple user nodes associated with the target user in block chain;
Receive the validation of information result that multiple user nodes return;
In the case where the user node number of return information confirmation result exceeds preset threshold, determine that the academic performance information is logical
Cross authenticity verification, wherein user node associated with target user is that there are social attributes or family with the target user
The user node of front yard attribute.
9. a kind of computer equipment, comprising: memory and processor, wherein the processor requires 1 to 5 for perform claim
Any one of the method the step of.
10. a kind of non-volatile computer readable storage medium storing program for executing, is stored thereon with computer instruction, which is characterized in that the finger
Order is performed the step of realizing any one of claims 1 to 5 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221237.7A CN109492993A (en) | 2018-10-19 | 2018-10-19 | Date storage method, electronic device and the storage medium of social platform |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811221237.7A CN109492993A (en) | 2018-10-19 | 2018-10-19 | Date storage method, electronic device and the storage medium of social platform |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109492993A true CN109492993A (en) | 2019-03-19 |
Family
ID=65692230
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811221237.7A Pending CN109492993A (en) | 2018-10-19 | 2018-10-19 | Date storage method, electronic device and the storage medium of social platform |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109492993A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110032890A (en) * | 2019-04-15 | 2019-07-19 | 京东方科技集团股份有限公司 | A kind of secure network and a kind of safety access method |
CN110059503A (en) * | 2019-04-24 | 2019-07-26 | 成都派沃特科技股份有限公司 | The retrospective leakage-preventing method of social information |
CN110188109A (en) * | 2019-04-03 | 2019-08-30 | 阿里巴巴集团控股有限公司 | Approaches to IM, device and equipment and storage medium based on block chain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030158960A1 (en) * | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107483498A (en) * | 2017-09-22 | 2017-12-15 | 中国联合网络通信集团有限公司 | Academic authentication method and system based on block chain |
CN108171068A (en) * | 2017-12-31 | 2018-06-15 | 天津大学 | A kind of student status certification alliance catenary system and its operation method |
-
2018
- 2018-10-19 CN CN201811221237.7A patent/CN109492993A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20030158960A1 (en) * | 2000-05-22 | 2003-08-21 | Engberg Stephan J. | System and method for establishing a privacy communication path |
CN107181765A (en) * | 2017-07-25 | 2017-09-19 | 光载无限(北京)科技有限公司 | Network digital identity identifying method based on block chain technology |
CN107483498A (en) * | 2017-09-22 | 2017-12-15 | 中国联合网络通信集团有限公司 | Academic authentication method and system based on block chain |
CN108171068A (en) * | 2017-12-31 | 2018-06-15 | 天津大学 | A kind of student status certification alliance catenary system and its operation method |
Non-Patent Citations (1)
Title |
---|
陈嘉兴等: "《现代通信技术导论 第2版》", 北京邮电大学出版社, pages: 186 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110188109A (en) * | 2019-04-03 | 2019-08-30 | 阿里巴巴集团控股有限公司 | Approaches to IM, device and equipment and storage medium based on block chain |
CN110188109B (en) * | 2019-04-03 | 2023-10-31 | 创新先进技术有限公司 | Block chain-based information management method, device and equipment and storage medium |
CN110032890A (en) * | 2019-04-15 | 2019-07-19 | 京东方科技集团股份有限公司 | A kind of secure network and a kind of safety access method |
CN110059503A (en) * | 2019-04-24 | 2019-07-26 | 成都派沃特科技股份有限公司 | The retrospective leakage-preventing method of social information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI706368B (en) | Block chain-based service leasing method, device, system and electronic equipment | |
CN108898389B (en) | Content verification method and device based on block chain and electronic equipment | |
CN109862041A (en) | A kind of digital identification authentication method, unit, system and storage medium | |
CN109951489A (en) | A kind of digital identification authentication method, unit, system and storage medium | |
CN107257340A (en) | A kind of authentication method, authentication data processing method and equipment based on block chain | |
CN110046482A (en) | Identity verification method and its system | |
CN106911641A (en) | For authorizing the client terminal device for accessing, server unit and access control system | |
CN108701276A (en) | System and method for managing digital identity | |
WO2018213519A1 (en) | Secure electronic transaction authentication | |
US20200213296A1 (en) | Providing verified claims of user identity | |
US20190141048A1 (en) | Blockchain identification system | |
CN108256303A (en) | Electronic device, auth method and storage medium | |
CN110046156A (en) | Content Management System and method, apparatus, electronic equipment based on block chain | |
CN109492993A (en) | Date storage method, electronic device and the storage medium of social platform | |
CN109379360A (en) | Auditing method, electronic device and computer readable storage medium | |
US11550892B2 (en) | Presentation of a verifiable credential having usage data | |
CN110071809A (en) | Virtual and true identity and its associate management system and method, device and medium | |
EP4107639A1 (en) | Derived child verifiable credential with selective claims | |
KR102628504B1 (en) | Method and apparatus for providing user profile | |
CN113779637B (en) | Attribute data processing method, attribute data processing device, attribute data processing equipment and attribute data processing medium | |
CN110348988A (en) | Arbitration process method, electronic device and computer readable storage medium | |
CN109710692A (en) | User information processing method, device and storage medium in a kind of block chain network | |
US20230179588A1 (en) | Verifiable credential with dynamic claim | |
US20230179402A1 (en) | Device asserted verifiable credential | |
CN115345634A (en) | Academic degree authentication management system based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |