CN109636416A - Malice two dimensional code tagging system and method based on block chain - Google Patents
Malice two dimensional code tagging system and method based on block chain Download PDFInfo
- Publication number
- CN109636416A CN109636416A CN201811442156.XA CN201811442156A CN109636416A CN 109636416 A CN109636416 A CN 109636416A CN 201811442156 A CN201811442156 A CN 201811442156A CN 109636416 A CN109636416 A CN 109636416A
- Authority
- CN
- China
- Prior art keywords
- report
- dimensional code
- user
- malice
- block chain
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
- G06Q30/0185—Product, service or business identity fraud
Landscapes
- Business, Economics & Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Finance (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a kind of malice two dimensional code tagging systems and method based on block chain, wherein the system includes: authentication module, for registering the system account of user, it inputs customized account and password, when login, authentication is completed according to account and password;Scanning report module obtains two-dimensional barcode information and report number, generates report information and be uploaded to block chain for parsing scanned two dimensional code;Cash pledge repays module, for obtaining a certain number of tokens when user's registration, the token of the first preset quantity is paid when report as cash pledge, and two dimensional code be predetermined value person-time report when, return the token of the second preset quantity, and when the report number of two dimensional code is greater than preset threshold, the token of third preset quantity is returned.The system utilizes intelligent terminal application software and block platform chain, completes label and statistics to malice two dimensional code using report mechanism, reduces the risk that user opens two dimensional code malicious websites, report data is prevented to be tampered.
Description
Technical field
The present invention relates to field of information security technology, in particular to a kind of malice two dimensional code tagging system based on block chain
And method.
Background technique
With popularizing for mobile network, more and more people are added in mobile phone netizen, and a large number of users is scanned using mobile phone
Two dimensional code is exchanged and is paid.Meanwhile being also developed for the virus of mobile terminal, wherein two dimensional code becomes mainstream
Viral channel source.However, optionally scanning unknown two dimensional code makes since user to risk brought by two dimensional code and does not know about
User becomes the victim of moving 2 D code virus.
By scanning the two-dimensional code many demands that can satisfy in people's life, but related system is in scanning input two dimension
After code, user can't be detected and reminded to the two dimensional code, but directly accesses the information in two dimensional code, make malice two dimension
Code is easy to jeopardize user, which solves.
Summary of the invention
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, an object of the present invention is to provide a kind of malice two dimensional code tagging system based on block chain, this is
System utilizes intelligent terminal application software and block platform chain, completes label and system to malice two dimensional code using cash pledge report mechanism
Meter reduces the risk that user opens two dimensional code malicious websites, and report data is prevented to be tampered.
It is another object of the present invention to propose a kind of malice two dimensional code labeling method based on block chain.
In order to achieve the above objectives, one aspect of the present invention embodiment proposes a kind of malice two dimension code labeling based on block chain
System, comprising: authentication module for registering the system account of user, and inputs customized account and password, and in institute
When stating user's login, authentication is completed according to the account and the password;Scanning report module, for being swept to the user
The two dimensional code retouched is parsed, and obtains two-dimensional barcode information and report number, to generate report information, and by the report information
It is uploaded to block chain;Cash pledge repays module and reports the two dimension for obtaining a certain number of tokens in the user's registration
The token of the first preset quantity is paid when code as cash pledge, and when the two dimensional code is predetermined person-time report of value, return the
The token of two preset quantities, and when the report number of the two dimensional code is greater than preset threshold, return the generation of third preset quantity
Coin, wherein the third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and described
Third preset quantity is greater than first preset quantity.The malice two dimension code labeling system based on block chain of the embodiment of the present invention
System, by combining two dimensional code to cooperate using intelligent terminal application software and block platform chain traditional malicious call label
The label of pairs of malice two dimensional code and statistical work, and down payment plan is set, it is ensured that the confidence level of flag data reduces user and beats
The risk for opening two dimensional code malicious websites prevents report data to be tampered, and further user can utilize the application journey on intelligent terminal
Sequence opens and uses or reports label two dimensional code.
In addition, the malice two dimensional code tagging system according to the above embodiment of the present invention based on block chain can also have with
Under additional technical characteristic:
Further, in one embodiment of invention, the user identity authentication module includes: registering unit, is used for
After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain and is put down
Platform, to register the platform account of identical registration information;Transmission unit, for taking account password to carry out by the mobile terminal
It logs in, and sends identity information and logging request to cloud server;Authentication unit, in the identity information and the note
When volume information is consistent, the block platform chain is logged in, completes user identity authentication, allows logging in system by user, is otherwise returned wrong
False information, to log in again.
Further, in one embodiment of invention, the scanning report module includes: resolution unit, for passing through
The mobile device scans the two dimensional code, and parses to the two dimensional code, to obtain the two-dimensional barcode information and current
Report number;Inspection unit, for detecting whether the user has reported the two dimensional code, wherein if reported, report
Failure, otherwise records and uploads the report information.
Further, in one embodiment of invention, it includes: take-up unit that the cash pledge, which repays module, in institute
When stating two dimensional code described in user's report, the cash pledge of the user is collected, checks whether the report number is greater than the default threshold
Value;First returns unit, for replacing the cash pledge, wherein the number replaced is according to when being greater than the preset threshold
Report number obtains;Second return unit, for be less than the preset threshold when, wouldn't return of down payment, in the report
When number is equal to the preset threshold, the 200% of the cash pledge is returned.
Wherein, when the token of the user is less than the cash pledge, report is not supported to operate.
In order to achieve the above objectives, another aspect of the present invention embodiment proposes a kind of malice two dimensional code mark based on block chain
Note method, comprising: S1 registers the system account of user, and inputs customized account and password, and logs in the user
When, authentication is completed according to the account and the password;S2 parses the two dimensional code of the scanning input, obtains
Two-dimensional barcode information and report number warn the user, and the user reports the two dimensional code, then generate report information,
And the report information is uploaded to block chain;S3 obtains a certain number of tokens, report described two in the user's registration
The token of the first preset quantity is paid when tieing up code as cash pledge, and when the two dimensional code is predetermined person-time report of value, return
The token of second preset quantity, and when the report number of the two dimensional code is greater than preset threshold, return third preset quantity
Token, wherein the third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and institute
Third preset quantity is stated greater than first preset quantity.
The malice two dimensional code labeling method based on block chain of the embodiment of the present invention, by marking traditional malicious call
In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation
Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents
Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal
Code.
In addition, the malice two dimensional code labeling method according to the above embodiment of the present invention based on block chain can also have with
Under additional technical characteristic:
Further, in one embodiment of the invention, S1 includes: to install client application or network in mobile terminal
After application plug-in, the registration information of login account is sent to block platform chain, to register the platform account of identical registration information;
It takes account password to be logged in by the mobile terminal, and sends identity information and logging request to cloud server;?
When the identity information is consistent with the registration information, the block platform chain is logged in, completes user identity authentication, allows user
Otherwise login system returns to error message, to log in again.
Further, in one embodiment of the invention, S2 includes: to scan the two dimension by the mobile device
Code, and the two dimensional code is parsed, to obtain the two-dimensional barcode information and current report number, if the two dimensional code parsed
Content is URL, occurs continuing to access and reports option, if parsing QR code content is not URL, report option only occurs;Inspection
Survey whether the user has reported the two dimensional code, wherein if reported, report failure, otherwise record and upload described
Report information;When continuing access, browser is opened to access corresponding website.
Further, in one embodiment of the invention, it when S3 includes: the two dimensional code described in the user's report, receives
The cash pledge of the user is taken, checks whether the report number is greater than the preset threshold;When being greater than the preset threshold, move back
Change the cash pledge, wherein the number replaced is obtained according to the report number;When being less than the preset threshold, wouldn't return
Cash pledge, to return the 200% of the cash pledge when the report number is equal to the preset threshold.
Wherein, when the token of the user is less than the cash pledge, report is not supported to operate.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description
Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments
Obviously and it is readily appreciated that, in which:
Fig. 1 is the malice two dimensional code tagging system structural schematic diagram based on block chain according to one embodiment of the invention;
Fig. 2 is the user identity authentication flow chart according to one embodiment of the invention;
Fig. 3 is to report flow chart according to the scanning of one embodiment of the invention;
Fig. 4 is to repay flow chart according to the cash pledge of one embodiment of the invention;
Fig. 5 is the malice two dimensional code tagging system block diagram based on block chain according to one embodiment of the invention;
Fig. 6 is the malice two dimensional code tagging system flow chart based on block chain according to the specific embodiment of the invention;
Fig. 7 is the malice two dimensional code labeling method flow chart based on block chain according to one embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end
Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached
The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
The malice two dimensional code tagging system based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings
And method, the malice two dimension code labeling system based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings first
System.
Fig. 1 is the malice two dimensional code tagging system structural schematic diagram based on block chain of one embodiment of the invention.
As shown in Figure 1, being somebody's turn to do the malice two dimensional code tagging system 10 based on block chain includes: authentication module 100, scanning
Report that module 200 and cash pledge repay module 300.
Wherein, authentication module 100 is used to register the system account of user, and inputs customized account and password, and
And when user logs in, authentication is completed according to account and password.
Scanning report module 200 obtains two-dimensional barcode information and report for parsing to the two dimensional code of scanning input
Report information to generate report information, and is uploaded to block chain by number.
Cash pledge repays module 300 for obtaining a certain number of tokens in user's registration, and the is paid when reporting two dimensional code
The token of one preset quantity as cash pledge, and two dimensional code be predetermined value person-time report when, return the second preset quantity generation
Coin, and when the report number of two dimensional code is greater than preset threshold, return the token of third preset quantity, wherein third is default
Quantity is reduced on the basis of the second preset quantity with certain functional relation, and third preset quantity is greater than the first present count
Amount.The malice two dimensional code tagging system 10 of the embodiment of the present invention utilizes intelligent terminal application software and block platform chain, completion pair
The label and statistics of malice two dimensional code reduce the risk that user opens two dimensional code malicious websites, further reduced report data
Distort.
Specifically, the operating procedure of the system 10 of the embodiment of the present invention includes: 1: Accreditation System account;2: user sends and steps on
Record request;4: verifying log-on message;6: scan the two-dimensional code, two-dimensional code display content and report number;7: report two dimensional code;8: branch
Pay token;9: the data such as QR code content, user's name are uploaded into block chain;10: after report person-time reaches certain amount, by one
Determine multiplying power and returns token.The system 10 of the embodiment of the present invention can be kept away under the premise of guaranteeing two dimensional code energy normally convenient use
Exempt from malice two dimensional code and continued the phenomenon that infecting more ignorant users after doing evil, reduces the unconscious scanning malice two dimension of user
The risk of code further reduced distorting for report data, have biggish realistic meaning and promotion prospect.
Further, in one embodiment of the invention, user identity authentication module 100 includes: registering unit, is used for
After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain and is put down
Platform, to register the platform account of identical registration information;Transmission unit, for taking account password to be stepped on by mobile terminal
Record, and identity information and logging request are sent to cloud server;Authentication unit, for being consistent in identity information with registration information
When, block platform chain is logged in, user identity authentication is completed, allows logging in system by user, returns to error message, otherwise to step on again
Land.
Wherein, client application or network plug-in refer to the client or net with the matched mobile communication equipment of this system
Network plug-in unit, by using matched client or network plug-in, it is ensured that the data correctness and safety of information exchanging process
Property, the risk of information leakage is reduced, while the client should be endowed the permission for calling the camera model of mobile communication equipment,
To guarantee normal use.
As shown in Fig. 2, user identity authentication module 100 is used for user's registration system account, customized account and close is inputted
Code.Chartered user logs in, is completed by way of account number cipher.Specifically, user identity authentication module 100 is held
Row following steps:
Step 1: new user installs client application or network application plug-in unit, login account in mobile communication equipment, and incites somebody to action
Registration information is sent to block platform chain, registers the platform account of a same account information;
Step 2: old user is logged in by way of taking account password in mobile communication equipment, is set with mobile communication
It is standby to send identity information and logging request to cloud server, go to step 3;
Step 3: if user login information is consistent with registration information, successful log block platform chain is returned again to shifting
Dynamic device end, completes user identity authentication, allows logging in system by user.If verification information is incorrect, wrong letter is returned
Breath, user retry.
Further, in one embodiment of the invention, scanning report module 200 includes: resolution unit, for passing through
Mobile device scans the two-dimensional code, and parses to two dimensional code, to obtain two-dimensional barcode information and current report number;Checklist
Member, for detecting whether user has reported two dimensional code, wherein if reported, report failure, otherwise record and upload report
Information.
As shown in figure 3, scanning report module 200 can be scanned report after user completes identity information certification
Operation.Scanning input two dimensional code, parses using to two dimensional code, and returns to two-dimensional barcode information and report number.When report,
Using can be by the content of two dimensional code, informer, the data such as report time be sent to block platform chain, by intelligent contract by offence reporting letter
Breath is packaged and is uploaded to block chain.Specifically, scanning report module 200 executes following steps:
Step 4: user passes through the camera-scanning two dimensional code of mobile communication equipment, and is parsed, and return to the two dimension
The specifying information of code, including QR code content, two-dimentional code type, two-dimentional symbol data, sweep time and the current two dimensional code
By report number.When the QR code content parsed is a URL, " continuing to access " or " report " option are had, when
When selecting " report ", 5 are gone to step, when selecting " continuing to access ", goes to step 6.When parsing result is not URL, do not occur " continuing
Access " option, if report, goes to step 5;
Step 5: application is interacted with the intelligent contract that block platform chain has had been built up, and checks whether user had reported
The two dimensional code is uploaded to block chain if not provided, this QR code content is recorded, if the user had reported same two
Dimension code is primary, then returns to the information of report failure;
Step 6: in the case where continuing access, opening browser, access the website;
Further, in one embodiment of the invention, cash pledge repay module 300 include: take-up unit, for
When two dimensional code is reported at family, the cash pledge of user is collected, checks whether report number is greater than preset threshold;First returns unit, is used for
When being greater than preset threshold, cash pledge is replaced, wherein the number replaced is obtained according to report number;Second returns unit, is used for
When less than preset threshold, wouldn't return of down payment, with report number be equal to preset threshold when, return the 200% of cash pledge.
Wherein, it pays in the case that a certain amount of token refers to that user's token amount is abundant as cash pledge, when the token of user
When amount is not enough to branch deposit, then report operation can not be carried out;
As shown in figure 4, cash pledge, which repays module 300, can all obtain a certain number of tokens in every user's registration, only
When a two dimensional code be exceeded a certain fixed threshold person-time report, just understand several times of return cash pledges, otherwise user can not bring back him
Cash pledge, when certain two dimensional code has been exceeded person-time report of the threshold value, then the user reported, the multiplying power of return will
It reduces, but the quantity for returning token is not less than the cash pledge quantity that user pays when reporting.Specifically, cash pledge repays mould
Block 300 executes following steps:
Step 7: when user's report two dimensional code, user first pays a certain amount of token as cash pledge, reexamines later
Whether the report number of this two dimensional code is more than certain fixed threshold, if it does, then going to step 8, if be no more than, goes to step 9;
Step 8: when user's report, and when two dimensional code alreadys exceed threshold value by report number, return of down payment, and return and give as security
The number of gold is gradually decreased with the increase reported person-time;
Step 9: when user's report, and two dimensional code is by report number and when being less than threshold value, wouldn't return of down payment, wait until
Report person-time returns the 200% of initial margin when reaching threshold value;
It should be noted that in embodiments of the present invention, user when reporting malice two dimensional code, reported secondary by two dimensional code
Number is when being less than threshold value, wouldn't return of down payment return user until reporting that number reaches threshold value and pay the 200% of cash pledge, i.e.,
Two times of return cash pledges.When reporting that number is greater than threshold value, user reports again, and the quantity for returning token can be in two times of cash pledges
On the basis of gradually decreased with certain functional relation, for the interests for ensureing user, the token returned when report number is greater than threshold value
Quantity is not less than the cash pledge value that user pays, quantity pay cash pledge 100%~200% between.
Malice two dimensional code tagging system of the invention is described in detail by a specific embodiment, sets two dimensional code
Report threshold value be 20 times, first user find the two dimensional code be malice two dimensional code, pay cash pledge and it reported, two dimension
The number reported of code is 1, less than the report threshold value of setting, will not return cash pledge to first user, and similarly, the at 2-19
When user reports, cash pledge will not be returned, when the 20th user reports, reports successfully then two dimensional code
The number reported is 20, the report threshold value exactly equal to set, at this moment, returns cash pledge to the 1-20 user immediately
200%, i.e., two times return cash pledges can return cash pledge when the 21st user reports the two dimensional code again immediately, return number and be greater than
The 100% of cash pledge is less than the 200% of cash pledge, and return number with the increase of report number monotone decreasing, but not be less than
The number that cash pledge is paid when report has ensured the equity of user.
Wherein, flag data is stored using block chain technology, compared to database purchase is utilized, data more safely may be used
Letter.In addition, the report of malicious user can reduce the confidence level of two-dimentional code labeling, this hair when malicious user reports normal two dimensional code
Cash pledge mechanism in bright embodiment, when user's mark two dimensional code, need branch deposit, after the two dimensional code is determined as malice two dimensional code
Cash pledge will return to user with certain functional relation, which reduces the generation of malice flag event to a certain extent.
The malice two dimensional code tagging system tool detailed step based on block chain of the embodiment of the present invention is as shown in fig. 6, no longer
It repeats.
Further, in an embodiment of the present invention, as shown in figure 5, the present invention program includes two parts:
1) mobile communication equipment: mobile communication equipment includes the intelligent portable equipment such as smart phone, plate and wrist-watch, and
Support camera function and data connection function.
2) cloud: common carrier and block platform chain.Common carrier is responsible between mobile device and block platform chain
Communication connection, communicate information to block chain, and pass the data that intelligent contract returns back mobile device;Block platform chain is then
As information terminal, it is responsible for mobile communication equipment, operator and the background data base for handling with exchanging each source-information, is
The core facility of information processing.
The embodiment of the present invention introduces report mechanism, avoids disliking under the premise of guaranteeing two dimensional code energy normally convenient use
Meaning two dimensional code continues the phenomenon that infecting more ignorant users after doing evil, and reduces the wind of the unconscious scanning malice two dimensional code of user
Danger introduces block chain technology, further prevents report data to be tampered, has biggish realistic meaning and promotion prospect.
The purpose of the embodiment of the present invention is that improving user for two by using for reference existing vicious disturbance call tagging system
The safety understanding for tieing up code, allows user can be visually seen the safe coefficient of two dimensional code, to reduce the safety hazard of two dimensional code, and leads to
Block chain technology is crossed, guarantees that report data information is not distorted and forged, by the deposit system of setting, malice is reduced and reports
Probability of happening, system can verify user information, and with specification report behavior, it is empty to network is promoted not only to meet country
Between safe requirement, also ensured that the report data of user are not written over, filled up gaps in market, there is biggish reality meaning
Justice.
The malice two dimensional code tagging system based on block chain of the embodiment of the present invention has following innovative point:
1) data are stored using block chain technology.Block chain is a kind of distributed data base system, possesses decentralization, goes
The characteristics such as trust and highly transparent ensure that the data of its storage will not be distorted by invasion using proof of work, increase use
Family is to degree of belief of the invention.
2) malice two dimensional code is marked, has filled up gaps in market.Although it is serious that two dimensional code swindles situation, market
Above without there is a product for the two-dimentional code labeling of malice, the embodiment of the present invention has filled up this vacancy.
3) equipment safety is protected from user psychology angle.Research to two dimensional code concentrates on reinforcing government regulation and setting
In the modes such as electronic signature, but it is few from the scheme from the point of view of user.It is unclear in consumer according to psychological study
When risk, behavior will more courageously, so can be more likely to open when user does not know the content and risk of current two-dimension
It, the embodiment of the present invention by the content of two dimensional code and report number intuitively show in front of the user, will increase user for
Two dimensional code is vigilant.
The malice two dimensional code tagging system based on block chain of the embodiment of the present invention, by marking traditional malicious call
In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation
Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents
Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal
Code.
The malice two dimensional code labeling method based on block chain proposed according to embodiments of the present invention is described referring next to attached drawing.
Fig. 7 is the malice two dimensional code labeling method flow chart based on block chain of one embodiment of the invention.
As shown in fig. 7, the malice two dimensional code labeling method based on block chain includes:
In step sl, the system account of user is registered, and inputs customized account and password, and is logged in user
When, authentication is completed according to account and password.
In step s 2, the two dimensional code of scanning input is parsed, obtains two-dimensional barcode information with report number to warn
User generates report information, and report information is uploaded to block chain if user reports two dimensional code.
In step s3, a certain number of tokens are obtained in user's registration, act pays the first present count when stating two dimensional code
The token of amount returns the token of the second preset quantity, and two as cash pledge, and when two dimensional code is predetermined person-time report of value
When tieing up the report number of code greater than preset threshold, the token of third preset quantity is returned, wherein third preset quantity is pre- second
If being reduced on the basis of quantity with certain functional relation, and third preset quantity is greater than the first preset quantity.
Further, in one embodiment of the invention, S1 includes: to install client application or network in mobile terminal
After application plug-in, the registration information of login account is sent to block platform chain, to register the platform account of identical registration information;
It takes account password to be logged in by mobile terminal, and sends identity information and logging request to cloud server;In identity
When information is consistent with registration information, block platform chain is logged in, completes user identity authentication, allows logging in system by user, otherwise returns
Error message is returned, to log in again.
Further, in one embodiment of the invention, S2 includes: and is scanned the two-dimensional code by mobile device, and to two
Dimension code is parsed, to obtain two-dimensional barcode information and current report number, if the QR code content parsed is URL, occur after
Only there is report option if parsing QR code content is not URL in continuous access and report option;Whether detection user has reported
Two dimensional code, wherein if reported, report failure, otherwise record and upload report information;When continuing access, browsing is opened
Device is to access corresponding website.
Further, in one embodiment of the invention, S3 includes: to collect user's in user's report two dimensional code
Cash pledge, checks whether report number is greater than preset threshold;When being greater than preset threshold, return of down payment, wherein the number root replaced
It is obtained according to report number;Be less than preset threshold when, wouldn't return of down payment, with report number reach preset threshold when, return
The 200% of cash pledge.
Wherein, when the token of user is less than cash pledge, report is not supported to operate.
It should be noted that the aforementioned explanation to the malice two dimensional code tagging system embodiment based on block chain is also fitted
For the device of the embodiment, details are not described herein again.
The malice two dimensional code labeling method based on block chain of the embodiment of the present invention, by marking traditional malicious call
In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation
Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents
Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal
Code.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance
Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or
Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three
It is a etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show
The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example
Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not
It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office
It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field
Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples
It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example
Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned
Embodiment is changed, modifies, replacement and variant.
Claims (10)
1. a kind of malice two dimensional code tagging system based on block chain characterized by comprising
Authentication module for registering the system account of user, and inputs customized account and password, and in the user
When login, authentication is completed according to the account and the password;
Scanning report module, parses, and obtain two-dimensional barcode information and report time for the two dimensional code to the scanning input
Number, to generate report information, and is uploaded to block chain for the report information;And
Cash pledge repays module, for obtaining a certain number of tokens in the user's registration, payment when reporting the two dimensional code
The token of first preset quantity as cash pledge, and the two dimensional code be predetermined value person-time report when, return the second present count
The token of amount, and when the report number of the two dimensional code is greater than preset threshold, return the token of third preset quantity, wherein
The third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and the third is default
Quantity is greater than first preset quantity.
2. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that user's body
Part authentication module includes:
Registering unit, for after mobile terminal installs client application or network application plug-in unit, the registration of login account to be believed
Breath is sent to block platform chain, to register the platform account of identical registration information;
Transmission unit sends identity for taking account password to be logged in by the mobile terminal, and to cloud server
Information and logging request;
Authentication unit is completed to use for when the identity information is consistent with the registration information, logging in the block platform chain
Family authentication allows logging in system by user, returns to error message, otherwise to log in again.
3. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that the scanning is lifted
Report module include:
Resolution unit for scanning the two dimensional code by the mobile device, and parses the two dimensional code, to obtain
The two-dimensional barcode information and current report number;
Inspection unit, for detecting whether the user has reported the two dimensional code, wherein if reported, report failure,
Otherwise it records and uploads the report information;
Access unit when for continuing access, opens browser to access corresponding website.
4. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that the cash pledge is repaid
Also module includes:
Take-up unit when being used for the two dimensional code described in the user's report, collects the cash pledge of the user, checks the report time
Whether number is greater than the preset threshold;
First returns unit, for replacing the cash pledge, wherein the number replaced is according to institute when being greater than the preset threshold
Report number is stated to obtain;
Second returns unit, for when being less than the preset threshold, wouldn't return of down payment, in the report number equal to institute
When stating preset threshold, the 200% of the cash pledge is returned.
5. the malice two dimensional code tagging system according to claim 4 based on block chain, which is characterized in that wherein, described
When the token of user is less than the cash pledge, report is not supported to operate.
6. a kind of malice two dimensional code labeling method based on block chain, which comprises the following steps:
S1, registers the system account of user, and inputs customized account and password, and when the user logs in, according to institute
It states account and the password completes authentication;
S2 parses the two dimensional code of the scanning input, obtains two-dimensional barcode information and report number warns the user, institute
It states user to report the two dimensional code, then generates report information, and the report information is uploaded to block chain;And
S3 obtains a certain number of tokens in the user's registration, and the first preset quantity is paid when reporting the two dimensional code
Token returns the token of the second preset quantity, and in institute as cash pledge, and when the two dimensional code is predetermined person-time report of value
When stating the report number of two dimensional code greater than preset threshold, the token of third preset quantity is returned, wherein the third preset quantity
It is reduced on the basis of second preset quantity with certain functional relation, and the third preset quantity is greater than described first
Preset quantity.
7. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S1 is further wrapped
It includes:
After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain
Platform, to register the platform account of identical registration information;
It takes account password to be logged in by the mobile terminal, and sends identity information to cloud server and asked with login
It asks;
When the identity information is consistent with the registration information, the block platform chain is logged in, completes user identity authentication, is permitted
Perhaps otherwise logging in system by user returns to error message, to log in again.
8. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S2 is further wrapped
It includes:
The two dimensional code is scanned by the mobile device, and the two dimensional code is parsed, to obtain the two dimensional code letter
Breath and current report number occur continuing to access and report option, if parsing two if the QR code content parsed is URL
Tieing up digital content is not URL, report option only occurs;
Detect whether the user has reported the two dimensional code, wherein if reported, report failure, otherwise record and on
Pass the report information;
When continuing access, browser is opened to access corresponding website.
9. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S3 is further wrapped
It includes:
When the two dimensional code described in the user's report, the cash pledge of the user is collected, checks whether the report number is greater than institute
State preset threshold;
When being greater than the preset threshold, the cash pledge is replaced, wherein the number replaced is obtained according to the report number;
Be less than the preset threshold when, wouldn't return of down payment, with the report number be equal to the preset threshold when, return
The 200% of the cash pledge.
10. the malice two dimensional code labeling method according to claim 9 based on block chain, which is characterized in that wherein, described
When the token of user is less than the cash pledge, report is not supported to operate.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442156.XA CN109636416A (en) | 2018-11-29 | 2018-11-29 | Malice two dimensional code tagging system and method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811442156.XA CN109636416A (en) | 2018-11-29 | 2018-11-29 | Malice two dimensional code tagging system and method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109636416A true CN109636416A (en) | 2019-04-16 |
Family
ID=66069806
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811442156.XA Pending CN109636416A (en) | 2018-11-29 | 2018-11-29 | Malice two dimensional code tagging system and method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109636416A (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819666A (en) * | 2010-04-20 | 2010-09-01 | 上海拓景信息科技有限公司 | Vehicle logistics information trading system and method as well as trading system and method |
CN103281448A (en) * | 2013-05-15 | 2013-09-04 | 江苏奇异点网络有限公司 | Implementation method of mobile telephone anti-harassment software |
CN104601782A (en) * | 2015-01-09 | 2015-05-06 | 深圳市宝尔爱迪科技有限公司 | Method and system for preventing crank calls |
CN105162603A (en) * | 2015-09-15 | 2015-12-16 | 重庆智韬信息技术中心 | Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes |
CN106561029A (en) * | 2016-12-09 | 2017-04-12 | 北京安天电子设备有限公司 | Semi-connection two-dimensional code detecting method and system |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN107705132A (en) * | 2017-08-31 | 2018-02-16 | 重庆途比达信息技术有限公司 | Visitor complains intelligent processing system and processing method |
CN108320157A (en) * | 2018-03-12 | 2018-07-24 | 北京智帮帮科技有限公司 | A kind of digital transaction system based on block chain |
-
2018
- 2018-11-29 CN CN201811442156.XA patent/CN109636416A/en active Pending
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101819666A (en) * | 2010-04-20 | 2010-09-01 | 上海拓景信息科技有限公司 | Vehicle logistics information trading system and method as well as trading system and method |
CN103281448A (en) * | 2013-05-15 | 2013-09-04 | 江苏奇异点网络有限公司 | Implementation method of mobile telephone anti-harassment software |
CN104601782A (en) * | 2015-01-09 | 2015-05-06 | 深圳市宝尔爱迪科技有限公司 | Method and system for preventing crank calls |
CN105162603A (en) * | 2015-09-15 | 2015-12-16 | 重庆智韬信息技术中心 | Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes |
CN106561029A (en) * | 2016-12-09 | 2017-04-12 | 北京安天电子设备有限公司 | Semi-connection two-dimensional code detecting method and system |
CN107391944A (en) * | 2017-07-27 | 2017-11-24 | 北京太云科技有限公司 | A kind of electronic health record shared system based on block chain |
CN107563244A (en) * | 2017-08-09 | 2018-01-09 | 维沃移动通信有限公司 | A kind of two-dimension code safe verification method and mobile terminal |
CN107705132A (en) * | 2017-08-31 | 2018-02-16 | 重庆途比达信息技术有限公司 | Visitor complains intelligent processing system and processing method |
CN108320157A (en) * | 2018-03-12 | 2018-07-24 | 北京智帮帮科技有限公司 | A kind of digital transaction system based on block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN104009977B (en) | A kind of method and system of information protection | |
CN104899952B (en) | Work attendance method and device based on instant messaging application | |
CN110457957B (en) | Information processing method and device of electronic bill, electronic equipment and medium | |
US20130054433A1 (en) | Multi-Factor Identity Fingerprinting with User Behavior | |
CN111709603B (en) | Service request processing method, device and system based on wind control | |
US10147025B2 (en) | Visual indicator status recognition | |
CN109377189B (en) | Real estate electronic ticket system | |
CN109376999A (en) | A kind of management-control method of transaction, device and equipment | |
CN109756341A (en) | Electronic signature method and device | |
CN107800672A (en) | A kind of Information Authentication method, electronic equipment, server and information authentication system | |
CN107480483A (en) | A kind of method and device of account detection | |
CN105427203A (en) | House renting information management method and system | |
CN107451819A (en) | A kind of auth method and device based on user's operation behavior feature | |
CN103810635A (en) | Method and device for realizing checking of loan business processing flow | |
CN110427254A (en) | Task processing method, device, equipment and computer readable storage medium | |
CN107358411A (en) | Correct personnel management methods and device | |
CN110264325A (en) | A kind of invoice checking method and device based on block chain | |
CN109145590A (en) | A kind of function hook detection method, detection device and computer-readable medium | |
CN109783447A (en) | Electronics license deposits card method, acquisition methods, device, system and electronic equipment | |
CN109710689A (en) | Enterprise's monitoring and managing method, system, device, equipment and readable storage medium storing program for executing | |
WO2020072794A1 (en) | Digitized test management center | |
CN107679383A (en) | A kind of auth method and device based on geographical position and contact pressure area | |
CN107944841A (en) | Emolument computing system and method | |
CN109636416A (en) | Malice two dimensional code tagging system and method based on block chain | |
CN106599328B (en) | A kind of document handling method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190416 |
|
RJ01 | Rejection of invention patent application after publication |