CN109636416A - Malice two dimensional code tagging system and method based on block chain - Google Patents

Malice two dimensional code tagging system and method based on block chain Download PDF

Info

Publication number
CN109636416A
CN109636416A CN201811442156.XA CN201811442156A CN109636416A CN 109636416 A CN109636416 A CN 109636416A CN 201811442156 A CN201811442156 A CN 201811442156A CN 109636416 A CN109636416 A CN 109636416A
Authority
CN
China
Prior art keywords
report
dimensional code
user
malice
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811442156.XA
Other languages
Chinese (zh)
Inventor
张宗洋
管晔玮
吴青璐
徐煜凯
王身行
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201811442156.XA priority Critical patent/CN109636416A/en
Publication of CN109636416A publication Critical patent/CN109636416A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a kind of malice two dimensional code tagging systems and method based on block chain, wherein the system includes: authentication module, for registering the system account of user, it inputs customized account and password, when login, authentication is completed according to account and password;Scanning report module obtains two-dimensional barcode information and report number, generates report information and be uploaded to block chain for parsing scanned two dimensional code;Cash pledge repays module, for obtaining a certain number of tokens when user's registration, the token of the first preset quantity is paid when report as cash pledge, and two dimensional code be predetermined value person-time report when, return the token of the second preset quantity, and when the report number of two dimensional code is greater than preset threshold, the token of third preset quantity is returned.The system utilizes intelligent terminal application software and block platform chain, completes label and statistics to malice two dimensional code using report mechanism, reduces the risk that user opens two dimensional code malicious websites, report data is prevented to be tampered.

Description

Malice two dimensional code tagging system and method based on block chain
Technical field
The present invention relates to field of information security technology, in particular to a kind of malice two dimensional code tagging system based on block chain And method.
Background technique
With popularizing for mobile network, more and more people are added in mobile phone netizen, and a large number of users is scanned using mobile phone Two dimensional code is exchanged and is paid.Meanwhile being also developed for the virus of mobile terminal, wherein two dimensional code becomes mainstream Viral channel source.However, optionally scanning unknown two dimensional code makes since user to risk brought by two dimensional code and does not know about User becomes the victim of moving 2 D code virus.
By scanning the two-dimensional code many demands that can satisfy in people's life, but related system is in scanning input two dimension After code, user can't be detected and reminded to the two dimensional code, but directly accesses the information in two dimensional code, make malice two dimension Code is easy to jeopardize user, which solves.
Summary of the invention
The present invention is directed to solve at least some of the technical problems in related technologies.
For this purpose, an object of the present invention is to provide a kind of malice two dimensional code tagging system based on block chain, this is System utilizes intelligent terminal application software and block platform chain, completes label and system to malice two dimensional code using cash pledge report mechanism Meter reduces the risk that user opens two dimensional code malicious websites, and report data is prevented to be tampered.
It is another object of the present invention to propose a kind of malice two dimensional code labeling method based on block chain.
In order to achieve the above objectives, one aspect of the present invention embodiment proposes a kind of malice two dimension code labeling based on block chain System, comprising: authentication module for registering the system account of user, and inputs customized account and password, and in institute When stating user's login, authentication is completed according to the account and the password;Scanning report module, for being swept to the user The two dimensional code retouched is parsed, and obtains two-dimensional barcode information and report number, to generate report information, and by the report information It is uploaded to block chain;Cash pledge repays module and reports the two dimension for obtaining a certain number of tokens in the user's registration The token of the first preset quantity is paid when code as cash pledge, and when the two dimensional code is predetermined person-time report of value, return the The token of two preset quantities, and when the report number of the two dimensional code is greater than preset threshold, return the generation of third preset quantity Coin, wherein the third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and described Third preset quantity is greater than first preset quantity.The malice two dimension code labeling system based on block chain of the embodiment of the present invention System, by combining two dimensional code to cooperate using intelligent terminal application software and block platform chain traditional malicious call label The label of pairs of malice two dimensional code and statistical work, and down payment plan is set, it is ensured that the confidence level of flag data reduces user and beats The risk for opening two dimensional code malicious websites prevents report data to be tampered, and further user can utilize the application journey on intelligent terminal Sequence opens and uses or reports label two dimensional code.
In addition, the malice two dimensional code tagging system according to the above embodiment of the present invention based on block chain can also have with Under additional technical characteristic:
Further, in one embodiment of invention, the user identity authentication module includes: registering unit, is used for After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain and is put down Platform, to register the platform account of identical registration information;Transmission unit, for taking account password to carry out by the mobile terminal It logs in, and sends identity information and logging request to cloud server;Authentication unit, in the identity information and the note When volume information is consistent, the block platform chain is logged in, completes user identity authentication, allows logging in system by user, is otherwise returned wrong False information, to log in again.
Further, in one embodiment of invention, the scanning report module includes: resolution unit, for passing through The mobile device scans the two dimensional code, and parses to the two dimensional code, to obtain the two-dimensional barcode information and current Report number;Inspection unit, for detecting whether the user has reported the two dimensional code, wherein if reported, report Failure, otherwise records and uploads the report information.
Further, in one embodiment of invention, it includes: take-up unit that the cash pledge, which repays module, in institute When stating two dimensional code described in user's report, the cash pledge of the user is collected, checks whether the report number is greater than the default threshold Value;First returns unit, for replacing the cash pledge, wherein the number replaced is according to when being greater than the preset threshold Report number obtains;Second return unit, for be less than the preset threshold when, wouldn't return of down payment, in the report When number is equal to the preset threshold, the 200% of the cash pledge is returned.
Wherein, when the token of the user is less than the cash pledge, report is not supported to operate.
In order to achieve the above objectives, another aspect of the present invention embodiment proposes a kind of malice two dimensional code mark based on block chain Note method, comprising: S1 registers the system account of user, and inputs customized account and password, and logs in the user When, authentication is completed according to the account and the password;S2 parses the two dimensional code of the scanning input, obtains Two-dimensional barcode information and report number warn the user, and the user reports the two dimensional code, then generate report information, And the report information is uploaded to block chain;S3 obtains a certain number of tokens, report described two in the user's registration The token of the first preset quantity is paid when tieing up code as cash pledge, and when the two dimensional code is predetermined person-time report of value, return The token of second preset quantity, and when the report number of the two dimensional code is greater than preset threshold, return third preset quantity Token, wherein the third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and institute Third preset quantity is stated greater than first preset quantity.
The malice two dimensional code labeling method based on block chain of the embodiment of the present invention, by marking traditional malicious call In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal Code.
In addition, the malice two dimensional code labeling method according to the above embodiment of the present invention based on block chain can also have with Under additional technical characteristic:
Further, in one embodiment of the invention, S1 includes: to install client application or network in mobile terminal After application plug-in, the registration information of login account is sent to block platform chain, to register the platform account of identical registration information; It takes account password to be logged in by the mobile terminal, and sends identity information and logging request to cloud server;? When the identity information is consistent with the registration information, the block platform chain is logged in, completes user identity authentication, allows user Otherwise login system returns to error message, to log in again.
Further, in one embodiment of the invention, S2 includes: to scan the two dimension by the mobile device Code, and the two dimensional code is parsed, to obtain the two-dimensional barcode information and current report number, if the two dimensional code parsed Content is URL, occurs continuing to access and reports option, if parsing QR code content is not URL, report option only occurs;Inspection Survey whether the user has reported the two dimensional code, wherein if reported, report failure, otherwise record and upload described Report information;When continuing access, browser is opened to access corresponding website.
Further, in one embodiment of the invention, it when S3 includes: the two dimensional code described in the user's report, receives The cash pledge of the user is taken, checks whether the report number is greater than the preset threshold;When being greater than the preset threshold, move back Change the cash pledge, wherein the number replaced is obtained according to the report number;When being less than the preset threshold, wouldn't return Cash pledge, to return the 200% of the cash pledge when the report number is equal to the preset threshold.
Wherein, when the token of the user is less than the cash pledge, report is not supported to operate.
The additional aspect of the present invention and advantage will be set forth in part in the description, and will partially become from the following description Obviously, or practice through the invention is recognized.
Detailed description of the invention
Above-mentioned and/or additional aspect and advantage of the invention will become from the following description of the accompanying drawings of embodiments Obviously and it is readily appreciated that, in which:
Fig. 1 is the malice two dimensional code tagging system structural schematic diagram based on block chain according to one embodiment of the invention;
Fig. 2 is the user identity authentication flow chart according to one embodiment of the invention;
Fig. 3 is to report flow chart according to the scanning of one embodiment of the invention;
Fig. 4 is to repay flow chart according to the cash pledge of one embodiment of the invention;
Fig. 5 is the malice two dimensional code tagging system block diagram based on block chain according to one embodiment of the invention;
Fig. 6 is the malice two dimensional code tagging system flow chart based on block chain according to the specific embodiment of the invention;
Fig. 7 is the malice two dimensional code labeling method flow chart based on block chain according to one embodiment of the invention.
Specific embodiment
The embodiment of the present invention is described below in detail, examples of the embodiments are shown in the accompanying drawings, wherein from beginning to end Same or similar label indicates same or similar element or element with the same or similar functions.Below with reference to attached The embodiment of figure description is exemplary, it is intended to is used to explain the present invention, and is not considered as limiting the invention.
The malice two dimensional code tagging system based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings And method, the malice two dimension code labeling system based on block chain proposed according to embodiments of the present invention is described with reference to the accompanying drawings first System.
Fig. 1 is the malice two dimensional code tagging system structural schematic diagram based on block chain of one embodiment of the invention.
As shown in Figure 1, being somebody's turn to do the malice two dimensional code tagging system 10 based on block chain includes: authentication module 100, scanning Report that module 200 and cash pledge repay module 300.
Wherein, authentication module 100 is used to register the system account of user, and inputs customized account and password, and And when user logs in, authentication is completed according to account and password.
Scanning report module 200 obtains two-dimensional barcode information and report for parsing to the two dimensional code of scanning input Report information to generate report information, and is uploaded to block chain by number.
Cash pledge repays module 300 for obtaining a certain number of tokens in user's registration, and the is paid when reporting two dimensional code The token of one preset quantity as cash pledge, and two dimensional code be predetermined value person-time report when, return the second preset quantity generation Coin, and when the report number of two dimensional code is greater than preset threshold, return the token of third preset quantity, wherein third is default Quantity is reduced on the basis of the second preset quantity with certain functional relation, and third preset quantity is greater than the first present count Amount.The malice two dimensional code tagging system 10 of the embodiment of the present invention utilizes intelligent terminal application software and block platform chain, completion pair The label and statistics of malice two dimensional code reduce the risk that user opens two dimensional code malicious websites, further reduced report data Distort.
Specifically, the operating procedure of the system 10 of the embodiment of the present invention includes: 1: Accreditation System account;2: user sends and steps on Record request;4: verifying log-on message;6: scan the two-dimensional code, two-dimensional code display content and report number;7: report two dimensional code;8: branch Pay token;9: the data such as QR code content, user's name are uploaded into block chain;10: after report person-time reaches certain amount, by one Determine multiplying power and returns token.The system 10 of the embodiment of the present invention can be kept away under the premise of guaranteeing two dimensional code energy normally convenient use Exempt from malice two dimensional code and continued the phenomenon that infecting more ignorant users after doing evil, reduces the unconscious scanning malice two dimension of user The risk of code further reduced distorting for report data, have biggish realistic meaning and promotion prospect.
Further, in one embodiment of the invention, user identity authentication module 100 includes: registering unit, is used for After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain and is put down Platform, to register the platform account of identical registration information;Transmission unit, for taking account password to be stepped on by mobile terminal Record, and identity information and logging request are sent to cloud server;Authentication unit, for being consistent in identity information with registration information When, block platform chain is logged in, user identity authentication is completed, allows logging in system by user, returns to error message, otherwise to step on again Land.
Wherein, client application or network plug-in refer to the client or net with the matched mobile communication equipment of this system Network plug-in unit, by using matched client or network plug-in, it is ensured that the data correctness and safety of information exchanging process Property, the risk of information leakage is reduced, while the client should be endowed the permission for calling the camera model of mobile communication equipment, To guarantee normal use.
As shown in Fig. 2, user identity authentication module 100 is used for user's registration system account, customized account and close is inputted Code.Chartered user logs in, is completed by way of account number cipher.Specifically, user identity authentication module 100 is held Row following steps:
Step 1: new user installs client application or network application plug-in unit, login account in mobile communication equipment, and incites somebody to action Registration information is sent to block platform chain, registers the platform account of a same account information;
Step 2: old user is logged in by way of taking account password in mobile communication equipment, is set with mobile communication It is standby to send identity information and logging request to cloud server, go to step 3;
Step 3: if user login information is consistent with registration information, successful log block platform chain is returned again to shifting Dynamic device end, completes user identity authentication, allows logging in system by user.If verification information is incorrect, wrong letter is returned Breath, user retry.
Further, in one embodiment of the invention, scanning report module 200 includes: resolution unit, for passing through Mobile device scans the two-dimensional code, and parses to two dimensional code, to obtain two-dimensional barcode information and current report number;Checklist Member, for detecting whether user has reported two dimensional code, wherein if reported, report failure, otherwise record and upload report Information.
As shown in figure 3, scanning report module 200 can be scanned report after user completes identity information certification Operation.Scanning input two dimensional code, parses using to two dimensional code, and returns to two-dimensional barcode information and report number.When report, Using can be by the content of two dimensional code, informer, the data such as report time be sent to block platform chain, by intelligent contract by offence reporting letter Breath is packaged and is uploaded to block chain.Specifically, scanning report module 200 executes following steps:
Step 4: user passes through the camera-scanning two dimensional code of mobile communication equipment, and is parsed, and return to the two dimension The specifying information of code, including QR code content, two-dimentional code type, two-dimentional symbol data, sweep time and the current two dimensional code By report number.When the QR code content parsed is a URL, " continuing to access " or " report " option are had, when When selecting " report ", 5 are gone to step, when selecting " continuing to access ", goes to step 6.When parsing result is not URL, do not occur " continuing Access " option, if report, goes to step 5;
Step 5: application is interacted with the intelligent contract that block platform chain has had been built up, and checks whether user had reported The two dimensional code is uploaded to block chain if not provided, this QR code content is recorded, if the user had reported same two Dimension code is primary, then returns to the information of report failure;
Step 6: in the case where continuing access, opening browser, access the website;
Further, in one embodiment of the invention, cash pledge repay module 300 include: take-up unit, for When two dimensional code is reported at family, the cash pledge of user is collected, checks whether report number is greater than preset threshold;First returns unit, is used for When being greater than preset threshold, cash pledge is replaced, wherein the number replaced is obtained according to report number;Second returns unit, is used for When less than preset threshold, wouldn't return of down payment, with report number be equal to preset threshold when, return the 200% of cash pledge.
Wherein, it pays in the case that a certain amount of token refers to that user's token amount is abundant as cash pledge, when the token of user When amount is not enough to branch deposit, then report operation can not be carried out;
As shown in figure 4, cash pledge, which repays module 300, can all obtain a certain number of tokens in every user's registration, only When a two dimensional code be exceeded a certain fixed threshold person-time report, just understand several times of return cash pledges, otherwise user can not bring back him Cash pledge, when certain two dimensional code has been exceeded person-time report of the threshold value, then the user reported, the multiplying power of return will It reduces, but the quantity for returning token is not less than the cash pledge quantity that user pays when reporting.Specifically, cash pledge repays mould Block 300 executes following steps:
Step 7: when user's report two dimensional code, user first pays a certain amount of token as cash pledge, reexamines later Whether the report number of this two dimensional code is more than certain fixed threshold, if it does, then going to step 8, if be no more than, goes to step 9;
Step 8: when user's report, and when two dimensional code alreadys exceed threshold value by report number, return of down payment, and return and give as security The number of gold is gradually decreased with the increase reported person-time;
Step 9: when user's report, and two dimensional code is by report number and when being less than threshold value, wouldn't return of down payment, wait until Report person-time returns the 200% of initial margin when reaching threshold value;
It should be noted that in embodiments of the present invention, user when reporting malice two dimensional code, reported secondary by two dimensional code Number is when being less than threshold value, wouldn't return of down payment return user until reporting that number reaches threshold value and pay the 200% of cash pledge, i.e., Two times of return cash pledges.When reporting that number is greater than threshold value, user reports again, and the quantity for returning token can be in two times of cash pledges On the basis of gradually decreased with certain functional relation, for the interests for ensureing user, the token returned when report number is greater than threshold value Quantity is not less than the cash pledge value that user pays, quantity pay cash pledge 100%~200% between.
Malice two dimensional code tagging system of the invention is described in detail by a specific embodiment, sets two dimensional code Report threshold value be 20 times, first user find the two dimensional code be malice two dimensional code, pay cash pledge and it reported, two dimension The number reported of code is 1, less than the report threshold value of setting, will not return cash pledge to first user, and similarly, the at 2-19 When user reports, cash pledge will not be returned, when the 20th user reports, reports successfully then two dimensional code The number reported is 20, the report threshold value exactly equal to set, at this moment, returns cash pledge to the 1-20 user immediately 200%, i.e., two times return cash pledges can return cash pledge when the 21st user reports the two dimensional code again immediately, return number and be greater than The 100% of cash pledge is less than the 200% of cash pledge, and return number with the increase of report number monotone decreasing, but not be less than The number that cash pledge is paid when report has ensured the equity of user.
Wherein, flag data is stored using block chain technology, compared to database purchase is utilized, data more safely may be used Letter.In addition, the report of malicious user can reduce the confidence level of two-dimentional code labeling, this hair when malicious user reports normal two dimensional code Cash pledge mechanism in bright embodiment, when user's mark two dimensional code, need branch deposit, after the two dimensional code is determined as malice two dimensional code Cash pledge will return to user with certain functional relation, which reduces the generation of malice flag event to a certain extent.
The malice two dimensional code tagging system tool detailed step based on block chain of the embodiment of the present invention is as shown in fig. 6, no longer It repeats.
Further, in an embodiment of the present invention, as shown in figure 5, the present invention program includes two parts:
1) mobile communication equipment: mobile communication equipment includes the intelligent portable equipment such as smart phone, plate and wrist-watch, and Support camera function and data connection function.
2) cloud: common carrier and block platform chain.Common carrier is responsible between mobile device and block platform chain Communication connection, communicate information to block chain, and pass the data that intelligent contract returns back mobile device;Block platform chain is then As information terminal, it is responsible for mobile communication equipment, operator and the background data base for handling with exchanging each source-information, is The core facility of information processing.
The embodiment of the present invention introduces report mechanism, avoids disliking under the premise of guaranteeing two dimensional code energy normally convenient use Meaning two dimensional code continues the phenomenon that infecting more ignorant users after doing evil, and reduces the wind of the unconscious scanning malice two dimensional code of user Danger introduces block chain technology, further prevents report data to be tampered, has biggish realistic meaning and promotion prospect.
The purpose of the embodiment of the present invention is that improving user for two by using for reference existing vicious disturbance call tagging system The safety understanding for tieing up code, allows user can be visually seen the safe coefficient of two dimensional code, to reduce the safety hazard of two dimensional code, and leads to Block chain technology is crossed, guarantees that report data information is not distorted and forged, by the deposit system of setting, malice is reduced and reports Probability of happening, system can verify user information, and with specification report behavior, it is empty to network is promoted not only to meet country Between safe requirement, also ensured that the report data of user are not written over, filled up gaps in market, there is biggish reality meaning Justice.
The malice two dimensional code tagging system based on block chain of the embodiment of the present invention has following innovative point:
1) data are stored using block chain technology.Block chain is a kind of distributed data base system, possesses decentralization, goes The characteristics such as trust and highly transparent ensure that the data of its storage will not be distorted by invasion using proof of work, increase use Family is to degree of belief of the invention.
2) malice two dimensional code is marked, has filled up gaps in market.Although it is serious that two dimensional code swindles situation, market Above without there is a product for the two-dimentional code labeling of malice, the embodiment of the present invention has filled up this vacancy.
3) equipment safety is protected from user psychology angle.Research to two dimensional code concentrates on reinforcing government regulation and setting In the modes such as electronic signature, but it is few from the scheme from the point of view of user.It is unclear in consumer according to psychological study When risk, behavior will more courageously, so can be more likely to open when user does not know the content and risk of current two-dimension It, the embodiment of the present invention by the content of two dimensional code and report number intuitively show in front of the user, will increase user for Two dimensional code is vigilant.
The malice two dimensional code tagging system based on block chain of the embodiment of the present invention, by marking traditional malicious call In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal Code.
The malice two dimensional code labeling method based on block chain proposed according to embodiments of the present invention is described referring next to attached drawing.
Fig. 7 is the malice two dimensional code labeling method flow chart based on block chain of one embodiment of the invention.
As shown in fig. 7, the malice two dimensional code labeling method based on block chain includes:
In step sl, the system account of user is registered, and inputs customized account and password, and is logged in user When, authentication is completed according to account and password.
In step s 2, the two dimensional code of scanning input is parsed, obtains two-dimensional barcode information with report number to warn User generates report information, and report information is uploaded to block chain if user reports two dimensional code.
In step s3, a certain number of tokens are obtained in user's registration, act pays the first present count when stating two dimensional code The token of amount returns the token of the second preset quantity, and two as cash pledge, and when two dimensional code is predetermined person-time report of value When tieing up the report number of code greater than preset threshold, the token of third preset quantity is returned, wherein third preset quantity is pre- second If being reduced on the basis of quantity with certain functional relation, and third preset quantity is greater than the first preset quantity.
Further, in one embodiment of the invention, S1 includes: to install client application or network in mobile terminal After application plug-in, the registration information of login account is sent to block platform chain, to register the platform account of identical registration information; It takes account password to be logged in by mobile terminal, and sends identity information and logging request to cloud server;In identity When information is consistent with registration information, block platform chain is logged in, completes user identity authentication, allows logging in system by user, otherwise returns Error message is returned, to log in again.
Further, in one embodiment of the invention, S2 includes: and is scanned the two-dimensional code by mobile device, and to two Dimension code is parsed, to obtain two-dimensional barcode information and current report number, if the QR code content parsed is URL, occur after Only there is report option if parsing QR code content is not URL in continuous access and report option;Whether detection user has reported Two dimensional code, wherein if reported, report failure, otherwise record and upload report information;When continuing access, browsing is opened Device is to access corresponding website.
Further, in one embodiment of the invention, S3 includes: to collect user's in user's report two dimensional code Cash pledge, checks whether report number is greater than preset threshold;When being greater than preset threshold, return of down payment, wherein the number root replaced It is obtained according to report number;Be less than preset threshold when, wouldn't return of down payment, with report number reach preset threshold when, return The 200% of cash pledge.
Wherein, when the token of user is less than cash pledge, report is not supported to operate.
It should be noted that the aforementioned explanation to the malice two dimensional code tagging system embodiment based on block chain is also fitted For the device of the embodiment, details are not described herein again.
The malice two dimensional code labeling method based on block chain of the embodiment of the present invention, by marking traditional malicious call In conjunction with two dimensional code, using intelligent terminal application software and block platform chain, the label and statistics to malice two dimensional code are completed in cooperation Work, and down payment plan is set, it is ensured that the confidence level of flag data reduces the risk that user opens two dimensional code malicious websites, prevents Only report data are tampered, and further user can open and use or report label two dimension using the application program on intelligent terminal Code.
In addition, term " first ", " second " are used for descriptive purposes only and cannot be understood as indicating or suggesting relative importance Or implicitly indicate the quantity of indicated technical characteristic.Define " first " as a result, the feature of " second " can be expressed or Implicitly include at least one this feature.In the description of the present invention, the meaning of " plurality " is at least two, such as two, three It is a etc., unless otherwise specifically defined.
In the description of this specification, reference term " one embodiment ", " some embodiments ", " example ", " specifically show The description of example " or " some examples " etc. means specific features, structure, material or spy described in conjunction with this embodiment or example Point is included at least one embodiment or example of the invention.In the present specification, schematic expression of the above terms are not It must be directed to identical embodiment or example.Moreover, particular features, structures, materials, or characteristics described can be in office It can be combined in any suitable manner in one or more embodiment or examples.In addition, without conflicting with each other, the skill of this field Art personnel can tie the feature of different embodiments or examples described in this specification and different embodiments or examples It closes and combines.
Although the embodiments of the present invention has been shown and described above, it is to be understood that above-described embodiment is example Property, it is not considered as limiting the invention, those skilled in the art within the scope of the invention can be to above-mentioned Embodiment is changed, modifies, replacement and variant.

Claims (10)

1. a kind of malice two dimensional code tagging system based on block chain characterized by comprising
Authentication module for registering the system account of user, and inputs customized account and password, and in the user When login, authentication is completed according to the account and the password;
Scanning report module, parses, and obtain two-dimensional barcode information and report time for the two dimensional code to the scanning input Number, to generate report information, and is uploaded to block chain for the report information;And
Cash pledge repays module, for obtaining a certain number of tokens in the user's registration, payment when reporting the two dimensional code The token of first preset quantity as cash pledge, and the two dimensional code be predetermined value person-time report when, return the second present count The token of amount, and when the report number of the two dimensional code is greater than preset threshold, return the token of third preset quantity, wherein The third preset quantity is reduced on the basis of second preset quantity with certain functional relation, and the third is default Quantity is greater than first preset quantity.
2. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that user's body Part authentication module includes:
Registering unit, for after mobile terminal installs client application or network application plug-in unit, the registration of login account to be believed Breath is sent to block platform chain, to register the platform account of identical registration information;
Transmission unit sends identity for taking account password to be logged in by the mobile terminal, and to cloud server Information and logging request;
Authentication unit is completed to use for when the identity information is consistent with the registration information, logging in the block platform chain Family authentication allows logging in system by user, returns to error message, otherwise to log in again.
3. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that the scanning is lifted Report module include:
Resolution unit for scanning the two dimensional code by the mobile device, and parses the two dimensional code, to obtain The two-dimensional barcode information and current report number;
Inspection unit, for detecting whether the user has reported the two dimensional code, wherein if reported, report failure, Otherwise it records and uploads the report information;
Access unit when for continuing access, opens browser to access corresponding website.
4. the malice two dimensional code tagging system according to claim 1 based on block chain, which is characterized in that the cash pledge is repaid Also module includes:
Take-up unit when being used for the two dimensional code described in the user's report, collects the cash pledge of the user, checks the report time Whether number is greater than the preset threshold;
First returns unit, for replacing the cash pledge, wherein the number replaced is according to institute when being greater than the preset threshold Report number is stated to obtain;
Second returns unit, for when being less than the preset threshold, wouldn't return of down payment, in the report number equal to institute When stating preset threshold, the 200% of the cash pledge is returned.
5. the malice two dimensional code tagging system according to claim 4 based on block chain, which is characterized in that wherein, described When the token of user is less than the cash pledge, report is not supported to operate.
6. a kind of malice two dimensional code labeling method based on block chain, which comprises the following steps:
S1, registers the system account of user, and inputs customized account and password, and when the user logs in, according to institute It states account and the password completes authentication;
S2 parses the two dimensional code of the scanning input, obtains two-dimensional barcode information and report number warns the user, institute It states user to report the two dimensional code, then generates report information, and the report information is uploaded to block chain;And
S3 obtains a certain number of tokens in the user's registration, and the first preset quantity is paid when reporting the two dimensional code Token returns the token of the second preset quantity, and in institute as cash pledge, and when the two dimensional code is predetermined person-time report of value When stating the report number of two dimensional code greater than preset threshold, the token of third preset quantity is returned, wherein the third preset quantity It is reduced on the basis of second preset quantity with certain functional relation, and the third preset quantity is greater than described first Preset quantity.
7. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S1 is further wrapped It includes:
After mobile terminal installs client application or network application plug-in unit, the registration information of login account is sent to block chain Platform, to register the platform account of identical registration information;
It takes account password to be logged in by the mobile terminal, and sends identity information to cloud server and asked with login It asks;
When the identity information is consistent with the registration information, the block platform chain is logged in, completes user identity authentication, is permitted Perhaps otherwise logging in system by user returns to error message, to log in again.
8. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S2 is further wrapped It includes:
The two dimensional code is scanned by the mobile device, and the two dimensional code is parsed, to obtain the two dimensional code letter Breath and current report number occur continuing to access and report option, if parsing two if the QR code content parsed is URL Tieing up digital content is not URL, report option only occurs;
Detect whether the user has reported the two dimensional code, wherein if reported, report failure, otherwise record and on Pass the report information;
When continuing access, browser is opened to access corresponding website.
9. the malice two dimensional code labeling method according to claim 6 based on block chain, which is characterized in that S3 is further wrapped It includes:
When the two dimensional code described in the user's report, the cash pledge of the user is collected, checks whether the report number is greater than institute State preset threshold;
When being greater than the preset threshold, the cash pledge is replaced, wherein the number replaced is obtained according to the report number;
Be less than the preset threshold when, wouldn't return of down payment, with the report number be equal to the preset threshold when, return The 200% of the cash pledge.
10. the malice two dimensional code labeling method according to claim 9 based on block chain, which is characterized in that wherein, described When the token of user is less than the cash pledge, report is not supported to operate.
CN201811442156.XA 2018-11-29 2018-11-29 Malice two dimensional code tagging system and method based on block chain Pending CN109636416A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811442156.XA CN109636416A (en) 2018-11-29 2018-11-29 Malice two dimensional code tagging system and method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811442156.XA CN109636416A (en) 2018-11-29 2018-11-29 Malice two dimensional code tagging system and method based on block chain

Publications (1)

Publication Number Publication Date
CN109636416A true CN109636416A (en) 2019-04-16

Family

ID=66069806

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811442156.XA Pending CN109636416A (en) 2018-11-29 2018-11-29 Malice two dimensional code tagging system and method based on block chain

Country Status (1)

Country Link
CN (1) CN109636416A (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819666A (en) * 2010-04-20 2010-09-01 上海拓景信息科技有限公司 Vehicle logistics information trading system and method as well as trading system and method
CN103281448A (en) * 2013-05-15 2013-09-04 江苏奇异点网络有限公司 Implementation method of mobile telephone anti-harassment software
CN104601782A (en) * 2015-01-09 2015-05-06 深圳市宝尔爱迪科技有限公司 Method and system for preventing crank calls
CN105162603A (en) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes
CN106561029A (en) * 2016-12-09 2017-04-12 北京安天电子设备有限公司 Semi-connection two-dimensional code detecting method and system
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN107705132A (en) * 2017-08-31 2018-02-16 重庆途比达信息技术有限公司 Visitor complains intelligent processing system and processing method
CN108320157A (en) * 2018-03-12 2018-07-24 北京智帮帮科技有限公司 A kind of digital transaction system based on block chain

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101819666A (en) * 2010-04-20 2010-09-01 上海拓景信息科技有限公司 Vehicle logistics information trading system and method as well as trading system and method
CN103281448A (en) * 2013-05-15 2013-09-04 江苏奇异点网络有限公司 Implementation method of mobile telephone anti-harassment software
CN104601782A (en) * 2015-01-09 2015-05-06 深圳市宝尔爱迪科技有限公司 Method and system for preventing crank calls
CN105162603A (en) * 2015-09-15 2015-12-16 重庆智韬信息技术中心 Method for realizing distribution of two-dimensional codes to users and commenting and security detection on two-dimensional codes
CN106561029A (en) * 2016-12-09 2017-04-12 北京安天电子设备有限公司 Semi-connection two-dimensional code detecting method and system
CN107391944A (en) * 2017-07-27 2017-11-24 北京太云科技有限公司 A kind of electronic health record shared system based on block chain
CN107563244A (en) * 2017-08-09 2018-01-09 维沃移动通信有限公司 A kind of two-dimension code safe verification method and mobile terminal
CN107705132A (en) * 2017-08-31 2018-02-16 重庆途比达信息技术有限公司 Visitor complains intelligent processing system and processing method
CN108320157A (en) * 2018-03-12 2018-07-24 北京智帮帮科技有限公司 A kind of digital transaction system based on block chain

Similar Documents

Publication Publication Date Title
CN104009977B (en) A kind of method and system of information protection
CN104899952B (en) Work attendance method and device based on instant messaging application
CN110457957B (en) Information processing method and device of electronic bill, electronic equipment and medium
US20130054433A1 (en) Multi-Factor Identity Fingerprinting with User Behavior
CN111709603B (en) Service request processing method, device and system based on wind control
US10147025B2 (en) Visual indicator status recognition
CN109377189B (en) Real estate electronic ticket system
CN109376999A (en) A kind of management-control method of transaction, device and equipment
CN109756341A (en) Electronic signature method and device
CN107800672A (en) A kind of Information Authentication method, electronic equipment, server and information authentication system
CN107480483A (en) A kind of method and device of account detection
CN105427203A (en) House renting information management method and system
CN107451819A (en) A kind of auth method and device based on user's operation behavior feature
CN103810635A (en) Method and device for realizing checking of loan business processing flow
CN110427254A (en) Task processing method, device, equipment and computer readable storage medium
CN107358411A (en) Correct personnel management methods and device
CN110264325A (en) A kind of invoice checking method and device based on block chain
CN109145590A (en) A kind of function hook detection method, detection device and computer-readable medium
CN109783447A (en) Electronics license deposits card method, acquisition methods, device, system and electronic equipment
CN109710689A (en) Enterprise's monitoring and managing method, system, device, equipment and readable storage medium storing program for executing
WO2020072794A1 (en) Digitized test management center
CN107679383A (en) A kind of auth method and device based on geographical position and contact pressure area
CN107944841A (en) Emolument computing system and method
CN109636416A (en) Malice two dimensional code tagging system and method based on block chain
CN106599328B (en) A kind of document handling method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190416

RJ01 Rejection of invention patent application after publication