CN110266872B - Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium - Google Patents

Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium Download PDF

Info

Publication number
CN110266872B
CN110266872B CN201910463158.5A CN201910463158A CN110266872B CN 110266872 B CN110266872 B CN 110266872B CN 201910463158 A CN201910463158 A CN 201910463158A CN 110266872 B CN110266872 B CN 110266872B
Authority
CN
China
Prior art keywords
address book
information
data
target
block chain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910463158.5A
Other languages
Chinese (zh)
Other versions
CN110266872A (en
Inventor
夏修理
黄伟胜
梁鹰
任伟权
唐晨辉
潘浩
李宇光
仇国祥
纪柱
黄靖妍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Digital Life Technology Co Ltd
Original Assignee
CENTURY DRAGON INFORMATION NETWORK CO LTD
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by CENTURY DRAGON INFORMATION NETWORK CO LTD filed Critical CENTURY DRAGON INFORMATION NETWORK CO LTD
Priority to CN201910463158.5A priority Critical patent/CN110266872B/en
Publication of CN110266872A publication Critical patent/CN110266872A/en
Application granted granted Critical
Publication of CN110266872B publication Critical patent/CN110266872B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/02Details
    • H04L12/14Charging, metering or billing arrangements for data wireline or wireless communications
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M1/00Substation equipment, e.g. for use by subscribers
    • H04M1/26Devices for calling a subscriber
    • H04M1/27Devices whereby a plurality of signals may be stored simultaneously
    • H04M1/274Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc
    • H04M1/2745Devices whereby a plurality of signals may be stored simultaneously with provision for storing more than one subscriber number at a time, e.g. using toothed disc using static electronic memories, e.g. chips
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04MTELEPHONIC COMMUNICATION
    • H04M15/00Arrangements for metering, time-control or time indication ; Metering, charging or billing arrangements for voice wireline or wireless communications, e.g. VoIP
    • H04M15/47Fraud detection or prevention means
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/24Accounting or billing

Abstract

The invention relates to a method and a device for managing and controlling address book data and a cloud address book system, and belongs to the technical field of networks. The method comprises the following steps: receiving an operation request sent by a client; wherein, the operation request comprises data operation information; a target user is logged in by a client; sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and receiving operation data returned after the corresponding operation is executed by the block chain platform. By the technical scheme, the problem that address book data are unsafe due to the risk of misuse and leakage of the address book data by a cloud address book manager is solved. Corresponding operation is executed through the block chain platform, and the safety of the address book data can be effectively ensured through data involved in the decentralized block chain recording operation process.

Description

Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
Technical Field
The invention relates to the technical field of networks, in particular to a method and a device for managing and controlling address book data and a cloud address book system.
Background
With the continuous evolution of the mobile internet, the address book has forms of an IM address book (such as Wechat and Whatsapp), a local address book of a mobile phone, an address book of a mail contact person, and the like. The real meaning of the address book is the authenticated identity set, and a credible relationship chain is formed according to the authenticated identity set. Therefore, the safety of the address book can seriously affect the daily work and life of people. In order to prevent the personal address book from being lost, a cloud address book is often used to manage and control address book data, for example: storing, modifying, querying, etc. the data.
In the process of implementing the invention, the inventor finds that at least the following problems exist in the prior art: the existing address book management and control method is used for intensively managing and controlling address book data by a cloud address book manager, and the risk of misuse and leakage of the address book data by the cloud address book manager exists, so that the address book data are unsafe.
Disclosure of Invention
Based on this, the embodiment of the invention provides a method and a device for managing and controlling address book data and a cloud address book system, which can effectively ensure the safety of the address book data.
The content of the embodiment of the invention is as follows:
in a first aspect, an embodiment of the present invention provides a method for managing and controlling address book data, including the following steps: receiving an operation request sent by a client; wherein, the operation request comprises data operation information; the client logs in a target user; sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and receiving operation data returned after the corresponding operation is executed by the block chain platform.
In one embodiment, the step of sending an operation instruction to the blockchain platform according to the data operation information includes: acquiring target address book data of the target user from a block chain platform; if the data operation information is sequencing change information; acquiring the intimacy between the target user and each contact in the target address book data, and sending a sorting change instruction to the block chain platform; the sorting change instruction is used for triggering a block chain platform to change the sorting of the target address book data; and the intimacy is determined according to the contact person communication information between the target user and each contact person.
In one embodiment, the step of sending an operation instruction to the blockchain platform according to the data operation information includes: acquiring target address book data of the target user from a block chain platform; if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering a block chain platform to update the target address book data.
In one embodiment, the step of obtaining contact call information between the target user and each contact in the target address book data includes: and acquiring at least one item of the call times and the call duration between the target user and each contact from a database as the call information of the contacts.
In one embodiment, the step of calculating the intimacy degree between the target user and each contact according to the contact call information includes: acquiring an intimacy reference value of a target contact person; the target contact person is any one contact person in the target address book data; and calculating the weighted sum of the contact person communication information and the intimacy reference value to obtain the intimacy between the target user and the target contact person.
In one embodiment, the step of sending an address book update command to the blockchain platform according to the address book update information includes: sending a modification instruction to the block chain platform according to the address book updating information; and the modification instruction is used for triggering a block chain platform to modify the original information of the corresponding contact in the target address book data.
In one embodiment, the step of sending an address book update command to the blockchain platform according to the address book update information includes: sending a new adding instruction to the block chain platform according to the address book updating information; and the newly added instruction is used for triggering a block chain platform to newly add corresponding contact information in the target address book data.
In one embodiment, after the step of sending the address book update command to the blockchain platform according to the address book update information, the method further includes: receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data; searching matched address book data corresponding to the target version from a block chain platform according to the version number of the target version; sending a version recovery instruction to the client according to the matched address book data; and the version recovery instruction is used for controlling the client to replace target address book data in the application program with the matched address book data.
In one embodiment, the data operation information includes address book authorization information, where the address book authorization information is used to trigger the blockchain platform to acquire target address book data of the target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and an authorization certificate of the authorized contact; wherein the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data.
In one embodiment, further comprising: if an updating instruction sent by the client is received; wherein, the updating instruction comprises updated information of the target user; sending an information updating instruction to a block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; and the associated address book data is address book data corresponding to each contact in the target address book data.
In a second aspect, an embodiment of the present invention provides an address book data management and control device, including: the request receiving module is used for receiving an operation request sent by the client; wherein, the operation request comprises data operation information; the client logs in a target user; the instruction sending module is used for sending an operation instruction to the block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and the result receiving module is used for receiving the operation data returned after the corresponding operation is executed by the block chain platform.
In a third aspect, an embodiment of the present invention provides a cloud address book system, including: the system comprises a client, a server and a block chain platform which are connected through a network; wherein, an application program is configured on the terminal; the client logs in a target user; the client is used for sending an operation request to the server; the server is used for sending an operation instruction to the block chain platform according to the data operation information; the block chain platform is used for executing corresponding operation on the address book data of the target user according to the operation instruction; the server is further used for receiving operation data returned after the corresponding operation is executed by the block chain platform.
One of the above technical solutions has the following advantages or beneficial effects: when an operation request for the address book data is received, corresponding operation is executed through the block chain platform, data involved in the operation process can be recorded through the decentralized block chain, and the safety of the address book data is effectively guaranteed.
Drawings
Fig. 1 is an application environment diagram of a method for managing and controlling address book data in an embodiment;
fig. 2 is a schematic flowchart illustrating a method for managing and controlling address book data according to an embodiment;
FIG. 3 is a diagram illustrating a transaction process of the blockchain payment system in one embodiment;
FIG. 4 is a diagram illustrating address book authorization and sharing, according to one embodiment;
fig. 5 is a block diagram illustrating a structure of a device for managing and controlling address book data according to an embodiment;
FIG. 6 is a block diagram of a cloud address book system in one embodiment;
fig. 7 is a block diagram illustrating a structure of a cloud address book system according to another embodiment;
FIG. 8 is a block diagram of a cloud address book system in another embodiment;
FIG. 9 shows an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The method for managing and controlling address book data provided by the application can be applied to the application environment shown in fig. 1. The application environment comprises a client 101, a server 102 and a blockchain platform 103, which can form a cloud address book system. Wherein, the server 102 communicates with the client 101 and the blockchain platform 103 respectively through a network. The client 101 sends an operation request to the server 102, and the server 102 controls the blockchain platform 103 to execute a corresponding operation on the address book data and returns operation data obtained by executing the operation to the server 102. The client 101 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices; the server 102 may be implemented as a stand-alone server or a server cluster composed of a plurality of servers; the blockchain platform 103 may include a plurality of nodes therein, which may be implemented by various types of hosts.
The embodiment of the invention provides a method and a device for managing and controlling address book data, a cloud address book system, computer equipment and a storage medium. The following are detailed below.
In one embodiment, as shown in fig. 2, a method for managing and controlling address book data is provided. Taking the application of the method to the server side in fig. 1 as an example for explanation, the method comprises the following steps:
s201, receiving an operation request sent by a client; wherein, the operation request comprises data operation information; the client logs in a target user.
The client may send an operation request to the server according to the request of the application program. The application program can be IOS application, Andorid application, Web application, data analysis application and the like; specifically, the application may refer to an application corresponding to the cloud address book. Because the address book data corresponding to different applications may be different (for example, the contacts contained in the address book data are different, and the specific information formats contained in the contacts are different), an operation request may be sent by the application to the server by means of the client and the microservice gateway, so as to operate the address book data of the application.
The target user refers to a user using the current client. For example: the user A logs in an application program (the application program is used for realizing a cloud address book function and can be called as a cloud address book application program) through the mobile phone, after the application program is logged in, an inquiry control of the application program is clicked, and the mobile phone sends an operation request for inquiring address book data to the server. At this time, the user a can be regarded as the target user. In addition, an account registered by the user a on the cloud address book application may also be regarded as a target user. The related cloud address book is software for providing address book backup and recovery in order to prevent personal data loss; the address book in the mobile phone is backed up to the cloud end through the network, and then the cloud end information can be checked and managed through the mobile phone, the tablet or the computer.
The data operation information can be information for adding, modifying, updating, deleting, inquiring, checking contact consistency, verifying user identity, sequencing and the like to the address book data.
S202, sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user.
The address book data of the target user may refer to information such as names, telephones, account numbers, work units, jobs, addresses and the like of all contacts in the address book, and may also include related information of the target user. The address book data may be stored in the blockchain platform in a list form, and thus the address book data may also be referred to as an address book list in some cases.
Further, before sending the operation command to the blockchain, the blockchain platform needs to store address book data. Therefore, before S202, the client sends the address book data to be stored to the blockchain platform through the server, and the blockchain platform stores the address book data.
In some embodiments, before the step of receiving the operation request sent by the client, the method further includes: constructing target address book data according to at least one of the contact number and the contact name of a target user; and storing the target address book data through the block chain platform. The contact number, the contact name and other information are private information (sensitive information) of the user, and the private information of the user is encrypted and written into the decentralized distributed block chain (instead of the traditional data center). Therefore, any person or organization cannot read the address book data of the user unless the private key of the user is obtained or the user is authorized, and the company can be prevented from leaking or using the address book data of the user without authorization. In addition, the non-sensitive information of the number of calls, the call duration, the short call time and the like can be stored in a traditional data center (database). The block chain platform is combined with the traditional data center, the block chain is safe, a plurality of redundant backups exist, and the block chain is suitable for storing important data which occupies little storage space; the traditional data center has large storage capacity but leakage risk, is suitable for storing non-sensitive data, and thus, the mode of separately storing sensitive data and non-sensitive data can fully and reasonably utilize the existing storage resources and improve the efficiency of data storage and processing.
When the server receives the operation request, the operation on the address book data is realized through the block chain platform. On the other hand, the server in the embodiment of the invention adopts a micro-service architecture. Wherein, micro-service refers to developing a single small-sized service with business function, each service has its own processing and light communication mechanism, and can be deployed on a single or multiple servers. Micro-services also refer to a loosely coupled, service-oriented architecture with some bounded context.
For ease of understanding, the block chain technique and microservice architecture are described herein: the block chain is originated from the smart bit currency in China, is used as the bottom layer technology of the bit currency, is essentially a decentralized database, is a technical scheme for maintaining a reliable database collectively in a decentralized and trust-removing mode, and has the characteristics of open consensus, transparent transaction, anonymity of two parties, non-tampering, non-traceability and the like. For decentralization, the most important is to adopt a distributed architecture and a point-to-point transmission network mode to solve the interaction between points; for de-trust, the most important are two mechanisms: one is public/private key mechanism and one is consensus mechanism. The basic unit stored by the block chain platform is a block adopting a chain structure, namely, the newly added block records the mark of the last block. In addition, the block chain platform in the embodiment of the invention is constructed on a Kubernetes cluster, the Kubernetes cluster can run the whole block chain platform and is responsible for scheduling the docker container (the application runs on the docker container), and if some containers are found to run abnormally, tasks are automatically redeployed on other nodes, so that the automatic deployment, the elastic expansion and contraction capacity, the safety control and the operation and maintenance control of the microservice are realized, and the high availability is realized. The micro-service architecture is a distributed application technology architecture, and aims to effectively split application and realize agile development, rapid evolution, convenient fault tolerance and elastic expansion. The block chain technology and the micro-service architecture cannot be simply regarded as the combination of the micro-service and the distributed database, and the block chain platform can be used as a third-party application to interact with the micro-service, which is also the reason why the micro-service architecture can well play a role. Therefore, by combining the block chain technology with the micro-service, the decentralized cloud address book can be realized, so that the safety and the accuracy of the user address book are ensured.
Further, as shown in fig. 3, the implementation process of the blockchain technique is described below by taking bitcoin value transfer as an example: owner a signs a digital signature to the previous transaction and the next owner B using his or her private key and appends this signature to the end of the current bitcoin to make the transaction order. (B has the public key as the receiver address). A broadcasts the transaction list to the whole network, the bitcoin is sent to B, and each node incorporates the received transaction information into a block. Each node obtains the accounting right of the new block by analyzing the mathematical topic (the node repeatedly tries to find a numerical value, so that the data value, the Hash value of the last block in the block chain and the transaction list are sent to the SHA256 algorithm, and then the Hash value X can be calculated to meet certain conditions), and the node wins corresponding rewards. When one node finds a solution, all timestamp transactions recorded by the block are broadcasted to the whole network and are audited by other nodes of the whole network. The other nodes in the network check the correctness, and after no error, they add the block to the main chain and then start the next round of accounting contention.
S203, receiving operation data returned after the corresponding operation is executed by the block chain platform.
After the operation is performed, the blockchain platform may obtain corresponding operation data, such as: when the operation request is a request for inquiring the address book data, the data operation information is inquiry information of the address book data, and the obtained operation data can be the inquired address book data or information such as 'address book data inquiry success' and the like. The blockchain platform may return the obtained operational data to the server.
After receiving the operation data returned by the blockchain platform, the server can send the operation data to the client so that the client can know the operation condition of the address book data, and in addition, the client can update the related address book information in the application program according to the operation data so as to inform the user.
In this embodiment, the corresponding operation is executed through the blockchain platform, and the data involved in the operation process can be recorded through the decentralized blockchain, so that the address book data cannot be tampered, and the safety of the address book data is effectively ensured.
In one embodiment, the step of sending the operation instruction to the blockchain platform according to the data operation information includes: acquiring target address book data of a target user from a block chain platform; if the data operation information is the sequencing change information; acquiring intimacy between a target user and each contact in target address book data, and sending a sorting change instruction to a block chain platform; the sorting change instruction is used for triggering the block chain platform to change the sorting of the target address book data; the intimacy is determined according to the contact person communication information between the target user and each contact person.
In addition, if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering the block chain platform to update the target address book data.
The step of obtaining contact person communication information between the target user and each contact person in the target address book data comprises the following steps: and acquiring at least one item of the call times and the call duration between the target user and each contact from the database as the call information of the contact.
Further, the step of calculating the intimacy between the target user and each contact according to the contact call information comprises the following steps: acquiring an intimacy reference value of a target contact person; the target contact person is any contact person in the target address book data; and calculating the weighted sum of the contact person communication information and the affinity reference value to obtain the affinity of the target user and the target contact person. Through the method, the intimacy between each contact and the target user is calculated one by one so as to facilitate subsequent address book updating operation. In particular, the calculated intimacy may be calculated in a linear or non-linear manner.
The affinity reference value can be a value defined by a user, namely, the user can define different values for each contact according to the requirement of the user so as to represent the importance. Specifically, the intimacy reference value may be 1 divided by the user-defined ranking, and if the first intimacy reference value is 1, the second intimacy reference value is 0.5, and so on. Of course, the affinity reference value may be set in other setting manners, for example, if the target user sets contact a as a common contact, and does not set contacts B and C, the affinity reference value of contact a may be considered to be 1, and the affinity reference values of contacts B and C may be considered to be 0. It should be noted that the intimacy reference value may be updated according to the needs of the user.
Specifically, the method for calculating the intimacy between the target user and a certain target contact person in a linear manner can be implemented by the following formula:
Figure BDA0002078659020000071
wherein I is intimacy, O is the frequency of clicking the detail page of the target contact by the target user, DF is the calling frequency of the last half year (called to the target contact by the target user), DTimeiFor each dialed call duration, n is the number of dialed calls in the last half year, RF is the frequency of received calls in the last half year (dialed by the target contact to the target subscriber), m is the number of received calls in the last half year, RTimeiFor each received call duration, PI is last calculated affinity, C is affinity reference value, W1、W2、W3、W4、W5、W6And W0Are weights. The magnitude relationship of the initial weights may be: w0>>W1>W2>W3>W4>W5,W6And (5) at the later stage, dynamically optimizing according to the data feedback of user-defined sequencing and the last calculated intimacy.
Of course, the statistical period of the parameters in the above formula can be replaced by other times from half a year, for example: 1 year, 1 month or 1 week. In addition, the server can calculate the intimacy according to a specific time period and automatically update the list sequence of the target address book data; this time period may be 1 year, 1 month or 1 week, and may default to 1 week.
The block chain platform can place the contact information with the higher intimacy degree in the target address book data in front of other contacts according to the currently calculated intimacy degree of each contact, so that a user can find the contact with the higher intimacy degree more quickly. And then, the block chain platform can also send address book updating information to the client through the server so as to update the address book data displayed in the client.
At present, most address lists are sorted according to the sequence of an alphabet, and if a plurality of user contacts exist, the user contacts are often difficult to find the frequently-used contacts quickly. According to the address book data management and control method provided by the embodiment, the contact persons in the address book are sorted again according to the intimacy degree, the contact persons frequently clicked, dialed and received are automatically placed at the top according to the data of the user such as the call time, the frequency and the mark, and the sorting priority of the user can be higher than the algorithm priority, so that the contact persons needing to be operated can be found by the user at the first time, the time is saved for the user, and the use efficiency of the user is improved.
In one embodiment, the step of controlling the blockchain platform to update the target address book data according to the address book update information includes: sending a modification instruction to the block chain platform according to the address book updating information; and the modification instruction is used for triggering the block chain platform to modify the original information of the corresponding contact in the target address book data.
The step may also specifically include: sending a newly increased instruction to the block chain platform according to the address book updating information; and the new adding instruction is used for triggering the block chain platform to newly add corresponding contact information in the target address book data.
The step may further specifically include: sending a deleting instruction to the block chain platform according to the address book updating information; and the deleting instruction is used for triggering the block chain platform to delete the corresponding contact information in the target address book data.
The address book update information may be information obtained by modifying or adding information of a certain contact in the target address book data, for example: modifying or newly adding the position of the contact A; new contacts can be added; some or some of the stored contact information may also be deleted.
According to the embodiment, the address book data in the address book can be modified, deleted or newly added according to the requirements of the user, so that the latest address book data is recorded in the block chain platform, and the subsequent use of the user is ensured.
In one embodiment, further comprising: if an updating instruction sent by the client is received; wherein, the updating instruction comprises updated information of the target user; sending an information updating instruction to the block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; the associated address book data is address book data corresponding to each contact in the target address book data.
Further, after a certain contact B in the target address book data logs in the application program, a prompt message of 'XX contact information updated' can be output to the contact B through the application program, and the contact B can select to update the related associated address book data at the client, so that the address book data of the client can be always kept in the latest state.
The traditional cloud address book synchronization depends on a data center, and the synchronization process of the traditional cloud address book is user A, the data center and user B, and the synchronization process highly depends on the network and storage of the data center. According to the embodiment, the centralized point-to-point network is removed through the block chain, the identity information of the contact person is synchronized more safely and reliably, the risks of information tampering and interception are avoided, and the speed and reliability of information synchronization are improved.
In one embodiment, after the step of sending the address book update command to the blockchain platform according to the address book update information, the method further includes: receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data; searching target address book data corresponding to the target version from the block chain platform according to the version number of the target version; sending a version recovery instruction to the client according to the target address book data; and the version recovery instruction is used for controlling the client to replace the target address book data in the application program with the target address book data. And when the user updates the address book data once, the address book data before and after updating can be used as an address book version.
According to the embodiment, the address book version after the address book is updated by the user every time is recorded, the address book of the user can be recovered according to the specified version, and the intelligence of the cloud address book system can be effectively improved.
In one embodiment, the data operation information includes address book authorization information, and the address book authorization information is used for triggering the block chain platform to acquire target address book data of a target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the authorization certificate of the target address book data and the authorized contact (namely establishing an authorization and authorization relationship between the target address book data and the authorized contact); wherein the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data. In addition, the authorization certificate may also be used to indicate that the authorized contact has the right to share some contact information in the target address book data, and certainly, the authorization certificate also includes related information of the target user.
The authorization key may be a private key, which may be stored by the target user, or may be stored by the server 102 or the client 101.
On the other hand, the data operation information comprises address book sharing information, wherein the address book sharing information comprises a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared key; and if the shared secret key passes the verification, acquiring the authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data. And when receiving the authorized address book data returned by the blockchain platform, the server can send the authorized address book data to the client.
Specifically, a schematic diagram of address book authorization and sharing may be shown in fig. 4, and the specific flow is as follows:
1. the user (user a/B/C in fig. 4) sends an authorization request to the blockchain platform through a rights management service access interface (which may be provided on the server).
2. After the verification of the blockchain platform, signing an authorization certificate (which contains information of the authorized contact) through a first private key contained in the authorization request; and then, the block chain platform uploads the authorization certificate to the authorization information chain in a mode of adding blocks.
3. A data demander (namely a target user needing to share certain contact information) initiates an authorization request (the authorization request comprises a second private key) through a user identity service access interface; and the block chain platform verifies the second private key, and returns the address book data which needs to be shared by the user after confirming the identity of the data demand party.
The access interface of the authority management service and the access interface of the user identity service are different interfaces of a cloud address list application program and are used for realizing different functions.
In the traditional authorization mode, authorization and business process binding are realized, each application and data source company needs to sign an agreement independently, and a user is difficult to enter and exit authorization. In addition, the certificate of authority is easily tampered, and the public trust is lacked. The process of user address book authorization based on the block chain technology is a process of signing an authorization certificate by a user through a private key, and can break through the limitation of a traditional authorization mode and ensure the reliability of the authorization certificate. In addition, the existing cloud address book cannot share the contact, for example, if the user A needs to send part of data to the user B, the user A needs to copy and send the copied data to the user B; the embodiment of the invention can realize the rapid sharing of the address book, and the user B can perform authorization verification through the private key and acquire the authorized related address book data of the user A.
In one embodiment, the step of storing the target address book data through the blockchain platform includes: dividing target address book data into a white list sub address book and a black list sub address book; and respectively storing the white list subaddress list and the black list subaddress list through the block chain platform. The blockchain platform records a white list and a black list. Therefore, when the client receives the call, whether the current call is a fraud or harassing call can be determined by inquiring the black and white nameplate sub address book in the block chain platform, and the fraud or harassing call can be effectively intercepted.
In order to better understand the above method, an application example of the address book data management and control method of the present invention is described in detail below. The block chain platform stores address book data of users A/B/C/D/E, and the corresponding address book data are as follows:
Figure BDA0002078659020000101
firstly, address book data query
1. And the user A clicks a cloud address book application program on the mobile phone and sends an address book data query request to the server.
2. And the server controls the block chain platform to carry out identity authentication on the user, and if the identity authentication is passed, the address book data stored in the block chain platform by the user is obtained.
3. The server returns the inquired address book data (contact a1, contact a2 and contact a3) to the mobile phone; the mobile phone can update the address book data in the corresponding application program according to the address book data returned by the server.
Second, address book recommendation
1. And the user B clicks the cloud address book application program on the mobile phone and sends a sequencing change request to the server.
2. And the server controls the block chain platform to carry out identity authentication on the user B, and if the identity authentication is passed, the address book data stored in the block chain platform by the user B is obtained.
3. Acquiring data such as the number of calls, the call duration and the like between each contact and a user B of the address book data from a data center, taking the data as contact call information, calculating the intimacy between each contact and the user B according to the contact call information and user-defined sequencing setting, and reordering the address book data according to the intimacy obtained by calculation, wherein the new address book data are as follows:
contact b2
Contact b1
Contact b3
This allows the contact B2 with high affinity to be ranked in front of other contacts with low affinity, and the function of recommending the frequently used contact to the user B is realized.
Third, address list data synchronization
1. And if the address book information of the user C is updated, the cloud address book application program sends an update instruction to the server.
2. And the server controls the block chain platform to carry out identity verification on the user C, and if the identity verification is passed, the updated address book information of the user C is sent to each contact in the address book data of the user C through the block chain platform.
3. The address book data corresponding to each contact in the address book data of the user C is updated, the contacts can receive the information that the address book information of the user C is updated after logging in the cloud address book application program, and at the moment, the contacts can select to update the updated address book information of the user C to the mobile phone end of the contacts. Now, suppose that the contacts a and C are friends with each other, and the contact a1 in the user a is the user C, after the information of the user C is updated, the contact address book of the user a is updated immediately, and the updated contact address book is as follows:
contact a 1'
Contact a2
Contact a3
Fourth, address list data authorization sharing
1. And the user D clicks a cloud address book application program on the mobile phone, sends an address book authorization request to the server and carries the first private key in the address book authorization request.
2. And the server controls the blockchain platform to authenticate the identity of the user D according to the first private key, and if the identity authentication is passed, the address book data stored in the blockchain platform by the user D is obtained, and the information of the contact D2 is authorized to the user E.
3. And if the sharing request of the user E is received, the blockchain platform verifies the second private key of the user E, and when the verification is passed, the information of the contact D2 in the address book data of the user D is shared to the mobile phone used by the user E.
4. And after receiving the information of the contact d2, the mobile phone used by the user E outputs indication information to the user.
In the embodiment, the corresponding operations such as address book query, recommendation, data child-tiger, authorized sharing and the like are executed through the blockchain platform, and the safety of the address book data can be effectively ensured through recording the data involved in the operation process through the decentralized blockchain.
It should be noted that, for the sake of simplicity, the foregoing method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present invention is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present invention.
Based on the same idea as the management and control method of the address book data in the above embodiment, the present invention further provides a management and control device of the address book data, which can be used to execute the management and control method of the address book data. For convenience of description, in the schematic structural diagram of the embodiment of the address book data management device, only the part related to the embodiment of the present invention is shown, and those skilled in the art will understand that the illustrated structure does not constitute a limitation to the device, and may include more or less components than those illustrated, or combine some components, or arrange different components.
As shown in fig. 5, the apparatus for managing and controlling address book data includes a request receiving module 501, an instruction sending module 502, and a result receiving module 503, which are described in detail as follows: a request receiving module 501, configured to receive an operation request sent by a client; wherein, the operation request comprises data operation information; a target user is logged in by a client; an instruction sending module 502, configured to send an operation instruction to the block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and a result receiving module 503, configured to receive operation data returned after the corresponding operation is performed by the blockchain platform.
In one embodiment, the instruction sending module 502 includes: the first data acquisition submodule is used for acquiring target address book data of a target user from the block chain platform; the sorting change submodule is used for judging whether the data operation information is sorting change information or not; acquiring intimacy between a target user and each contact in target address book data, and sending a sorting change instruction to a block chain platform; the sorting change instruction is used for triggering the block chain platform to change the sorting of the target address book data; the intimacy is determined according to the contact person communication information between the target user and each contact person.
In one embodiment, the instruction sending module 502 further includes: the second data acquisition submodule is used for acquiring target address book data of a target user from the block chain platform; the address book updating submodule is used for updating the address book if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering the block chain platform to update the target address book data.
In one embodiment, the sorting change sub-module is further configured to obtain at least one of the number of times of call and the duration of call between the target user and each contact from the database as the contact call information.
In one embodiment, the order change submodule includes: the reference value acquisition unit is used for acquiring the intimacy reference value of the target contact person; the target contact person is any contact person in the target address book data; and the intimacy calculating unit is used for calculating the weighted sum of the contact person communication information and the intimacy reference value to obtain the intimacy between the target user and the target contact person.
In one embodiment, the address book update sub-module is further configured to send a modification instruction to the blockchain platform according to the address book update information; and the modification instruction is used for triggering the block chain platform to modify the original information of the corresponding contact in the target address book data.
In one embodiment, the address book update sub-module is further configured to send a new instruction to the blockchain platform according to the address book update information; and the new adding instruction is used for triggering the block chain platform to newly add corresponding contact information in the target address book data.
In one embodiment, the instruction sending module 502 further includes: the recovery request receiving submodule is used for receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data; the address book searching submodule is used for searching target address book data corresponding to the target version from the block chain platform according to the version number of the target version; the address book recovery submodule is used for sending a version recovery instruction to the client according to the target address book data; and the version recovery instruction is used for controlling the client to replace the target address book data in the application program with the target address book data.
In an embodiment, the instruction sending module 502 is further configured to send an authorization instruction to the blockchain platform if the data operation information is address book authorization information, where the authorization instruction is used to trigger the blockchain platform to obtain target address book data of a target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and the authorization certificate of the authorized contact; wherein the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data.
In one embodiment, the instruction sending module 502 includes: the authorization instruction sending submodule is used for judging whether the data operation information is address list sharing information or not; the address book sharing information comprises a sharing key; sending an authorized instruction to the blockchain platform, wherein the authorized instruction is used for triggering the blockchain platform to verify the shared key; and if the shared secret key passes the verification, acquiring the authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data.
In one embodiment, further comprising: the updating instruction receiving module is used for receiving an updating instruction sent by the client; wherein, the updating instruction comprises updated information of the target user; the information updating module is used for sending an information updating instruction to the block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; the associated address book data is address book data corresponding to each contact in the target address book data.
In one embodiment, further comprising: the address book building module is used for building target address book data according to at least one of the contact person number and the contact person name of the target user; and the address book storage module is used for storing target address book data through the block chain platform.
In one embodiment, the address book storage module includes: the address list classification submodule is used for classifying the target address list data into a white list sub-address list and a black list sub-address list; and the sub-address book storage module is used for respectively storing the white list sub-address book and the black list sub-address book through the block chain platform.
It should be noted that, the device for managing and controlling address book data of the present invention corresponds to the method for managing and controlling address book data of the present invention one to one, and the technical features and the advantages thereof described in the embodiments of the method for managing and controlling address book data are all applicable to the embodiments of the device for managing and controlling address book data, and specific contents may refer to the description in the embodiments of the method of the present invention, and are not described herein again, and thus are stated herein.
In addition, in the above-mentioned embodiment of the address book data management and control device, the logical division of each program module is only an example, and in practical applications, the above-mentioned function allocation may be performed by different program modules according to needs, for example, due to configuration requirements of corresponding hardware or convenience of implementation of software, that is, the internal structure of the address book data management and control device is divided into different program modules to perform all or part of the above-mentioned functions.
In an embodiment, as shown in fig. 6, there is further provided a cloud address book system, including: a client 601, a server 602, and a blockchain platform 603 connected via a network; wherein, the terminal is configured with an application program; a target user is logged in by a client; the client is used for sending an operation request to the server; the server is used for sending an operation instruction to the block chain platform according to the data operation information; the block chain platform is used for executing corresponding operation on the acquired address book data according to the operation instruction; and the server is also used for receiving the operation data returned after the corresponding operation is executed by the block chain platform. In the whole cloud address book system, the client can be regarded as an application layer, and the server can be regarded as a micro-service container layer.
In one embodiment, the server is further configured to construct target address book data according to at least one of a contact number and a contact name of a target user, and send the target address book data to the block chain platform; and the block chain platform is also used for storing target address book data. The block chain platform can ensure that the stored address book data cannot be tampered, and the safety of the address book data is ensured.
In one embodiment, the system further comprises a database connected with the server network; the server is also used for acquiring at least one item of the call times and the call duration between the target user and each contact person, taking the at least one item of the call times and the call duration as the call information of the contact person, and sending the call information of the contact person to the database; and the database is used for storing the communication information of the contact persons.
Further, the server is also used for receiving the visualization instruction, acquiring the contact call information from the database according to the visualization instruction, and outputting the contact call information in a visualization mode.
In one embodiment, the server is further configured to receive a configuration instruction, and complete configuration of the cloud address book system according to the configuration instruction.
In an embodiment, the server is further configured to monitor a service execution state of the cloud address book system, and output the warning information when the service execution state is abnormal.
In one embodiment, the server is further configured to receive a private key escrow instruction; the private key escrow instruction comprises a first escrow certificate and a corresponding private key to be escrowed; and storing the first escrow certificate and the private key to be escrowed. Further, the server is also used for receiving a private key retrieval instruction; wherein, the private key retrieval instruction comprises a second escrow certificate; and verifying the second escrow certificate, and if the second escrow certificate passes the verification, outputting a private key corresponding to the second escrow certificate. The embodiment can realize the escrow of the private key through the server, and certainly, the private key can also be stored by the user.
In order to better understand the cloud address book system, as shown in fig. 7, an application example of the cloud address book system of the present invention is described in detail below. The cloud address book system comprises a client, a server and a block chain platform which are connected through a network; specifically, the client communicates with the server through the microservice gateway; the terminal is provided with an application program (a Web application, an IOS application, an android application, and the like).
The service logic of the cloud address book system comprises 3 layers of a block chain service layer, a basic service layer and a common service layer, and is completed by 10 micro services in total, and the cloud address book system is characterized in that:
A. block chain service layer
1. Rights and version management service: and recording a white list and a black list, and intercepting fraud or harassing calls. And recording the version of the address book updated by the user, and restoring the address book of the user according to the specified version.
2. Address book synchronization service: if a user updates the address list, the update information is broadcasted through the blockchain point-to-point transmission network (i.e. one server sends out the message, and other servers receive the message). And after verification of the blockchain participant, storing the modified address book in the blockchain. Therefore, when his or her address book contact logs in the cloud address book client, the address book is automatically updated.
3. User authorization service: the key function of the method is to provide authentication, authorization, key distribution, storage, access and life cycle management functions (the life cycle management is simply understood, no authority is given, and when the process is given), and the core function is to verify the identity of a user through private key signature.
4. Affinity calculation and recommendation service: and calculating the intimacy degree of the user and each contact according to the information of the user and the contact, such as the call duration, the call frequency, the identity label and the like, and recommending people possibly interested by the user.
B. Basic business layer
1. Unified configuration service: the business deployment and change processes (such as service upgrading and vulnerability repairing) are solidified, so that the business deployment and change processes can be reused, expanded and predicted, and the operation and maintenance efficiency and the controllability of IT assets are improved.
2. Monitoring service: the built monitoring system can meet the requirement of primary cloud integrated monitoring, and the coupling degree of monitoring indexes is higher. The monitoring integration of the bottom layer/application system aims to automatically realize the service expansion and contraction.
3. And (3) alarm service: based on the monitoring data and the self-defined threshold value, automatic alarm of the service is realized, such as resource pressure, unavailable service, abnormal interface access and the like, and related operation, maintenance and research personnel are notified in a multi-path and multi-level manner by mails, short messages, WeChat, telephones and the like.
C. Generic service layer
1. Private key escrow service: the private key is the only certificate for obtaining the block chain information, and the user can select to backup the private key to own equipment or host the private key to the cloud address list system. After the private key is escrowed, the user can retrieve the private key with the valid credentials.
2. Data analysis and visualization service: and analyzing non-sensitive information such as time and frequency of the user using the cloud address book, and visualizing the analysis result to improve the user experience.
3. Client download service: the method provides the cloud address book client downloading and upgrading service, and stores the non-sensitive information (such as client downloading frequency and time) collected from the client into a data center of a service provider.
At present, the following traditional cloud address book systems are mainly available:
1) provided is a cloud communication system. As shown in fig. 8, the system includes a cloud address book client system, which is responsible for registering, logging in, authenticating, and downloading and upgrading data packages and software from a cloud communication data integration and downloading server; the cloud address book data integration and download service system is used for downloading and upgrading the data packet and the software and integrating the data; the user center system is used for storing data received from the client system of the cloud address book into a database of the user center; the method can provide accurate and comprehensive life information retrieval function for the user.
2) A network address book system. The method comprises the following steps: the mobile client is connected with the cloud server and transmits user address book data; the webpage client is connected with the cloud server and transmits user address book data; the cloud server receives user address book modification information sent by the client, writes the user address book modification information into the database, and performs version control management; and the cloud server pushes the change of the personal information of the user to each related friend of the user according to the friend permission setting and outputs the change to a synchronization module of the mobile client. The method can overcome the defects that the existing network address book lacks a version management mechanism and cannot carry out authority management, not only can carry out version management and authority management on the contact information, but also can carry out address book updating and pushing on appointed group members.
3) And (6) a cloud address book. The method comprises the following steps: the address book data storage unit is used for storing address book data and a public level in the cloud address book; the address book data mapping management unit is used for setting the mapping relation between the address book field ids of other users in the cloud address book and the contact person field identity of the local contact person in the local address book of the user, and storing the mapping relation into the address book data storage unit of the cloud address book; the address book data change log unit is used for automatically storing the modified address book field data into the address book data change log unit by the cloud address book after the user modifies the own address book data of the user in the cloud address book; and the address book data automatic updating unit is used for updating the address book data changed in the address book data change log unit into the local address book of the user after the user logs in the cloud address book.
The user data of the cloud address book system listed above is stored in a centralized data center, and the following problems exist: a. the cloud address book manager can acquire the address books of all users, and risks of leakage, abuse and tampering exist; b. reliability problems, for example, if the data center service is unavailable, all users cannot use the cloud address book; c. the method does not have the authority management capability, such as intercepting crank calls; d. contacts cannot be sorted according to user closeness; e. by adopting a traditional software architecture, rapid iterative development and flexible deployment are difficult; f. there is a risk that network transmissions will be attacked or intercepted. The cloud address book based on the block chain technology in the embodiment of the invention has the following characteristics: 1. the characteristics of de-centering and de-trust of the block chain are utilized, and distributed encryption storage is more safely realized; 2. Sharing of private data in the address book is achieved by signing the authorization certificate through a private key; 3. sorting the contact persons according to the intimacy degree; 4. the method comprises the steps that synchronous contact person information is achieved through a point-to-point network based on a block chain, and timely updating of an address list is achieved; 5. and the operation and maintenance development efficiency is higher, namely flexible calculation, continuous integration, continuous deployment and the like.
The method for managing and controlling address book data provided by the application can be applied to computer equipment shown in fig. 9. The computer device may be a server or a terminal device, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor is configured to provide computing and control capabilities; the memory comprises a nonvolatile storage medium and an internal memory, wherein the nonvolatile storage medium stores an operating system, a computer program (the computer program realizes a management and control method of address book data when being executed by the processor) and a database, and the internal memory provides an environment for the operating system in the nonvolatile storage medium and the running of the computer program; the database is used for storing data such as operation requests, address book data and the like; the network interface is used for communicating with an external terminal through network connection.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program: receiving an operation request sent by a client; wherein, the operation request comprises data operation information; the client logs in a target user; sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and receiving operation data returned after the corresponding operation is executed by the block chain platform.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring target address book data of the target user from a block chain platform; if the data operation information is sequencing change information; acquiring the intimacy between the target user and each contact in the target address book data, and sending a sorting change instruction to the block chain platform; the sorting change instruction is used for triggering a block chain platform to change the sorting of the target address book data; and the intimacy is determined according to the contact person communication information between the target user and each contact person.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring target address book data of the target user from a block chain platform; if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering a block chain platform to update the target address book data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and acquiring at least one item of the call times and the call duration between the target user and each contact from a database as the call information of the contacts.
In one embodiment, the processor, when executing the computer program, further performs the steps of: acquiring an intimacy reference value of a target contact person; the target contact person is any one contact person in the target address book data; and calculating the weighted sum of the contact person communication information and the intimacy reference value to obtain the intimacy between the target user and the target contact person.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending a modification instruction to the block chain platform according to the address book updating information; and the modification instruction is used for triggering a block chain platform to modify the original information of the corresponding contact in the target address book data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: sending a new adding instruction to the block chain platform according to the address book updating information; and the newly added instruction is used for triggering a block chain platform to newly add corresponding contact information in the target address book data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data; searching matched address book data corresponding to the target version from a block chain platform according to the version number of the target version; sending a version recovery instruction to the client according to the matched address book data; and the version recovery instruction is used for controlling the client to replace target address book data in the application program with the matched address book data.
In one embodiment, the data operation information includes address book authorization information, where the address book authorization information is used to trigger the blockchain platform to acquire target address book data of the target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and an authorization certificate of the authorized contact; wherein the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data.
In one embodiment, the data operation information includes address book sharing information, wherein the address book sharing information includes a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared secret key; and if the shared secret key passes the verification, acquiring authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: if an updating instruction sent by the client is received; wherein, the updating instruction comprises updated information of the target user; sending an information updating instruction to a block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; and the associated address book data is address book data corresponding to each contact in the target address book data.
In one embodiment, the processor, when executing the computer program, further performs the steps of: constructing target address book data according to at least one of the contact number and the contact name of the target user; and storing the target address book data through a block chain platform.
In one embodiment, the processor, when executing the computer program, further performs the steps of: dividing the target address book data into a white list sub-address book and a black list sub-address book; and respectively storing the white list subaddress list and the black list subaddress list through a block chain platform.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: receiving an operation request sent by a client; wherein, the operation request comprises data operation information; the client logs in a target user; sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user; and receiving operation data returned after the corresponding operation is executed by the block chain platform.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring target address book data of the target user from a block chain platform; if the data operation information is sequencing change information; acquiring the intimacy between the target user and each contact in the target address book data, and sending a sorting change instruction to the block chain platform; the sorting change instruction is used for triggering a block chain platform to change the sorting of the target address book data; and the intimacy is determined according to the contact person communication information between the target user and each contact person.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring target address book data of the target user from a block chain platform; if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering a block chain platform to update the target address book data.
In one embodiment, the computer program when executed by the processor further performs the steps of: and acquiring at least one item of the call times and the call duration between the target user and each contact from a database as the call information of the contacts.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring an intimacy reference value of a target contact person; the target contact person is any one contact person in the target address book data; and calculating the weighted sum of the contact person communication information and the intimacy reference value to obtain the intimacy between the target user and the target contact person.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending a modification instruction to the block chain platform according to the address book updating information; and the modification instruction is used for triggering a block chain platform to modify the original information of the corresponding contact in the target address book data.
In one embodiment, the computer program when executed by the processor further performs the steps of: sending a new adding instruction to the block chain platform according to the address book updating information; and the newly added instruction is used for triggering a block chain platform to newly add corresponding contact information in the target address book data.
In one embodiment, the computer program when executed by the processor further performs the steps of: receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data; searching matched address book data corresponding to the target version from a block chain platform according to the version number of the target version; sending a version recovery instruction to the client according to the matched address book data; and the version recovery instruction is used for controlling the client to replace target address book data in the application program with the matched address book data.
In one embodiment, the data operation information includes address book authorization information, where the address book authorization information is used to trigger the blockchain platform to acquire target address book data of the target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and an authorization certificate of the authorized contact; wherein the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data.
In one embodiment, the data operation information includes address book sharing information, wherein the address book sharing information includes a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared secret key; and if the shared secret key passes the verification, acquiring authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data.
In one embodiment, the computer program when executed by the processor further performs the steps of: if an updating instruction sent by the client is received; wherein, the updating instruction comprises updated information of the target user; sending an information updating instruction to a block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; and the associated address book data is address book data corresponding to each contact in the target address book data.
In one embodiment, the computer program when executed by the processor further performs the steps of: constructing target address book data according to at least one of the contact number and the contact name of the target user; and storing the target address book data through a block chain platform.
In one embodiment, the computer program when executed by the processor further performs the steps of: dividing the target address book data into a white list sub-address book and a black list sub-address book; and respectively storing the white list subaddress list and the black list subaddress list through a block chain platform.
It will be understood by those skilled in the art that all or part of the processes of the methods of the above embodiments may be implemented by a computer program, which is stored in a computer readable storage medium and sold or used as a stand-alone product. More specific examples (a non-exhaustive list) of the computer-readable medium would include the following: an electrical connection (electronic device) having one or more wires, a portable computer diskette (magnetic device), a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber device, and a portable compact disc read-only memory (CDROM). Additionally, the computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via for instance optical scanning of the paper or other medium, then compiled, interpreted or otherwise processed in a suitable manner if necessary, and then stored in a computer memory.
It should be understood that portions of the present invention may be implemented in hardware, software, firmware, or a combination thereof. In the above embodiments, the various steps or methods may be implemented in software or firmware stored in memory and executed by a suitable instruction execution system. For example, if implemented in hardware, as in another embodiment, any one or combination of the following techniques, which are known in the art, may be used: a discrete logic circuit having a logic gate circuit for implementing a logic function on a data signal, an application specific integrated circuit having an appropriate combinational logic gate circuit, a Programmable Gate Array (PGA), a Field Programmable Gate Array (FPGA), or the like.
The terms "comprises" and "comprising," and any variations thereof, of embodiments of the present invention are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or (module) elements is not limited to only those steps or elements but may alternatively include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-described examples merely represent several embodiments of the present invention and should not be construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the inventive concept, which falls within the scope of the present invention. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (11)

1. A method for managing and controlling address book data is applied to a server side and comprises the following steps:
constructing target address book data according to the sensitive information of the target user; storing target address book data through a block chain platform; storing non-sensitive information of the target user in a database;
receiving an operation request sent by a client; wherein, the operation request comprises data operation information; the client logs in a target user;
sending an operation instruction to a block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user;
receiving operation data returned after the block chain platform executes corresponding operation;
the data operation information comprises address book authorization information, and the address book authorization information is used for triggering a block chain platform to acquire target address book data of a target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and the authorization certificate of the authorized contact; the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data;
the data operation information comprises address book sharing information, wherein the address book sharing information comprises a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared key; and if the shared secret key passes the verification, acquiring authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data to the client corresponding to the authorized contact.
2. The method of claim 1, wherein the step of sending an operation instruction to a blockchain platform according to the data operation information comprises:
acquiring target address book data of the target user from a block chain platform;
if the data operation information is sequencing change information; acquiring the intimacy between the target user and each contact in the target address book data, and sending a sorting change instruction to the block chain platform; the sorting change instruction is used for triggering a block chain platform to change the sorting of the target address book data according to the intimacy; the intimacy is determined according to the contact person communication information between the target user and each contact person;
and/or the presence of a gas in the gas,
if the data operation information is address book updating information; according to the address book updating information, an address book updating instruction is sent to the block chain platform; and the address book updating instruction is used for triggering a block chain platform to update the target address book data.
3. The method according to claim 2, wherein the step of obtaining contact call information between the target user and each contact in the target address book data comprises:
and acquiring at least one item of the call times and the call duration between the target user and each contact from a database as the call information of the contacts.
4. The method of claim 2, wherein the step of calculating the affinity of the target user to each contact according to the contact call information comprises:
acquiring an intimacy reference value of a target contact person; the target contact person is any one contact person in the target address book data;
and calculating the weighted sum of the contact person communication information and the intimacy reference value to obtain the intimacy between the target user and the target contact person.
5. The method of claim 2, wherein the step of sending a directory update command to the blockchain platform according to the directory update message comprises:
sending a modification instruction to the block chain platform according to the address book updating information; the modification instruction is used for triggering a block chain platform to modify original information of a corresponding contact in the target address book data;
and/or the presence of a gas in the gas,
sending a new adding instruction to the block chain platform according to the address book updating information; and the newly added instruction is used for triggering a block chain platform to newly add corresponding contact information in the target address book data.
6. The method of claim 2, wherein after the step of sending a contact update command to the blockchain platform according to the contact update information, the method further comprises:
receiving a version recovery request sent by a client through an application program; the version recovery request comprises a version number of a target version; the target version is one of a plurality of updated target address book data;
searching matched address book data corresponding to the target version from a block chain platform according to the version number of the target version;
sending a version recovery instruction to the client according to the matched address book data; and the version recovery instruction is used for controlling the client to replace target address book data in the application program with the matched address book data.
7. The method of any of claims 1 to 6, further comprising:
if an updating instruction sent by the client is received; wherein, the updating instruction comprises updated information of the target user;
sending an information updating instruction to a block chain platform according to the updated information; the information updating instruction is used for triggering the block chain platform to update the information of the target user in the associated address book data; and the associated address book data is address book data corresponding to each contact in the target address book data.
8. The utility model provides a management and control device of address book data which characterized in that is applied to the server side, includes:
a module that performs the steps of: constructing target address book data according to the sensitive information of the target user; storing target address book data through a block chain platform; storing non-sensitive information of the target user in a database;
the request receiving module is used for receiving an operation request sent by the client; wherein, the operation request comprises data operation information; the client logs in a target user;
the instruction sending module is used for sending an operation instruction to the block chain platform according to the data operation information; the operation instruction is used for triggering the block chain platform to execute corresponding operation on the address book data of the target user;
the result receiving module is used for receiving operation data returned after the corresponding operation is executed by the block chain platform;
the instruction sending module is further used for sending an authorization instruction to the blockchain platform if the data operation information is address book authorization information, wherein the authorization instruction is used for triggering the blockchain platform to acquire target address book data of a target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and the authorization certificate of the authorized contact; the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data;
a module that performs the steps of: the data operation information comprises address book sharing information, wherein the address book sharing information comprises a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared key; and if the shared secret key passes the verification, acquiring authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data to the client corresponding to the authorized contact.
9. A cloud address book system, comprising: the system comprises a client, a server and a block chain platform which are connected through a network; wherein, an application program is configured on the client; the client logs in a target user;
the client is used for sending an operation request to the server; wherein, the operation request comprises data operation information;
the server is used for constructing target address book data according to the sensitive information of the target user; storing target address book data through a block chain platform; storing non-sensitive information of the target user in a database; sending an operation instruction to a block chain platform according to the data operation information;
the block chain platform is used for executing corresponding operation on the address book data of the target user according to the operation instruction;
the server is also used for receiving operation data returned after the corresponding operation is executed by the block chain platform;
the data operation information comprises address book authorization information, and the address book authorization information is used for triggering a block chain platform to acquire target address book data of a target user; the address book authorization request comprises an authorization key; verifying the authorization key; if the authorization key passes the verification, signing the target address book data and the authorization certificate of the authorized contact; the authorization certificate is used for indicating that the authorized contact has the authority of sharing the target address book data;
the data operation information comprises address book sharing information, wherein the address book sharing information comprises a sharing key; the address book sharing information is used for triggering the block chain platform to verify the shared key; and if the shared secret key passes the verification, acquiring authorized address book data signed with the authorization certificate by the target user, and returning the authorized address book data to the client corresponding to the authorized contact.
10. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 7 when executing the computer program.
11. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
CN201910463158.5A 2019-05-30 2019-05-30 Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium Active CN110266872B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910463158.5A CN110266872B (en) 2019-05-30 2019-05-30 Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910463158.5A CN110266872B (en) 2019-05-30 2019-05-30 Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN110266872A CN110266872A (en) 2019-09-20
CN110266872B true CN110266872B (en) 2021-05-11

Family

ID=67916011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910463158.5A Active CN110266872B (en) 2019-05-30 2019-05-30 Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN110266872B (en)

Families Citing this family (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
AU2019302938A1 (en) * 2019-10-11 2021-04-29 Alipay (Hangzhou) Information Technology Co., Ltd. Decentralized automatic phone fraud risk management
CN111708791B (en) * 2020-06-04 2022-08-05 江苏荣泽信息科技股份有限公司 Automatic data updating system based on block chain
CN112486629B (en) * 2020-11-27 2024-01-26 成都新希望金融信息有限公司 Micro-service state detection method, micro-service state detection device, electronic equipment and storage medium
CN112732730B (en) * 2020-12-29 2023-06-16 中国联合网络通信集团有限公司 Block chain-based card data updating method, system and provider platform
CN112911013B (en) * 2021-02-20 2023-05-16 百度在线网络技术(北京)有限公司 Cloud application processing method and device, computer equipment and storage medium
CN113905134B (en) * 2021-10-21 2023-06-02 中国联合网络通信集团有限公司 Address book blacklist management method, system, equipment and medium based on block chain

Family Cites Families (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103905622B (en) * 2012-12-27 2016-04-27 上海鼎为电子科技(集团)有限公司 The differentiating method of contact person, device and mobile terminal in mobile terminal
CN104202457B (en) * 2014-08-20 2017-03-29 上海华豚科技有限公司 The intelligent sorting method of cell phone address book
CN105208177B (en) * 2015-09-14 2019-02-12 小米科技有限责任公司 Address book updating method and device
CN106131115B (en) * 2016-06-13 2019-02-12 武汉天量数据技术有限公司 Address book data based on cloud address list is issued automatically and more new system
CN106506511B (en) * 2016-11-17 2019-08-23 京东方科技集团股份有限公司 A kind of address list information processing method, device
CN106550085A (en) * 2016-12-09 2017-03-29 北京小米移动软件有限公司 Contact person's display methods and device
WO2018120121A1 (en) * 2016-12-30 2018-07-05 深圳前海达闼云端智能科技有限公司 Block chain permission control method, device, and node apparatus
CN106686008B (en) * 2017-03-03 2019-01-11 腾讯科技(深圳)有限公司 Information storage means and device
CN107395358A (en) * 2017-06-30 2017-11-24 上海策赢网络科技有限公司 Information request and offer method and apparatus, storage medium and equipment
US10862671B2 (en) * 2017-08-02 2020-12-08 Visa International Service Association Global ownership registry
EP3692489A4 (en) * 2017-10-04 2021-10-20 Jintai Ding Quantumproof blockchain
CN108650281A (en) * 2018-02-28 2018-10-12 努比亚技术有限公司 A kind of data managing method, device and computer readable storage medium
CN109194633B (en) * 2018-08-21 2021-08-10 山东智慧云链网络科技有限公司 Address book backup method and system
CN109067959B (en) * 2018-09-14 2021-05-11 西安蜂语信息科技有限公司 Address book management method and device
CN109617952B (en) * 2018-11-28 2022-06-24 立旃(上海)科技有限公司 Block chain-based user relationship establishing method and device

Also Published As

Publication number Publication date
CN110266872A (en) 2019-09-20

Similar Documents

Publication Publication Date Title
CN110266872B (en) Address book data management and control method and device, cloud address book system, computer equipment and computer readable storage medium
KR102002509B1 (en) Privite blockchain system including notarizing center and notarial method thereof
US20130138619A1 (en) Method and system for automated document registration with cloud computing
CN110430288B (en) Node access method, node access device, computer equipment and storage medium
US20140081932A1 (en) Method and system for secure automated document registration from social media networks
EP3598333B1 (en) Electronic device update management
CN110471982B (en) Data processing method and device based on block chain
CN111291394B (en) False information management method, false information management device and storage medium
CN113271311A (en) Digital identity management method and system in cross-link network
CN111090386A (en) Cloud storage method, device and system and computer equipment
CN111488372A (en) Data processing method, device and storage medium
CN111723159A (en) Data verification method and device based on block chain
CN111984735A (en) Data archiving method and device, electronic equipment and storage medium
Tapas et al. Blockchain-based publicly verifiable cloud storage
CN113162971B (en) Block link point management method, device, computer and readable storage medium
CN114239072A (en) Block chain node management method and block chain network
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN111506661B (en) Content access management method, device and storage medium
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
CN110347750B (en) Block chain-based data processing method and device
CN115514470B (en) Storage method and system for community correction data security
CN112037055A (en) Transaction processing method and device, electronic equipment and readable storage medium
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN112988852B (en) Block chain-based data management method, device and medium
CN111769956B (en) Service processing method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231010

Address after: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Patentee after: Tianyi Digital Life Technology Co.,Ltd.

Address before: 1 / F and 2 / F, East Garden, Huatian International Plaza, 211 Longkou Middle Road, Tianhe District, Guangzhou, Guangdong 510630

Patentee before: Century Dragon Information Network Co.,Ltd.