CN111131218A - Blacklist management method, device, computer system and readable storage medium - Google Patents

Blacklist management method, device, computer system and readable storage medium Download PDF

Info

Publication number
CN111131218A
CN111131218A CN201911315253.7A CN201911315253A CN111131218A CN 111131218 A CN111131218 A CN 111131218A CN 201911315253 A CN201911315253 A CN 201911315253A CN 111131218 A CN111131218 A CN 111131218A
Authority
CN
China
Prior art keywords
voting
node
information
proposal
blacklist
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911315253.7A
Other languages
Chinese (zh)
Inventor
胡培铭
迟哲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Asset Management Co Ltd
Original Assignee
Ping An Asset Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Asset Management Co Ltd filed Critical Ping An Asset Management Co Ltd
Priority to CN201911315253.7A priority Critical patent/CN111131218A/en
Publication of CN111131218A publication Critical patent/CN111131218A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Algebra (AREA)
  • Pure & Applied Mathematics (AREA)
  • Mathematical Physics (AREA)
  • Mathematical Optimization (AREA)
  • Mathematical Analysis (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a blacklist management method, a blacklist management device, a computer system and a readable storage medium, wherein the blacklist management method comprises the following steps: receiving proposal information, verifying the first node and generating a verification result, and writing the proposal information into a grey list of the block chain according to the verification result; receiving voting information, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into a grey list; calculating to obtain a voting result according to the normal voting information and the weight of the second node generating the normal voting information; if the voting result is yes, the proposal information and the voting result are written into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result are kept in a grey list; and increasing or decreasing the weight of the first node according to the proposal information written into the blacklist or retained in the grey list and the voting result thereof. The invention ensures the closure and privacy of proposal information and voting information and the authenticity of the proposal information written into the blacklist.

Description

Blacklist management method, device, computer system and readable storage medium
Technical Field
The present invention relates to the field of communications technologies, and in particular, to a blacklist management method, an apparatus, a computer system, and a readable storage medium.
Background
The blacklist is a tool for storing information of a distrusted entity or personnel, and the current blacklist system mainly manages and stores the information through a centralized system, namely, a unit with public trust of furniture or an authority serves as a medium to issue and manage blacklists of enterprises and individuals. The entity and the organization must have absolute public credibility and authority, so that the blacklist issued by the entity and the organization is unconditionally trustable and accurate and timely. Apart from endorsement by national credit, it is very difficult to establish such a mechanism and the concentration of rights often leads to spoilage in its interior. This results in decentralized systems in return; however, once the centralized system in this way is broken by the external device, the external device can easily tamper with the blacklist, which eventually leads to the problem that the authenticity of the blacklist is invalid.
Based on the above problems, a block chain blacklist appears on the market currently, and the aim of the method is to solve the problem that the blacklist is arbitrarily tampered by external equipment, however, whether a network node in a block chain intentionally provides a false message cannot be identified by the method, so that the authenticity of the information in the blacklist cannot be guaranteed.
Disclosure of Invention
The invention aims to provide a blacklist management method, a blacklist management device, a computer system and a readable storage medium, which are used for solving the problem that the authenticity of information in a blacklist cannot be guaranteed because a network node in a block chain cannot be identified whether to intentionally provide false information or not in the prior art.
In order to achieve the above object, the present invention provides a blacklist management method, based on a block chain, where the block chain has at least one network node, including the following steps:
receiving proposal information generated by a certain network node in the block chain, setting the network node generating the proposal information as a first node, and setting other network nodes except the first node in the block chain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
receiving voting information generated by whether the second node votes by adding the proposal information into a blacklist or not, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list;
calculating the normal voting information in the gray list according to the normal voting information and the weight of the second node generating the normal voting information to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list; or
And according to the proposal information written into the blacklist and the voting result thereof, improving the weight of the first node.
In the foregoing solution, the verifying the first node and generating the verification result includes:
performing encryption operation on the network private key by adopting an elliptic encryption algorithm through the first node to obtain a network public key, and performing hash operation on the proposal information by adopting a hash algorithm to obtain a proposal abstract; encrypting the proposal information by the first node by adopting a network private key to obtain a proposal encrypted digest;
sending the network public key, proposal information and proposal encrypted digest to the second node through the first node;
decrypting the proposal encrypted digest by the second node by adopting the network public key to obtain a first digest, and performing hash operation on the proposal information by adopting a hash algorithm by the second node to obtain a second digest;
judging whether the first abstract and the second abstract are consistent through the second node, and if so, generating a verification result with the content being authorized; and if the contents are not consistent, generating a verification result that the contents are not authorized.
In the foregoing solution, the writing the proposal information into the grey list of the block chain according to the verification result includes:
extracting the contents of the verification results generated by all the second nodes;
if all the contents of the verification results are authorized, writing the proposal information into a grey list of the block chain; and if the content of at least one verification result is not authorized, deleting the proposal information.
In the foregoing solution, the verifying the second node and setting the voting information of the second node that is successfully verified as the normal voting information includes:
encrypting a network private key by the second node by adopting an elliptic encryption algorithm to obtain a network public key, performing hash operation on the voting information by adopting a hash algorithm to obtain a voting abstract, and encrypting the voting abstract by adopting the network private key to obtain a voting encryption abstract;
verifying a second node generating the voting information in sequence according to the voting information, the network public key and the voting encryption abstract;
and taking the voting information generated by the second node which is successfully verified as normal voting information, and deleting the voting information generated by the second node which is unsuccessfully verified.
In the above scheme, the calculating the normal voting information in the gray list to obtain the voting result includes:
when all the second nodes finish verification and the voting information generated by all the second nodes is set as normal voting information and written into a grey list or deleted, triggering an intelligent contract of the block chain;
and carrying out weighted summation calculation on the normal voting information in the gray list through the intelligent contract to obtain a voting result.
In the above scheme, the performing weighted summation calculation on the normal voting information in the gray list to obtain a voting result includes:
extracting the voting value, the node number and the weight of the network node corresponding to the node number of the normal voting information; the voting value is used for expressing the opinion of the second node on the proposal information, the node number is the unique code of the second node for generating the voting information, and the weight is used for expressing the importance degree of the network node;
multiplying the voting value by a weight to obtain a weighted voting value;
and adding all the weighted voting values in the gray list to obtain a voting result, wherein the contents of the voting result are positive proposals or negative proposals.
In the above scheme, a management node is arranged in the blockchain, and the management node can change the node weight of any network node in the blockchain by running an intelligent contract of the blockchain.
In order to achieve the above object, the present invention further provides a blacklist management apparatus, including:
the proposal verification module is used for receiving proposal information generated by a certain network node in the block chain, setting the network node generating the proposal information as a first node, and setting other network nodes except the first node in the block chain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
the voting verification module is used for receiving voting information generated by the second node whether to add the proposal information into a blacklist for voting, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list;
the voting management module is used for calculating the normal voting information in the gray list according to the normal voting information and the weight of the second node generating the normal voting information so as to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
the weight adjusting module is used for reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list; or according to the proposal information written into the blacklist and the voting result thereof, the weight of the first node is increased.
The present invention also provides a computer system including a plurality of computer devices, each computer device including a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processors of the plurality of computer devices collectively implement the steps of the above-described blacklist management method when executing the computer program.
In order to achieve the above object, the present invention further provides a computer-readable storage medium, which includes a plurality of storage media, each storage medium having a computer program stored thereon, wherein the computer programs stored in the storage media, when executed by a processor, collectively implement the steps of the above-mentioned blacklist management method.
According to the blacklist management method, the blacklist management device, the computer system and the readable storage medium, the proposal information is received, the first node is verified, the verification result is generated, and the proposal information is written into the grey list of the block chain according to the verification result; the method and the device ensure that the proposal information is sent to the first node by a user with operation authority, ensure the validity of the proposal information, and simultaneously write the proposal information into the grey list of the block chain, thereby avoiding the situation that equipment outside the network enters the block chain network to propose the proposal information and ensuring the closure and the privacy of the proposal information.
Voting is carried out on the proposal information to generate voting information, the second node is verified, the voting information of the second node which is verified successfully is set as normal voting information, and the normal voting information is written into the grey list; the voting information is sent to the second node by the user with the operation authority, the validity of the voting information is guaranteed, meanwhile, the normal voting information is written into the grey list, the condition that equipment outside the network enters the block chain network to provide proposal information is avoided, and the closure and the privacy of the voting information are guaranteed.
Calculating normal voting information in the grey list to obtain voting results according to the normal voting information and the weight of a second node generating the normal voting information, and keeping the proposal information and the voting results in the grey list or writing the proposal information and the voting results into a black list of the block chain; the method comprises the steps that each second node participates in voting on proposal information provided by the first node, whether the proposal information is correct or not is judged according to voting results, if a plurality of second nodes approve the proposal information, the proposal information is considered to be true, and if not, the proposal information is not true; the authenticity of the proposal information written to the black list is thus guaranteed in this way.
Reducing the weight of the first node according to the proposal information and the voting result thereof retained in the grey list, or increasing the weight of the first node according to the proposal information and the voting result thereof written in the black list; the first node is rewarded and punished, so that after the block chain is used for a long time, a truthful network node with higher weight in the block chain can be formed, a using environment with lower weight in the block chain is formed for a dishonest network node, and a long-term premise is provided for the authenticity and effectiveness of information of the block chain.
Drawings
FIG. 1 is a flowchart illustrating a blacklist management method according to a first embodiment of the present invention;
FIG. 2 is a diagram illustrating an operating environment of an embodiment of a blacklist management method according to the present invention;
FIG. 3 is a flowchart illustrating the method for managing a blacklist according to an embodiment of the present invention, wherein the verification result is generated in S1;
fig. 4 is a flowchart illustrating writing of the proposal information into the gray list of the block chain in S1 according to an embodiment of the method for managing black lists of the present invention;
fig. 5 is a flowchart illustrating the first step of verifying the second node and setting the voting information of the second node that is successfully verified as the normal voting information in S2 according to the blacklist management method;
fig. 6 is a flowchart illustrating a method for managing a blacklist according to an embodiment of the present invention, in which the normal voting information is calculated in S3 to obtain a voting result;
fig. 7 is a flowchart of reducing the weight of the first node in S4 according to an embodiment of the blacklist management method;
fig. 8 is a flowchart of increasing the weight of the first node in S4 according to an embodiment of the blacklist management method;
FIG. 9 is a block diagram of a second exemplary embodiment of a blacklist management device;
fig. 10 is a schematic diagram of a hardware structure in the third embodiment of the computer apparatus of the present invention.
Reference numerals:
1. blacklist management device 2, server 3, network 4, user terminal
5. Computer device 11, proposal verification module 12 and voting verification module
13. Voting management module 14, weight adjustment module 51, memory 52, processor
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention provides a blacklist management method, a device, a computer system and a readable storage medium, which are suitable for the technical field of communication and are used for providing a blacklist management method based on a proposal verification module, a voting management module and a weight adjustment module. According to the method, the proposal information is received, the first node is verified and a verification result is generated, and the proposal information is written into a grey list of a block chain according to the verification result; voting is carried out on the proposal information to generate voting information, the second node is verified, the voting information of the second node which is verified successfully is set as normal voting information, and the normal voting information is written into the grey list; calculating normal voting information in the grey list to obtain voting results according to the normal voting information and the weight of a second node generating the normal voting information, and keeping the proposal information and the voting results in the grey list or writing the proposal information and the voting results into a black list of the block chain; and reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list, or increasing the weight of the first node according to the proposal information and the voting result thereof which are written into the black list.
Example one
Referring to fig. 1, a blacklist management method of the embodiment is based on a block chain having at least one network node, and includes the following steps:
s1: receiving proposal information generated by a certain network node in the block chain, setting the network node generating the proposal information as a first node, and setting other network nodes except the first node in the block chain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
s2: receiving voting information generated by whether the second node votes by adding the proposal information into a blacklist or not, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list;
s3: calculating the normal voting information in the gray list according to the normal voting information and the weight of the second node generating the normal voting information to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
s4: reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list; or
And according to the proposal information written into the blacklist and the voting result thereof, improving the weight of the first node.
Referring to fig. 2, the blacklist management method of this embodiment operates in a server 2, and meanwhile, the block chain and its network nodes operate in the server 2, the server 2 is connected to a plurality of clients 4 through a network 3, the plurality of clients 4 respectively correspond to the plurality of network nodes in the block chain one to one, the client 4 sends information to the network nodes in the block chain in the server 2 through the network 3, and obtains information from the block chain in the server 2 through the network 3;
a user terminal 4 sends proposal information to a network node corresponding to the user terminal 4 in a block chain in a server 2, so that the network node generates the proposal information, the network node generating the proposal information is set as a first node, and other network nodes except the first node in the block chain are set as second nodes; the server 2 respectively verifies the first nodes through the first nodes and generates verification results, and writes the proposal information into a grey list of the block chain according to the verification results.
The server 2 votes the proposal information through the second nodes and generates voting information, wherein the voting information is compiled by the user terminals 4 corresponding to the second nodes; the server 2 verifies each second node through the block chain to identify whether the vote generated by the second node is compiled by an authorized operator through the user terminal 4, and if the second node is verified successfully, the generated vote information is set as normal vote information; the server 2 writes the normal voting information into the gray list of the block chain.
The server 2 generates the weight of a second node of the normal voting information according to the normal voting information, wherein the normal voting information comprises a voting value, a node number and the weight of a network node corresponding to the node number; the voting value is used for expressing the opinion of the second node on the proposal information, the node number is the unique code of the second node for generating the voting information, and the weight is used for expressing the importance degree of the network node; for example, if the opinion of the normal voting information is positive, the voting value is "+ 1", and if the opinion of the normal voting information is negative, the voting value is "-1"; calculating normal voting information in the gray list according to the voting values and the weights to obtain voting results; the server 2 extracts the contents of the voting results; if the content is a proposal approved, judging that the voting result is yes, and writing the proposal information and the voting result into a blacklist of the block chain; if the content is against proposal, judging that the voting result is negative, and keeping the proposal information and the voting result thereof in the grey list.
And keeping the proposal information and the voting result thereof in the grey list or writing the proposal information and the voting result thereof in a black list of the block chain. Meanwhile, each ue 4 may also write a voting reason into the voting information to explain its own reason to the ues 4 corresponding to other network nodes, which is used as a reference for other ues 4.
If the proposal information is kept in the grey list, reducing the weight of the first node generating the proposal information; if the proposal information is written into the blacklist, the weight of the first node generating the proposal information is increased.
The server 2 may provide services through one or more networks 3, which networks 3 may include various network devices, such as routers, switches, multiplexers, hubs, modems, bridges, repeaters, firewalls, proxy devices, and/or the like. The network 3 may include physical links, such as coaxial cable links, twisted pair cable links, fiber optic links, combinations thereof, and/or the like. The network 3 may include wireless links such as cellular links, satellite links, Wi-Fi links, and/or the like. The user end 4 may include various user end devices, such as a cell phone, a desktop computer, a notebook computer, and/or the like.
The server 2 may be composed of a single or a plurality of computer devices (e.g., servers). The single or multiple computing devices may include virtualized compute instances. The virtualized computing instance may include a virtual machine, such as an emulation of a computer system, an operating system, a server, and so forth. The computing device may load the virtual machine based on a virtual image and/or other data that defines the particular software (e.g., operating system, dedicated application, server) used for emulation. As the demand for different types of processing services changes, different virtual machines may be loaded and/or terminated on one or more computing devices. A hypervisor may be implemented to manage the use of different virtual machines on the same computing device.
In a preferred embodiment, referring to fig. 3, the verifying the first node and generating the verification result in S1 includes:
s101: performing encryption operation on the network private key by adopting an elliptic encryption algorithm through the first node to obtain a network public key, and performing hash operation on the proposal information by adopting a hash algorithm to obtain a proposal abstract; and encrypting the proposal information by adopting a network private key through the first node to obtain a proposal encrypted digest.
In this step, the network private key is a password kept by a user controlling the network node; the proposal information comprises suspect information which is input to a network node by a user through a user side and has a suspicion of loss, wherein the suspect information comprises a suspicion name, a suspicion item and a suspicion reason; the suspect name is an enterprise name of a suspect or a suspect name, the suspect is an event made by the suspect and is suspected of being suspect, and the suspect reason is used as an explanation of the suspect name and the suspect by a user who proposes proposal information and is used for persuading other network nodes to agree with the proposal information proposed by the user. It should be noted that the network node is a node operating in a blockchain network, so as to be able to perform related operations under the blockchain mechanism. The number of the network nodes in this step is often multiple, and the specific number should be set according to the actual situation, which is not specifically limited herein.
S102: and sending the network public key, the proposal information and the proposal encrypted digest to the second node through the first node.
S103: and decrypting the proposal encrypted digest by the second node by adopting the network public key to obtain a first digest, and performing hash operation on the proposal information by adopting a hash algorithm by adopting the second node to obtain a second digest.
It should be noted that the elliptic encryption algorithm is a public key encryption system, and the mathematical basis thereof is an asymmetric secret key realized by using the difficulty in calculating an elliptic discrete logarithm on an Abel addition group formed by rational points on an elliptic curve. The hash algorithm is an algorithm based on a hash function, the hash function is a mathematical function, messages with any length can be compressed into binary strings with fixed length within limited reasonable time, and the output value of the hash function is called as a hash value and also called as a hash value, so the hash algorithm plays an important role in modern cryptography, is commonly used for realizing data integrity and entity authentication and simultaneously forms the safety guarantee of various cryptosystems and protocols; since the technical problem to be solved by the present application is how to determine whether the first node is authorized through the elliptic encryption algorithm and the hash algorithm, the operation principles of the non-elliptic encryption algorithm and the hash algorithm are not described herein again.
S104: judging whether the first abstract and the second abstract are consistent through the second node, and if so, generating a verification result with the content being authorized; and if the contents are not consistent, generating a verification result that the contents are not authorized.
In this step, if the first node is authorized, that is, the creator of the proposal information of the first node has the network private key, the network public key, the proposal information and the proposal encrypted digest generated by the first node based on the network private key can obtain the consistent first digest and the consistent second digest; if the maker of the proposal information does not have the correct network private key (for example, a hacker logs in a network node and makes the proposal information by an illegal means), the first node either cannot generate the network public key and/or the proposal information and/or the proposal encryption digest, or generates the wrong network public key and/or the proposal information and/or the proposal encryption digest, so that the second node cannot obtain the consistent first digest and the second digest, and at the moment, the second node judges that the first node is not authorized, thereby ensuring the authenticity and the safety of the proposal information.
In a preferred embodiment, referring to fig. 4, the writing of the proposal information into the gray list of the blockchain according to the verification result in S1 includes:
s111: extracting the contents of the verification results generated by all the second nodes;
s112: if all the contents of the verification results are authorized, writing the proposal information into a grey list of the block chain;
and if the content of at least one verification result is not authorized, deleting the proposal information.
In this step, the gray list is created in a block of the block chain, and is used for writing proposal information that the user considers that the suspicion is suspect.
Exemplarily, if the contents of the check results generated by all the second nodes are authorized, writing the proposal information into a grey list; if the content of the check result generated by at least one second node is not right, deleting the proposal information; through the mode, the situation that illegal proposal information passes through and is input into the grey list is avoided to the greatest extent by an illegal proposal person controlling the plurality of second nodes, and the validity of the information in the block chain and the safety of the network nodes are ensured.
In an exemplary embodiment, the voting information is a voting judgment made by the user of the second node based on the suspicion name, suspicion item and suspicion reason of the proposal information, the voting judgment is generated in the form of a voting result, and the reason of the judgment is also generated in the form of a voting reason, so that the voting information includes the voting result, the voting reason, and a node number used for expressing the identity information of the network node corresponding to the voting result and the voting reason; the voting reason is used as the explanation of the voting result by the user who proposes the voting information, and is used for persuading the voting result proposed by the user to be agreed by other network nodes.
In a preferred embodiment, referring to fig. 5, the verifying the second node and setting the voting information of the second node that is successfully verified as the normal voting information in S2 includes:
s201: and encrypting a network private key by the second node by adopting an elliptic encryption algorithm to obtain a network public key, performing hash operation on the voting information by adopting a hash algorithm to obtain a voting abstract, and encrypting the voting abstract by adopting the network private key to obtain a voting encryption abstract.
Illustratively, the network private key is a password reserved by a network node controller, the network public key is obtained by each second node by respectively operating the respective network private key through an elliptic encryption algorithm, the voting digest is obtained by each second node by respectively performing a hash operation on voting information through a hash algorithm, and the voting encryption digest is obtained by each second node by respectively encrypting the generated voting digest through the respective network private key.
S202: and verifying the second node generating the voting information in sequence according to the voting information, the network public key and the voting encryption abstract.
Illustratively, a second node generating voting information in a block chain is identified, a network public key, the voting information and a voting encryption summary in the second node are extracted and output to other network nodes in the block chain;
the other network nodes decrypt the voting encrypted abstracts through the network public keys respectively to obtain third abstracts, and then carry out hash operation on the voting information through a hash algorithm respectively to obtain fourth abstracts;
the other network nodes respectively judge whether the third abstract and the fourth abstract obtained by the other network nodes are consistent; if the third abstract is consistent with the fourth abstract, judging that the second node generating the voting information is verified successfully; and if the third abstract is inconsistent with the fourth abstract, judging the second node generating the voting information as a verification failure.
S203: and taking the voting information generated by the second node which is successfully verified as normal voting information, and deleting the voting information generated by the second node which is unsuccessfully verified.
If all other network nodes judge that the second node generating the voting information is successfully verified, setting the voting information generated by the second node as normal voting information; and if at least one of the other network nodes judges that the second node generating the voting information is failed to verify, deleting the voting information of the second node.
In a preferred embodiment, referring to fig. 6, the step of calculating the normal voting information in the gray list to obtain the voting result in S3 includes:
s301: and triggering the intelligent contract of the block chain when all the second nodes finish verification and the voting information generated by all the second nodes is set as normal voting information and is written into a grey list or is deleted.
S302: and carrying out weighted summation calculation on the normal voting information in the gray list through the intelligent contract to obtain a voting result.
It should be noted that the intelligent contract is a program which is event-driven, has a state, obtains multiple approval, runs on a blockchain, and can automatically process assets according to preset conditions, is a contract which uses a computer language to record terms instead of a legal language, and is a digitized version of a traditional contract; the intelligent contracts are stored in the contract layer of the block chain, are computer programs running on a block chain database and can be executed by themselves when the conditions written in the source codes of the intelligent contracts are met, so that the intelligent contracts can be trusted by users once the intelligent contracts are written, contract terms cannot be changed, and the contracts are not modifiable.
Further, the performing a weighted summation calculation on the normal voting information in the gray list to obtain a voting result includes:
s302-1: extracting the voting value, the node number and the weight of the network node corresponding to the node number of the normal voting information; the voting value is used for expressing the opinion of the second node on the proposal information, the node number is the unique code of the second node for generating the voting information, and the weight is used for expressing the importance degree of the network node; for example, if the opinion of the normal voting information is positive, the voting value is "+ 1", and if the opinion of the normal voting information is negative, the voting value is "-1".
S302-2: multiplying the voting value by a weight to obtain a weighted voting value; for example, the weight is 2, and the vote value is "+ 1", then the weight vote value of the normal vote information is "+ 2".
S302-3: and adding all the weighted voting values in the gray list to obtain a voting result, wherein the contents of the voting result are positive proposals or negative proposals.
For example, the weighted voting values in the gray list are summed to obtain a total voting value, if the total voting value is regular, a total voting result with "against proposal" is generated, and if the total voting value is negative or zero, a total voting result with "against proposal" is generated.
In an exemplary embodiment, the keeping the proposal information and the voting result thereof in the gray list or writing the proposal information and the voting result thereof in the black list of the block chain includes:
if the content of the voting result is a proposal approved, the proposal information and the voting result thereof are kept in the grey list;
and if the content of the voting result is against proposal, writing the proposal information and the voting result thereof into a blacklist of the block chain.
The proposal information and the voting result thereof are written into the blacklist or retained in the grey list, so that the user can judge whether the proposal information is correct or not according to the voting result, and a precondition basis is provided for the user according to the self judgment and the information range.
In a preferred embodiment, referring to fig. 7, the step of reducing the weight of the first node according to the proposal information retained in the gray list and the voting result thereof in S4 includes:
s401: triggering an intelligent contract of the block chain when the proposal information and the voting result thereof are judged to be reserved in a grey list;
s402: judging whether the voting result is lower than a preset down-regulation threshold value or not through the intelligent contract; if the weight of the first node is lower than the down-regulation threshold value, reducing the weight of the first node; if not, maintaining the weight of the first node.
The weights are set to represent the credit degrees in each network node and each block chain, and the voting information of a unit with poor credit easily hinders the correct proposal information from being written into the blacklist or helps the wrong proposal information to be written into the blacklist, so that the importance degree of the voting information is reduced by adjusting the weights downwards, the correct proposal information is facilitated to be written into the blacklist, the wrong proposal information is prevented from being written into the blacklist, and the accuracy of the blacklist information is improved; moreover, since the controller of the first node may propose the controversial proposal information due to misunderstanding or suspicion, and the controller is not subjective and intentional, the weight of the network node proposing the controversial proposal information is maintained by setting a down-regulation threshold, so that certain proposal fault tolerance is provided for the blacklist management method, and the universality of proposal of the network node is promoted.
In a preferred embodiment, referring to fig. 8, the increasing the weight of the first node in S4 or according to the proposal information written in the black list and the voting result thereof includes:
s411: triggering an intelligent contract of the block chain when the proposal information and the voting result thereof are written into a blacklist;
s412: judging whether the voting result is higher than a preset voting threshold value or not through the intelligent contract; if the weight of the first node is higher than the up-regulation threshold value, the weight of the first node is increased; if not, maintaining the weight of the first node.
The weights are set to represent the credit degrees in each network node and each block chain, and the voting information of a unit with better credit easily helps to write correct proposal information into a blacklist and hinders wrong information from being written into the blacklist, so that the importance degree of the voting information is reduced by adjusting the weights up, the correct proposal information is facilitated to be written into the blacklist, the wrong proposal information is hindered to be written into the blacklist, and the accuracy of the blacklist information is improved; in addition, since the controller of the first node may propose disputed proposal information due to misunderstanding or suspicion, and the value of the proposal information is greatly reduced due to disputeness, the controller is prevented from increasing the weight of the proposal information due to disputed proposal information by setting the up-regulation threshold, which is beneficial to improving the information accuracy of the blacklist in the blacklist management method.
It should be noted that, recording data in a blockchain by using a blockchain intelligent contract is a technical means known by those skilled in the art, and the key point of the method is to vote on proposal information in a gray list by using a network node to write the proposal information into a black list or a history, and control the node weight of the network node according to the black list and the history, and how to record the proposal information and the voting information in the blockchain is not needed, so details of related contents are not described here.
Optionally, the intelligent contract is triggered to output the bitcoin integral to the network node outputting the proposal information written in the blacklist.
In this step, the intelligent contract may further include a point policy for adjusting the network node account;
the writer of the intelligent contract can create the output rule of the bitcoin point at the beginning of writing, for example, a proposal information written into a black list is exchanged for a bitcoin point.
The network node can create private data, wherein the private data can be stored in a user side corresponding to the network node;
the network node can trade with other network nodes through the bitcoin transaction technology through the bitcoin points, namely private data of other network nodes are exchanged through the bitcoin points.
The method has strong confidentiality, and encourages each network node to be capable of actively proposing proposal information through the bitcoin integration, so that the information in the blacklist of the block chain is continuously perfected.
It should be noted that the bit currency transaction technology is a common technology based on a block chain, and therefore, performing information transaction through bit currency integration is also a technical means known to those skilled in the art, and the key point of the method is to provide bit currency integration to a network node that provides proposal information written in a black list, so that the network node can perform information transaction with other network nodes through bit currency integration, and how to perform transaction in the block chain through bit currency integration is not needed, and therefore, details of relevant contents are not repeated here.
In a preferred embodiment, a management node is arranged in the blockchain, and the management node can change the node weight of any network node in the blockchain by running an intelligent contract of the blockchain.
In this step, because the intelligent contract cannot be changed, once a plurality of network nodes are combined to cause a malicious rumor, the proposed information is easily written into the blacklist, or even if the information is not written into the blacklist, the objected ratio may be difficult to be smaller than the voting threshold, so that the rumor is easy to be successful and is difficult to be punished; therefore, by setting the management node, when the manager finds that the situation occurs, the node weights of the plurality of network nodes are reduced, so that not only the proposal information of the rumors cannot be successfully written into the blacklist, but also the rumors are punished, and the proposal information is difficult to pass.
Example two
Referring to fig. 9, a blacklist management device 1 of the present embodiment includes:
a proposal verification module 11, configured to receive proposal information generated by a network node in the blockchain, set the network node generating the proposal information as a first node, and set other network nodes except the first node in the blockchain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
a voting verification module 12, configured to receive voting information generated by the second node whether to add the proposal information to a blacklist for voting, verify the second node, set voting information of the second node that is successfully verified as normal voting information, and write the normal voting information into the grey list;
the voting management module 13 is configured to calculate normal voting information in the gray list according to the normal voting information and the weight of the second node that generates the normal voting information, so as to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
a weight adjusting module 14, configured to reduce the weight of the first node according to the proposal information retained in the grey list and the voting result thereof; or according to the proposal information written into the blacklist and the voting result thereof, the weight of the first node is increased.
The technical scheme is based on a safety mechanism technology in the field of block chains, the first node is verified, a verification result is generated, and the proposal information is written into a grey list of the block chain according to the verification result; voting the proposal information through the second node to generate voting information, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list; therefore, the closure and the privacy of proposal information and voting information are ensured by an elliptic curve encryption algorithm in block chain encryption.
Example three:
in order to achieve the above object, the present invention further provides a computer system, where the computer system includes a plurality of computer devices 5, and components of the blacklist management apparatus 1 in the second embodiment may be distributed in different computer devices, and the computer devices may be smartphones, tablet computers, notebook computers, desktop computers, rack servers, blade servers, tower servers, or rack servers (including independent servers, or a server cluster formed by a plurality of servers) that execute programs, and the like. The computer device of the embodiment at least includes but is not limited to: a memory 51, a processor 52, which may be communicatively coupled to each other via a system bus, as shown in FIG. 10. It should be noted that fig. 10 only shows a computer device with components, but it should be understood that not all of the shown components are required to be implemented, and more or fewer components may be implemented instead.
In this embodiment, the memory 51 (i.e., a readable storage medium) includes a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the memory 51 may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the memory 51 may be an external storage device of a computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, provided on the computer device. Of course, the memory 51 may also include both internal and external storage devices of the computer device. In this embodiment, the memory 51 is generally used for storing an operating system and various application software installed on the computer device, such as program codes of the blacklist management apparatus of the first embodiment. Further, the memory 51 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 52 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 52 is typically used to control the overall operation of the computer device. In this embodiment, the processor 52 is configured to run the program code stored in the memory 51 or process data, for example, run a blacklist management apparatus, so as to implement the blacklist management method of the first embodiment.
Example four:
to achieve the above objects, the present invention also provides a computer-readable storage system including a plurality of storage media such as a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, a server, an App application store, etc., on which a computer program is stored, which when executed by a processor 52, implements corresponding functions. The computer readable storage medium of this embodiment is used for storing a blacklist management apparatus, and when being executed by the processor 52, the computer readable storage medium implements the blacklist management method of the first embodiment.
The above-mentioned serial numbers of the embodiments of the present invention are merely for description and do not represent the merits of the embodiments.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner.
The above description is only a preferred embodiment of the present invention, and not intended to limit the scope of the present invention, and all modifications of equivalent structures and equivalent processes, which are made by using the contents of the present specification and the accompanying drawings, or directly or indirectly applied to other related technical fields, are included in the scope of the present invention.

Claims (10)

1. A blacklist management method, characterized in that based on a blockchain having at least one network node, comprising the steps of:
receiving proposal information generated by a certain network node in the block chain, setting the network node generating the proposal information as a first node, and setting other network nodes except the first node in the block chain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
receiving voting information generated by whether the second node votes by adding the proposal information into a blacklist or not, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list;
calculating the normal voting information in the gray list according to the normal voting information and the weight of the second node generating the normal voting information to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list; or
And according to the proposal information written into the blacklist and the voting result thereof, improving the weight of the first node.
2. The blacklist management method according to claim 1, wherein said verifying the first node and generating a verification result comprises:
performing encryption operation on the network private key by adopting an elliptic encryption algorithm through the first node to obtain a network public key, and performing hash operation on the proposal information by adopting a hash algorithm to obtain a proposal abstract; encrypting the proposal information by the first node by adopting a network private key to obtain a proposal encrypted digest;
sending the network public key, proposal information and proposal encrypted digest to the second node through the first node;
decrypting the proposal encrypted digest by the second node by adopting the network public key to obtain a first digest, and performing hash operation on the proposal information by adopting a hash algorithm by the second node to obtain a second digest;
judging whether the first abstract and the second abstract are consistent through the second node, and if so, generating a verification result with the content being authorized; and if the contents are not consistent, generating a verification result that the contents are not authorized.
3. The blacklist management method according to claim 1, wherein said writing the proposal information into a grey list of a blockchain according to the verification result comprises:
extracting the contents of the verification results generated by all the second nodes;
if all the contents of the verification results are authorized, writing the proposal information into a grey list of the block chain; and if the content of at least one verification result is not authorized, deleting the proposal information.
4. The blacklist management method according to claim 1, wherein said verifying the second node and setting the voting information of the second node which is successfully verified as the normal voting information comprises:
encrypting a network private key by the second node by adopting an elliptic encryption algorithm to obtain a network public key, performing hash operation on the voting information by adopting a hash algorithm to obtain a voting abstract, and encrypting the voting abstract by adopting the network private key to obtain a voting encryption abstract;
verifying a second node generating the voting information in sequence according to the voting information, the network public key and the voting encryption abstract;
and taking the voting information generated by the second node which is successfully verified as normal voting information, and deleting the voting information generated by the second node which is unsuccessfully verified.
5. The blacklist management method according to claim 1, wherein said calculating normal voting information in the gray list to obtain voting results comprises:
when all the second nodes finish verification and the voting information generated by all the second nodes is set as normal voting information and written into a grey list or deleted, triggering an intelligent contract of the block chain;
and carrying out weighted summation calculation on the normal voting information in the gray list through the intelligent contract to obtain a voting result.
6. The blacklist management method according to claim 5, wherein said calculating a weighted sum of the normal voting information in the gray list to obtain a voting result comprises:
extracting the voting value, the node number and the weight of the network node corresponding to the node number of the normal voting information; the voting value is used for expressing the opinion of the second node on the proposal information, the node number is the unique code of the second node for generating the voting information, and the weight is used for expressing the importance degree of the network node;
multiplying the voting value by a weight to obtain a weighted voting value;
and adding all the weighted voting values in the gray list to obtain a voting result, wherein the contents of the voting result are positive proposals or negative proposals.
7. The blacklist management method according to claim 1, wherein a management node is provided in a blockchain, and the management node can change the node weight of any network node in the blockchain by running an intelligent contract of the blockchain.
8. A blacklist management apparatus, comprising:
the proposal verification module is used for receiving proposal information generated by a certain network node in the block chain, setting the network node generating the proposal information as a first node, and setting other network nodes except the first node in the block chain as second nodes; verifying the first node and generating a verification result, and writing the proposal information into a grey list of a block chain according to the verification result; the system comprises a grey list, a network node and a user terminal, wherein the grey list is a historical database used for storing proposal information, and the proposal information is suspect information which is input to the network node by the user terminal and has a suspicion of losing credit;
the voting verification module is used for receiving voting information generated by the second node whether to add the proposal information into a blacklist for voting, verifying the second node, setting the voting information of the second node which is successfully verified as normal voting information, and writing the normal voting information into the grey list;
the voting management module is used for calculating the normal voting information in the gray list according to the normal voting information and the weight of the second node generating the normal voting information so as to obtain a voting result; if the voting result is yes, writing the proposal information and the voting result into a blacklist of the block chain; if the voting result is negative, the proposal information and the voting result thereof are kept in the grey list; wherein the blacklist is stored in a block of a block chain for storing proposal information;
the weight adjusting module is used for reducing the weight of the first node according to the proposal information and the voting result thereof which are kept in the grey list; or according to the proposal information written into the blacklist and the voting result thereof, the weight of the first node is increased.
9. A computer system comprising a plurality of computer devices, each computer device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, wherein the processors of the plurality of computer devices when executing the computer program collectively implement the steps of the blacklist management method of any one of claims 1 to 7.
10. A computer-readable storage medium comprising a plurality of storage media, each storage medium having a computer program stored thereon, wherein the computer programs stored in the plurality of storage media, when executed by a processor, collectively implement the steps of the blacklist management method of any one of claims 1 to 7.
CN201911315253.7A 2019-12-19 2019-12-19 Blacklist management method, device, computer system and readable storage medium Pending CN111131218A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911315253.7A CN111131218A (en) 2019-12-19 2019-12-19 Blacklist management method, device, computer system and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911315253.7A CN111131218A (en) 2019-12-19 2019-12-19 Blacklist management method, device, computer system and readable storage medium

Publications (1)

Publication Number Publication Date
CN111131218A true CN111131218A (en) 2020-05-08

Family

ID=70500152

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911315253.7A Pending CN111131218A (en) 2019-12-19 2019-12-19 Blacklist management method, device, computer system and readable storage medium

Country Status (1)

Country Link
CN (1) CN111131218A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112968901A (en) * 2021-02-26 2021-06-15 北京三快在线科技有限公司 Blacklist block chain consensus method and device
CN114511309A (en) * 2020-11-17 2022-05-17 中国电信股份有限公司 Blacklist verification method and device, wallet application module, terminal and SIM card
WO2023233013A1 (en) * 2022-06-02 2023-12-07 Nchain Licensing Ag Methods and systems for freezing digital assets

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108768665A (en) * 2018-07-02 2018-11-06 上海达家迎信息科技有限公司 Block chain generation method, device, computer equipment and storage medium
CN108768607A (en) * 2018-05-14 2018-11-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of voting method, device, equipment and medium based on block chain
CN108846942A (en) * 2018-06-29 2018-11-20 青岛大学 Electronic voting method and system based on ether mill block chain
CN108923909A (en) * 2018-07-02 2018-11-30 上海达家迎信息科技有限公司 Block chain generation method, device, computer equipment and storage medium
EP3429122A1 (en) * 2017-07-11 2019-01-16 Panasonic Intellectual Property Corporation of America Methods and apparatuses for controlling electronic voting
CN109242535A (en) * 2018-08-07 2019-01-18 宜人恒业科技发展(北京)有限公司 Common recognition mechanism DPOP based on participation carries out the method and system of behavior memory quantization
CN109639416A (en) * 2018-12-21 2019-04-16 深圳市网心科技有限公司 A kind of identifier's node determines method, system, device and computer storage medium
CN109885264A (en) * 2019-04-16 2019-06-14 北京艾摩瑞策科技有限公司 A kind of the logic sharding method and its system of block chain node
CN110024422A (en) * 2016-12-30 2019-07-16 英特尔公司 The name of Internet of Things and block chained record
US20190236879A1 (en) * 2018-01-29 2019-08-01 Accenture Global Solutions Limited Blockchain-Based Anonymized Cryptologic Voting
CA2995770A1 (en) * 2018-02-21 2019-08-21 Beijing Tiande Technologies Limited A credit management system and method based on blockchain

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110024422A (en) * 2016-12-30 2019-07-16 英特尔公司 The name of Internet of Things and block chained record
EP3429122A1 (en) * 2017-07-11 2019-01-16 Panasonic Intellectual Property Corporation of America Methods and apparatuses for controlling electronic voting
US20190236879A1 (en) * 2018-01-29 2019-08-01 Accenture Global Solutions Limited Blockchain-Based Anonymized Cryptologic Voting
CA2995770A1 (en) * 2018-02-21 2019-08-21 Beijing Tiande Technologies Limited A credit management system and method based on blockchain
CN108768607A (en) * 2018-05-14 2018-11-06 中钞信用卡产业发展有限公司杭州区块链技术研究院 A kind of voting method, device, equipment and medium based on block chain
CN108846942A (en) * 2018-06-29 2018-11-20 青岛大学 Electronic voting method and system based on ether mill block chain
CN108768665A (en) * 2018-07-02 2018-11-06 上海达家迎信息科技有限公司 Block chain generation method, device, computer equipment and storage medium
CN108923909A (en) * 2018-07-02 2018-11-30 上海达家迎信息科技有限公司 Block chain generation method, device, computer equipment and storage medium
CN109242535A (en) * 2018-08-07 2019-01-18 宜人恒业科技发展(北京)有限公司 Common recognition mechanism DPOP based on participation carries out the method and system of behavior memory quantization
CN109639416A (en) * 2018-12-21 2019-04-16 深圳市网心科技有限公司 A kind of identifier's node determines method, system, device and computer storage medium
CN109885264A (en) * 2019-04-16 2019-06-14 北京艾摩瑞策科技有限公司 A kind of the logic sharding method and its system of block chain node

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
HU WEI-HONG等: "Review of blockchain-based DNS alternatives", 《网络与信息安全学报》 *
马小峰等: "基于区块链的供应链金融服务平台", 《大数据》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114511309A (en) * 2020-11-17 2022-05-17 中国电信股份有限公司 Blacklist verification method and device, wallet application module, terminal and SIM card
CN112968901A (en) * 2021-02-26 2021-06-15 北京三快在线科技有限公司 Blacklist block chain consensus method and device
WO2023233013A1 (en) * 2022-06-02 2023-12-07 Nchain Licensing Ag Methods and systems for freezing digital assets

Similar Documents

Publication Publication Date Title
US10790976B1 (en) System and method of blockchain wallet recovery
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
CN114586315B (en) Systems, methods, and computer readable media for decentralised data authentication
US11212081B2 (en) Method for signing a new block in a decentralized blockchain consensus network
Yee A sanctuary for mobile agents
US20200382310A1 (en) Reduced-step blockchain verification of media file
CN117640099A (en) Systems and methods for avoiding or reducing encryption retention resources on blockchain networks
CN110674128B (en) On-chain governance of blockchain
US20200382279A1 (en) Approximate hash verification of unused blockchain output
US20200382309A1 (en) Approximate hash verification for blockchain
Han et al. A survey on blockchain-based integrity auditing for cloud data
CN111460525B (en) Block chain-based data processing method, device and storage medium
CN111131218A (en) Blacklist management method, device, computer system and readable storage medium
US20200204338A1 (en) Securing public key cryptographic algorithms
Li et al. A decentralized and secure blockchain platform for open fair data trading
AU2021210206A1 (en) Index structure for blockchain ledger
CN115380303A (en) Trusted platform based on block chain
CN117195297B (en) ERP-based data security and privacy protection system and method
CN110708162A (en) Resource acquisition method and device, computer readable medium and electronic equipment
CN111585995A (en) Method and device for transmitting and processing safety wind control information, computer equipment and storage medium
Wang et al. A Fair and Privacy‐Preserving Image Trading System Based on Blockchain and Group Signature
CN113597608A (en) Trusted platform based on block chain
CN113302612A (en) Trusted platform based on block chain
Zhu et al. A proposal for account recovery in decentralized applications
CN112560016A (en) Service request management method and device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200508