CN111431918A - Method and system for determining state label of target user based on block chain - Google Patents

Method and system for determining state label of target user based on block chain Download PDF

Info

Publication number
CN111431918A
CN111431918A CN202010243315.4A CN202010243315A CN111431918A CN 111431918 A CN111431918 A CN 111431918A CN 202010243315 A CN202010243315 A CN 202010243315A CN 111431918 A CN111431918 A CN 111431918A
Authority
CN
China
Prior art keywords
target user
terminal
block chain
user
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010243315.4A
Other languages
Chinese (zh)
Other versions
CN111431918B (en
Inventor
王晓亮
张亚宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Hangzhou Rivtower Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Rivtower Technology Co Ltd filed Critical Hangzhou Rivtower Technology Co Ltd
Priority to CN202010243315.4A priority Critical patent/CN111431918B/en
Publication of CN111431918A publication Critical patent/CN111431918A/en
Application granted granted Critical
Publication of CN111431918B publication Critical patent/CN111431918B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0807Network architectures or network communication protocols for network security for authentication of entities using tickets, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

One or more embodiments of the present specification disclose a method and system for determining a target user status tag based on a blockchain, the method comprising: the method comprises the steps that a user terminal sends a state label query request to a block chain, at least one service terminal monitors the state label query request on the block chain, marks the identity information of a target user according to acquired data, and uploads a marking result to the block chain so as to collect and integrate the marking result to obtain a state label of the target user, and therefore information of the target user is cooperatively acquired through a plurality of service parties and is marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. Moreover, the state label is determined by a multi-party marking result, so that the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.

Description

Method and system for determining state label of target user based on block chain
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a method and system for determining a status tag of a target user based on a blockchain.
Background
The blockchain is a decentralized and innovative solution for solving the multi-party trust problem by using a distributed book technology, and is a leading-edge technology of the current society.
At present, various service labels implemented based on personal information, such as credit investigation reports generated based on personal consumption information, and health codes generated based on information such as personal behavior tracks and medical visits, are introduced in the whole social system, and these are collectively referred to as status labels of personal identities.
However, the existing tag is a result determined by collecting personal information of a user by a single service party, and is insufficient in data integrity and dimensionality, so that the accuracy of information of the user in a certain business category reflected by the user state tag cannot be guaranteed, and the risk of privacy disclosure may exist.
Disclosure of Invention
One or more embodiments of the present specification aim to provide a method and a system for determining a status tag of a target user based on a blockchain, so as to improve the accuracy of determining the status tag and avoid privacy disclosure.
To solve the above technical problem, one or more embodiments of the present specification are implemented as follows:
in a first aspect, a method for determining a target user status tag based on a blockchain is provided, including:
a user terminal sends a state label query request to a block chain, wherein the state label query request carries an identity of a target user;
after monitoring the status tag query request on the block chain, the at least one service terminal marks the identity information of the target user according to the acquired data and uploads a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to the privacy data of the target user.
In a second aspect, a system for determining a target user status label based on a blockchain is provided, including: a user terminal, at least one service terminal and a block chain; wherein the content of the first and second substances,
the user terminal is used for sending a state label query request to the block chain, wherein the state label query request carries an identity of a target user;
after monitoring the status tag query request on the block chain, the at least one service terminal is used for marking the identity information of the target user according to the acquired data and uploading a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to obtain the privacy data of the target user.
According to the technical scheme provided by one or more embodiments of the specification, the information of the target user can be cooperatively acquired by a plurality of service parties and marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. In addition, considering that the state label is determined by a multi-party marking result, the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.
Drawings
In order to more clearly illustrate one or more embodiments or prior art solutions of the present specification, reference will now be made briefly to the attached drawings, which are needed in the description of one or more embodiments or prior art, and it should be apparent that the drawings in the description below are only some of the embodiments described in the specification, and that other drawings may be obtained by those skilled in the art without inventive exercise.
Fig. 1 is a system architecture in an application scenario in which a target user state tag scheme is determined based on a blockchain according to an embodiment of the present specification.
Fig. 2 is a schematic step diagram of a method for determining a target user status tag based on a blockchain according to an embodiment of the present disclosure.
Fig. 3 is a flowchart illustrating a block chain-based health code determination according to an embodiment of the present disclosure.
Fig. 4 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Detailed Description
In order to make the technical solutions in the present specification better understood, the technical solutions in one or more embodiments of the present specification will be clearly and completely described below with reference to the accompanying drawings in one or more embodiments of the present specification, and it is obvious that the one or more embodiments described are only a part of the embodiments of the present specification, and not all embodiments. All other embodiments that can be derived by a person skilled in the art from one or more of the embodiments described herein without making any inventive step shall fall within the scope of protection of this document.
Referring to fig. 1, a system architecture in an application scenario where a target user status label scheme based on a blockchain is determined according to an embodiment of the present disclosure is shown, in which the system may include a user terminal 102 and at least one service terminal 104, and each of the terminals may access a blockchain network 106. In addition, in some cases, the system may further include an authentication terminal 108. The number of the user terminals 102 is not limited, and only one is illustrated in fig. 1. The user terminal 102 may specifically be a terminal used by a target user, or may also be a terminal used by a verification user. The service terminals 104 may be terminals capable of collecting basic information and behavior information of target users and processing the information, and the service terminals 104 may be clients of various APPs or hardware devices installed with APPs. The service terminal 104 may belong to an internet organization or a public system in a certain field, so that information of a target user can be collected from multiple angles in multiple fields, and a tag representing a state of the target user more accurately can be obtained through processing.
Example one
Referring to fig. 2, a schematic step diagram of a method for determining a target user status tag based on a blockchain provided in an embodiment of the present specification is shown, where the method is applied to the system shown in fig. 1, and specifically may include the following steps:
step 202: the user terminal sends a state label query request to the block chain, wherein the state label query request carries the identity of the target user.
In this embodiment, the user terminal may be a mobile terminal of the target user, such as a mobile phone of the target user or an electronic device such as an IPAD; or it may be some type of client installed on the mobile terminal of the target user. In summary, the target user uses its own terminal to send a status tag query request for determining its own status tag to the blockchain. Alternatively, the first and second electrodes may be,
the user terminal may also be a terminal device of a verification party verifying the target user, such as a detector or verification device; or a certain type of client used for verification installed on the terminal equipment of the verifier, namely, the verifier sends a state label query request for determining a state label of a target user to the blockchain by using a terminal of the verifier.
It should be understood that the identity of the target user may be an identity assigned by the regulatory authority to each user for characterizing the unique identity of the user. In the embodiment of the present specification, the identification may be an identification number or other valid certificate numbers, or may also be a mobile phone number after real-name system. In fact, the identity may also be a unique serial number defined and distributed on the blockchain, and the serial number may be formed by various characters alone or in combination, which is not limited in this specification.
Step 204: after monitoring the status tag query request on the block chain, the at least one service terminal marks the identity information of the target user according to the acquired data and uploads a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to the privacy data of the target user.
When the service terminal monitors the status label query request, the service terminal queries data of a target user from locally acquired data based on the identification of the target user carried in the status label query request, marks the identity information of the target user according to the data of the target user, and then uploads a marking result to a block chain so as to collect and integrate the marking result subsequently to obtain the status label of the target user. The data acquired by the service terminal may include: basic information of the target user and behavior information of the target user, wherein the basic information may include: basic attribute parameters such as name, gender, age, occupation and the like; the behavior information may be various types of behavior data related to the target user's clothing and housing, including: travel track, shopping consumption record, visit record, community entrance and exit registration and the like. In this embodiment of the present specification, the service terminal may mark the identity of the target user by default according to the user information by using a rule agreed in an intelligent contract on the block chain, and a specific marking mode is not limited in this specification.
It should be understood that the marking result uploaded to the block chain by the service terminal cannot identify the privacy data of the target user. In a specific implementation, the tagging result cannot be used to identify the private data of the target user, and the following scheme may be adopted:
1. the marking result is presented in a scoring form or a form of answer to the question, and does not represent data information of any actual attribute, such as a specific score, wherein the score is represented in a numerical value or a letter form, and further, for example, represented by answer to the question such as "yes" or "no".
Based on the scheme 1, when the status label of the target user is obtained by summarizing and integrating the marking result, a summarizing and integrating rule in a deployed intelligent contract can be called specifically by a block chain, and the marking result is processed to obtain the status label of the target user. That is, the determination operation of the status label of the target user is performed on the block chain, and since the labeling result is presented in the form of a score, the risk of privacy disclosure is reduced. And then, after the user terminal monitors that the processing is completed, the user terminal can acquire the state label of the target user from the block chain.
2. The marking results are encrypted, and the block chain is only stored in public and cannot be directly read by block chain nodes and external media.
Based on the scheme 2, the status label query request also carries a public key in a public-private key pair locally generated by the user terminal; then, after monitoring the status tag query request in step 204, the at least one service terminal marks the identity information of the target user according to the acquired data, and when uploading the marking result to the block chain, specifically executes: after monitoring the state label query request, the at least one service terminal acquires a public key uploaded by the user terminal; and marking the identity information of the target user according to the acquired data, encrypting the marked result through the public key after signing the marked result, and uploading the signed result to the block chain.
An implementable approach, after a user terminal sends a status tag query request to a blockchain, the method further comprising: the verification terminal sends a verification request to a block chain, wherein the verification request carries the identity of the target user; and after monitoring a verification request corresponding to the target user, the user terminal encrypts a private key in the locally generated public and private key pair and sends the encrypted private key to the verification terminal, and uploads authority information granted to the verification terminal to a block chain. The user terminal can encrypt its private key by using the public key of the verification terminal, and then send the encrypted private key to the verification terminal.
The reason why the authenticator requests the uplink is to ensure that the authenticator requires user authorization each time the authenticator uses the user data, so that the user can recover the right of the user according to the authorization record once the related agency illegally uses the user data.
Furthermore, when the status label of the target user is obtained by collecting and integrating the marking results, the verification terminal can obtain the marking results related to the target user after monitoring the granted authority information; the verification terminal decrypts the marking result according to the received private key and verifies the signature; and after the verification is passed, the verification terminal processes the marking result according to a locally set summarizing and integrating rule to obtain the state label of the target user. That is to say, under the condition that the verification terminal participates, the verification terminal may obtain the marking result from the block chain, decrypt the marking result by using the private key of the user terminal, verify the signature, and summarize the marking result, thereby obtaining the status label. In the process, the information of the target user is transmitted in an encrypted manner, and the marking result on the block chain is stored in an encrypted manner all the time and cannot be read by the block chain link point, so that privacy disclosure is effectively avoided.
The summary integration rule may be an integration manner set by the verification terminal according to its own requirement, for example, the summary integration rule may be a weighted average or an integration manner according to other priority rating manners, which is not limited in this specification.
An implementable scheme, based on scheme 1 or scheme 2, before the user terminal sends the status tag query request, the method further comprises: and the at least one service terminal applies for qualification authentication to the supervision terminal, wherein the service terminal has the authority to upload the marking result to the block chain after the authentication is passed.
It should be understood that, after the status label referred to in the embodiments of the present specification is returned to the user terminal, the target user status can be shown in a simple graphical and/or textual manner, for example, a graphical color represents different statuses, or a text such as excellent-good-not-good represents different statuses.
In this specification embodiment, if a user or verifier has a doubt about a determined status label, the server may be requested to re-label by means of an offline complaint in order to re-determine the status label.
The following describes a detailed description of a scheme for determining a target user status label based on a block chain according to a specific example.
Assuming that the health code during an epidemic situation is taken as an example, the target user may be a specific individual, and the corresponding identification of the target user may be an identification card. The service terminal can be a server of the traffic APP or a server of the consumption APP. Referring to fig. 3, suppose a user wants to enter a company to work, but considering that an epidemic situation is serious and it is uncertain whether the user goes to an epidemic area or contacts a crowd in the epidemic area, in order to ensure the health of the company colleagues, all employees entering the company need to be subjected to health verification, at this time, the target user may be the user, the verification party may be a company guard, the service party may be various APPs for collecting and processing information, and assuming that the service party 1 and the service party 2 are more than two in an actual scene, a plurality of service parties may be marked simultaneously and generally may be service parties in different fields.
Because the scheme is realized based on the block chain, not all service parties can upload information to the block chain, so that the service party can actively apply for qualification authentication by the service party monitoring party, and only after the qualification authentication, the service party is qualified or authorized to send the information to the block chain. Wherein, the blockchain can be developed and maintained by a supervisor.
The determination of the health code for the hair may include the following process:
the donkey hide wool sends a query request to the blockchain through the mobile phone.
And after monitoring the query request, the service part 1 and the service part 2 acquire the public key of the mobile phone broadcast.
The server 1 and the server 2 respectively mark the identity information of the donkey hide.
And the server 1 and the server 2 encrypt the signed marking result through the acquired public key and upload the signed marking result to the block chain.
The verification sends a verification request to the blockchain.
After the donkey hide wool monitors the verification request through the mobile phone, the local generated private key is encrypted and then sent to the verifying party.
The Aroma uploads the authority information granted to the verifying party to the block chain through the mobile phone.
And after monitoring the granted authority information, the verifying party acquires a marking result related to the hair.
And the verifying party decrypts the marking result according to the received private key and verifies the signature.
And the verifier processes the marking result according to a locally set summarizing and integrating rule to obtain the health code.
Then, the verifying party can determine whether to pass the donkey hide wool according to the health code, and simultaneously, the health code can be directly sent to a mobile phone of the donkey hide wool, so that the donkey hide wool can see the health code of the donkey hide wool. If the hair considers the status of the health code feedback to be not in accordance with the actual condition of the hair, for example, the hair does not contact or go to an epidemic area, but returns a red code which is not good for representing the health condition, the hair can be used for complaint correction. The specific complaints can be either online or offline, or can be implemented by a blockchain.
Through the technical scheme, the information of the target user can be cooperatively acquired through a plurality of service parties and marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. In addition, considering that the state label is determined by a multi-party marking result, the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.
Example two
Specifically, referring to fig. 1, the system for determining a target user status tag based on a block chain provided in the embodiment of the present specification may include: a user terminal, at least one service terminal and a block chain; wherein the content of the first and second substances,
the user terminal is used for sending a state label query request to the block chain, wherein the state label query request carries an identity of a target user;
after monitoring the status tag query request on the block chain, the at least one service terminal is used for marking the identity information of the target user according to the acquired data and uploading a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to obtain the privacy data of the target user.
Optionally, as an embodiment, the status label query request further carries a public key in a public-private key pair locally generated by the user terminal;
the at least one service terminal is specifically configured to obtain a public key uploaded by the user terminal after monitoring the status tag query request;
and marking the identity information of the target user according to the acquired data, encrypting the marked result through the public key after signing the marked result, and uploading the signed result to the block chain.
In a specific implementation manner of the embodiment of the present specification, the system further includes: verifying the terminal;
the verification terminal is used for sending a verification request to the blockchain after the user terminal sends a state label query request to the blockchain, wherein the verification request carries the identity of the target user; and the number of the first and second groups,
and the user terminal is used for encrypting a private key in the locally generated public and private key pair and then sending the encrypted private key to the verification terminal after monitoring a verification request corresponding to the target user, and uploading authority information granted to the verification terminal to a block chain.
In another specific implementation manner of the embodiment of the present specification, the verification terminal is specifically configured to obtain a marking result related to the target user after monitoring the granted permission information; and
decrypting the marking result according to the received private key and verifying the signature; and the number of the first and second groups,
and after the verification is passed, processing the marking result according to a locally set summarizing and integrating rule to obtain a state label of the target user.
In another specific implementation manner of the embodiment of the present specification, the block chain is specifically configured to invoke a summary integration rule in a deployed intelligent contract, and process the marking result to obtain a status tag of the target user;
the user terminal is further configured to obtain the status label of the target user from the blockchain.
In another specific implementation manner of the embodiment of the present specification, the at least one service terminal is further configured to apply for qualification authentication from the monitoring terminal before the user terminal sends the status tag query request, where the service terminal has a right to upload the marking result to the block chain after the authentication is passed.
Through the technical scheme, the information of the target user can be cooperatively acquired through a plurality of service parties and marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. In addition, considering that the state label is determined by a multi-party marking result, the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.
EXAMPLE III
Fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure. Referring to fig. 4, at a hardware level, the electronic device includes a processor, and optionally further includes an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a non-volatile Memory, such as at least 1 disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be connected to each other via an internal bus, which may be an ISA (Industry Standard Architecture) bus, a PCI (peripheral component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 4, but that does not indicate only one bus or one type of bus.
And the memory is used for storing programs. In particular, the program may include program code comprising computer operating instructions. The memory may include both memory and non-volatile storage and provides instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the user terminal or the service terminal on a logic level. And a processor for executing the program stored in the memory, and specifically for executing the operation of the user terminal side or the operation of the service terminal side.
The method performed by the apparatus according to the embodiment shown in fig. 2 of the present specification can be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components. The methods, steps, and logic blocks disclosed in one or more embodiments of the present specification may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with one or more embodiments of the present disclosure may be embodied directly in hardware, in a software module executed by a hardware decoding processor, or in a combination of the hardware and software modules executed by a hardware decoding processor. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
The electronic device may also execute the method of fig. 2 and implement the functions of the corresponding apparatus in the embodiment shown in fig. 2, which are not described herein again in this specification.
Of course, besides the software implementation, the electronic device of the embodiment of the present disclosure does not exclude other implementations, such as a logic device or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may also be hardware or a logic device.
Through the technical scheme, the information of the target user can be cooperatively acquired through a plurality of service parties and marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. In addition, considering that the state label is determined by a multi-party marking result, the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.
Example four
Embodiments of the present specification also propose a computer-readable storage medium storing one or more programs, the one or more programs including instructions, which when executed by a portable electronic device including a plurality of application programs, can cause the portable electronic device to perform the method of the user terminal or the service terminal in the embodiment shown in fig. 2.
Through the technical scheme, the information of the target user can be cooperatively acquired through a plurality of service parties and marked; the defects in the aspects of data integrity and dimensionality can be avoided without excessively and intensively disclosing the information of the target user to a service party, so that the accuracy of the state label is improved, and the privacy of the user is protected to a certain extent. In addition, considering that the state label is determined by a multi-party marking result, the problems of data counterfeiting or hiding, false reporting and the like can be effectively avoided, and the authenticity of the state label is improved.
In short, the above description is only a preferred embodiment of the present disclosure, and is not intended to limit the scope of the present disclosure. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present specification shall be included in the protection scope of the present specification.
The system, apparatus, module or unit illustrated in one or more of the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with a certain functionality. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.

Claims (12)

1. A method of determining a target user status label based on a blockchain, comprising:
a user terminal sends a state label query request to a block chain, wherein the state label query request carries an identity of a target user;
after monitoring the status tag query request on the block chain, the at least one service terminal marks the identity information of the target user according to the acquired data and uploads a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to the privacy data of the target user.
2. The method according to claim 1, wherein the status label query request further carries a public key of a locally generated public-private key pair of the user terminal;
after monitoring the status tag query request, the at least one service terminal marks the identity information of the target user according to the acquired data, and uploads a marking result to the block chain, and specifically includes:
after monitoring the state label query request, the at least one service terminal acquires a public key uploaded by the user terminal;
and marking the identity information of the target user according to the acquired data, encrypting the marked result through the public key after signing the marked result, and uploading the signed result to the block chain.
3. The method of claim 2, after the user terminal sends the status tag query request to the blockchain, the method further comprising:
the verification terminal sends a verification request to a block chain, wherein the verification request carries the identity of the target user;
and after monitoring a verification request corresponding to the target user, the user terminal encrypts a private key in the locally generated public and private key pair and sends the encrypted private key to the verification terminal, and uploads authority information granted to the verification terminal to a block chain.
4. The method according to claim 3, wherein the step of collecting and integrating the labeling results to obtain the status label of the target user specifically comprises:
after monitoring the granted authority information, the verification terminal acquires a marking result related to the target user;
the verification terminal decrypts the marking result according to the received private key and verifies the signature;
and after the verification is passed, the verification terminal processes the marking result according to a locally set summarizing and integrating rule to obtain the state label of the target user.
5. The method according to claim 1, wherein the step of collecting and integrating the labeling results to obtain the status label of the target user specifically comprises:
the block chain calls a gathering and integrating rule in the deployed intelligent contract, and processes the marking result to obtain a state label of the target user;
the method further comprises the following steps:
and the user terminal acquires the state label of the target user from the block chain.
6. The method according to any of claims 1-5, before the user terminal sends the status tag query request, the method further comprising:
and the at least one service terminal applies for qualification authentication to the supervision terminal, wherein the service terminal has the authority to upload the marking result to the block chain after the authentication is passed.
7. A system for determining a target user status label based on a blockchain, comprising: a user terminal, at least one service terminal and a block chain; wherein the content of the first and second substances,
the user terminal is used for sending a state label query request to the block chain, wherein the state label query request carries an identity of a target user;
after monitoring the status tag query request on the block chain, the at least one service terminal is used for marking the identity information of the target user according to the acquired data and uploading a marking result to the block chain, so that the marking result is collected and integrated to obtain the status tag of the target user, wherein the marking result cannot be identified to obtain the privacy data of the target user.
8. The system according to claim 7, wherein the status label query request further carries a public key of a locally generated public-private key pair of the user terminal;
the at least one service terminal is specifically configured to obtain a public key uploaded by the user terminal after monitoring the status tag query request;
and marking the identity information of the target user according to the acquired data, encrypting the marked result through the public key after signing the marked result, and uploading the signed result to the block chain.
9. The system of claim 8, further comprising: verifying the terminal;
the verification terminal is used for sending a verification request to the blockchain after the user terminal sends a state label query request to the blockchain, wherein the verification request carries the identity of the target user; and the number of the first and second groups,
and the user terminal is used for encrypting a private key in the locally generated public and private key pair and then sending the encrypted private key to the verification terminal after monitoring a verification request corresponding to the target user, and uploading authority information granted to the verification terminal to a block chain.
10. The system according to claim 9, wherein the authentication terminal is specifically configured to obtain a marking result related to the target user after monitoring the granted permission information; and
decrypting the marking result according to the received private key and verifying the signature; and the number of the first and second groups,
and after the verification is passed, processing the marking result according to a locally set summarizing and integrating rule to obtain a state label of the target user.
11. The system of claim 7, wherein the blockchain is specifically configured to invoke a summary integration rule in a deployed intelligent contract, and process the tagging result to obtain a status tag of the target user;
the user terminal is further configured to obtain the status label of the target user from the blockchain.
12. The system according to any one of claims 7 to 11, wherein the at least one service terminal is further configured to apply for qualification certification from the administrative terminal before the user terminal sends the status tag query request, and wherein the service terminal has a right to upload the tagged result to the blockchain after the certification is passed.
CN202010243315.4A 2020-03-31 2020-03-31 Method and system for determining state label of target user based on block chain Active CN111431918B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010243315.4A CN111431918B (en) 2020-03-31 2020-03-31 Method and system for determining state label of target user based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010243315.4A CN111431918B (en) 2020-03-31 2020-03-31 Method and system for determining state label of target user based on block chain

Publications (2)

Publication Number Publication Date
CN111431918A true CN111431918A (en) 2020-07-17
CN111431918B CN111431918B (en) 2022-08-19

Family

ID=71555574

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010243315.4A Active CN111431918B (en) 2020-03-31 2020-03-31 Method and system for determining state label of target user based on block chain

Country Status (1)

Country Link
CN (1) CN111431918B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297447A (en) * 2022-03-09 2022-04-08 广州卓腾科技有限公司 Electronic certificate marking method and system based on epidemic prevention big data and readable storage medium

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821883A (en) * 2015-05-13 2015-08-05 上海凭安企业信用征信有限公司 Privacy protection credit reporting method based on asymmetric cryptographic algorithm
CN105488186A (en) * 2015-12-01 2016-04-13 徐红伟 Decentralized distributed credit investigation inquiry release method
CN106027533A (en) * 2016-05-25 2016-10-12 珠海市小源科技有限公司 Credit investigation method and credit investigation apparatus for mobile terminal
CN106611372A (en) * 2016-12-27 2017-05-03 深圳微众税银信息服务有限公司 Credit investigation data query method and credit investigation data query system
CN108537065A (en) * 2018-04-09 2018-09-14 众安信息技术服务有限公司 Reference information processing method
CN109711874A (en) * 2018-12-17 2019-05-03 平安科技(深圳)有限公司 User's portrait generation method, device, computer equipment and storage medium
US20190349200A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
CN110717197A (en) * 2019-10-14 2020-01-21 重庆邮电大学 Credit investigation data sharing method based on block chain
US20200084051A1 (en) * 2018-09-12 2020-03-12 Bitclave Pte. Ltd. Systems and methods for preserving privacy and incentivizing third-party data sharing

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104821883A (en) * 2015-05-13 2015-08-05 上海凭安企业信用征信有限公司 Privacy protection credit reporting method based on asymmetric cryptographic algorithm
CN105488186A (en) * 2015-12-01 2016-04-13 徐红伟 Decentralized distributed credit investigation inquiry release method
CN106027533A (en) * 2016-05-25 2016-10-12 珠海市小源科技有限公司 Credit investigation method and credit investigation apparatus for mobile terminal
CN106611372A (en) * 2016-12-27 2017-05-03 深圳微众税银信息服务有限公司 Credit investigation data query method and credit investigation data query system
CN108537065A (en) * 2018-04-09 2018-09-14 众安信息技术服务有限公司 Reference information processing method
US20190349200A1 (en) * 2018-05-10 2019-11-14 Alibaba Group Holding Limited Blockchain data processing methods, apparatuses, processing devices, and systems
US20200084051A1 (en) * 2018-09-12 2020-03-12 Bitclave Pte. Ltd. Systems and methods for preserving privacy and incentivizing third-party data sharing
CN109711874A (en) * 2018-12-17 2019-05-03 平安科技(深圳)有限公司 User's portrait generation method, device, computer equipment and storage medium
CN110717197A (en) * 2019-10-14 2020-01-21 重庆邮电大学 Credit investigation data sharing method based on block chain

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114297447A (en) * 2022-03-09 2022-04-08 广州卓腾科技有限公司 Electronic certificate marking method and system based on epidemic prevention big data and readable storage medium

Also Published As

Publication number Publication date
CN111431918B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN109327314B (en) Service data access method, device, electronic equipment and system
CN110377239B (en) Data signature method, device, server, system and storage medium
CN108665946B (en) Service data access method and device
US11757643B2 (en) System and method for authenticating user identity
JP6054457B2 (en) Private analysis with controlled disclosure
CN110768968B (en) Authorization method, device, equipment and system based on verifiable statement
CN106797371B (en) Method and system for user authentication
US20200327254A1 (en) System and method to find origin and to prevent spread of false information on an information sharing systems
EP3698529A1 (en) Permissions from entities to access information
CN110246039B (en) Transaction monitoring method and device based on alliance chain and electronic equipment
CN105871786B (en) A kind of verification method of user information, device and system
CN111723943B (en) Multi-label-based federal learning method, device and system
CN111461883A (en) Transaction processing method and device based on block chain and electronic equipment
CN112600890B (en) Data management method and system based on block chain
US11824850B2 (en) Systems and methods for securing login access
CN111683082A (en) Data sharing method and system based on block chain and electronic equipment
Ahmad et al. Security, usability, and biometric authentication scheme for electronic voting using multiple keys
Gaire et al. Crowdsensing and privacy in smart city applications
CN111431918B (en) Method and system for determining state label of target user based on block chain
Vaudenay et al. Analysis of swisscovid
CN113704734A (en) Distributed digital identity-based method for realizing certificate verification and related device
US20190164201A1 (en) Trustworthy review system and method for legitimizing a review
WO2020208429A1 (en) System and method to find origin and to prevent spread of false information on an information sharing systems
CN113489669B (en) User data protection method and device
CN111461728B (en) Risk identification method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant