CN111586002B - Comment identification method based on block chain, access device and comment system - Google Patents
Comment identification method based on block chain, access device and comment system Download PDFInfo
- Publication number
- CN111586002B CN111586002B CN202010352112.9A CN202010352112A CN111586002B CN 111586002 B CN111586002 B CN 111586002B CN 202010352112 A CN202010352112 A CN 202010352112A CN 111586002 B CN111586002 B CN 111586002B
- Authority
- CN
- China
- Prior art keywords
- comment
- information
- broadcast message
- access device
- access
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 38
- 238000012552 review Methods 0.000 claims description 11
- 238000012795 verification Methods 0.000 claims description 10
- XLYOFNOQVPJJNP-UHFFFAOYSA-N water Substances O XLYOFNOQVPJJNP-UHFFFAOYSA-N 0.000 abstract description 6
- 230000008901 benefit Effects 0.000 abstract description 4
- 230000003287 optical effect Effects 0.000 description 17
- 101150012579 ADSL gene Proteins 0.000 description 14
- 102100020775 Adenylosuccinate lyase Human genes 0.000 description 14
- 108700040193 Adenylosuccinate lyases Proteins 0.000 description 14
- 241000282326 Felis catus Species 0.000 description 4
- 238000001514 detection method Methods 0.000 description 3
- 238000010586 diagram Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000008859 change Effects 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 239000000126 substance Substances 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0282—Rating or review of business operators or products
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/52—Network services specially adapted for the location of the user terminal
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/02—Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/02—Services making use of location information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W4/00—Services specially adapted for wireless communication networks; Facilities therefor
- H04W4/06—Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services
Abstract
The application discloses a comment identification method based on a block chain, access equipment and a comment system, wherein the method comprises the following steps: receiving a first broadcast message, wherein the first broadcast message is broadcast by a user terminal in a block chain; if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic. The phenomenon of false comments in places such as restaurants or scenic spots is avoided, the condition of a water army which swipes a comment on a bill is greatly reduced, the authenticity of the comments is improved, the benefits of consumers are guaranteed, and the user experience is improved.
Description
Technical Field
The application belongs to the technical field of communication, and particularly relates to a comment identification method based on a block chain, access equipment and a comment system.
Background
Although review functions are started to be introduced from various domestic tourism websites, the quality of the tourism websites is uneven due to various reasons. The development and application of the network enable any netizen to become a medium, and have strong vitality and dissemination, and public praise dissemination of the netizen can even influence or change consumption decisions of other people. Particularly in the online tourism industry, the strength of public praise is remarkable. Whether the scenic spot is good, whether the hotel is comfortable, whether the traffic is convenient or not, and the comment of others is opened to be known at a glance. The quality of the comments directly influences the selection of the tourism products by the users and even surpasses the traditional advertising.
Although review functions are started to be introduced from various domestic tourism websites, the quality of the tourism websites is uneven due to various reasons. And places such as many restaurants or scenic spots, etc. are good at themselves by the water army for counterfeiting, so that the consumers are deceived and the interests of the consumers are damaged in order to rank the place ahead. Meanwhile, people miss other better choices.
The industry indicates that the order and the amount of the orders brushed can influence the decision of the consumers, more businesses are won, and the platform can also provide good-looking data for investors, so that data counterfeiting becomes a big problem of the industry, even a plurality of 'latent rules' of comment websites. And the data counterfeiting cost is low, for example, 1 ten thousand video clicks can be bought by 2 yuan, meanwhile, the responsibility tracing cost is very high, and a video website complains and flushes companies, and 9.5 hundred million times of counterfeiting are replaced by 50 yuan of compensation.
Disclosure of Invention
The application provides a comment identification method, access equipment and a comment system based on a block chain, aiming at the problem that places such as many restaurants or scenic spots are good for the users to review by water army.
As a first aspect of the present application, there is provided a comment identification method based on a blockchain, including:
receiving a first broadcast message, wherein the first broadcast message is broadcast by a user terminal in a block chain;
if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic.
Preferably, the device is a non-terminal device, and the access device information includes an access device identifier.
Preferably, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device.
As a second aspect of the present application, there is provided a comment identification method based on a blockchain, including:
receiving a second broadcast message, wherein the second broadcast message is broadcast by an access device in a block chain;
acquiring access equipment information and comment information in the second broadcast message, and judging the authenticity of the comment information according to the access equipment information;
and if the comment information is real, issuing the comment information.
Preferably, the accessing device includes a terminal device as a hotspot, the accessing device information includes a location of the accessing device, and the determining the authenticity of the comment information according to the accessing device information includes:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
before the obtaining of the access device information and the comment information in the second broadcast message, the method includes:
determining a node identification of an access device broadcasting the second broadcast message;
acquiring a public key according to the node identifier of the access equipment;
and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
As a third aspect of the present application, there is provided an access device, including:
a receiving module, configured to receive a first broadcast message, where the first broadcast message is broadcast by a user equipment in a block chain;
and the broadcasting module is used for broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in the block chain if the first broadcast message comprises the comment information and the equipment is the access equipment, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be real.
As a fourth aspect of the present application, there is provided a comment system including:
a receiving module, configured to receive a second broadcast message, where the second broadcast message is broadcast by an access device in a block chain;
the first acquisition module is used for acquiring the access equipment information and the comment information in the second broadcast message;
the judging module is used for judging the authenticity of the comment information according to the access equipment information;
and the publishing module is used for publishing the comment information if the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
J in the block chain receives a first broadcast message of user terminal wide access equipment in the block chain, and if the first broadcast message comprises comment information and the equipment is access equipment, a second broadcast message carrying the comment information and the access equipment information of the access equipment is broadcast in the block chain. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a comment identification method based on a blockchain according to a first embodiment of the present application;
fig. 2 is a flowchart of a comment identification method based on a blockchain according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of an access device according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of a comment system provided in a fourth embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The application provides a comment identification method based on a block chain, access equipment and a comment system. The following detailed description is made with reference to the drawings of the embodiments provided in the present application, respectively.
For ease of understanding, the block link points in this application will be briefly described. The method comprises three block chain nodes, wherein the first type is a user terminal, the first type is access equipment, and the third type is a comment system. The access device comprises a non-terminal device or a terminal device as a hotspot. Non-end devices include Optical modems (i.e., ONT nodes, Optical Network Termination Optical Network terminals) or modems or ADSL modems (Asymmetric Digital Subscriber Line).
As a first embodiment of the present application, a comment identification method based on a block chain is provided. The execution subject of the comment identification method based on the block chain is the access equipment. As shown in fig. 1, the comment identification method based on a blockchain includes the following steps.
Step 101, receiving a first broadcast message.
In this step, an access device in the blockchain receives a first broadcast message. The first broadcast message is broadcast by a user terminal in a block chain. A user inputs own comment information on a user terminal, and then the user terminal broadcasts a first broadcast message and the like carrying the comment information to a block chain network.
Step 102, if the first broadcast message includes comment information and the device is an access device, broadcasting a second broadcast message carrying the comment information and access device information of the access device in a block chain, so that a comment system can judge the authenticity of the comment information according to the access device information and issue the comment information when the comment information is confirmed to be authentic.
In this step, if the user is approaching a scene area with a fixed geographic location, such as a restaurant, the user terminal is connected to the access device near the fixed geographic location, and the access device is provided with a comment information detection module. When the comment information detection module detects that the user sends comment information to the Internet through the comment information detection module, the access equipment packages the comment information and the access equipment information into a second broadcast message, and then broadcasts the second broadcast message into the block chain network in a private key signature mode. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic.
It should be noted that, preferably, the second broadcast message further includes a user terminal identifier.
The application provides a comment identification method based on a block chain, wherein access equipment in the block chain receives a first broadcast message broadcasted by a user terminal in the block chain, and if the first broadcast message comprises comment information and the equipment is the access equipment, a second broadcast message carrying the comment information and the access equipment information of the access equipment is broadcasted in the block chain. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
In some embodiments, the device is a non-terminal device, and the access device information includes an access device identifier. When the access device is a non-terminal device, that is, when the access device is an optical modem or an ADSL modem, the optical modem or ADSL modem packages the comment information and the access device identifier into a second broadcast message, and then broadcasts the second broadcast message to the block chain network in a private key signature mode.
In some embodiments, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device. When the access device is a terminal device serving as a hotspot, the terminal device serving as the hotspot packages the comment information and the position of the access device into a second broadcast message, and then broadcasts the comment information and the position of the access device into the blockchain network in a mode of a broadcast message signed by a private key. Here the location of the access device is latitude and longitude information.
As a second embodiment of the present application, a comment identification method based on a block chain is provided. The execution subject of the comment identification method based on the block chain is a comment system. As shown in fig. 2, the comment identification method based on a blockchain includes the following steps.
Step 201, receiving a second broadcast message.
In this step, the review system in the blockchain receives a second broadcast message. The second broadcast message is broadcast by an access device in a block chain.
Step 202, obtaining the access device information and the comment information in the second broadcast message.
In this step, the comment system in the block chain acquires the access device information and the comment information in the second broadcast message according to the node identifier of the access device that broadcasts the second broadcast message.
And step 203, judging the authenticity of the comment information according to the access equipment information.
In this step, the comment system in the block chain judges the authenticity of the comment information according to the access device information, that is, judges whether the comment information is a real comment of the user.
And step 204, if the comment information is true, the comment information is issued.
In this step, if the comment information is real, the comment is made by a real user, and the comment is not made by virtual physical location information or virtual positioning. The comment system publishes the comment information to a website corresponding to the comment system.
The application provides a comment identification method based on a block chain. And enabling the comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is true. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
In some embodiments, the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the authenticity of the comment information is determined according to the access device information (i.e., step 203), including: determining the position of the comment object according to the comment information; and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
In this step, when the access device is a terminal device serving as a hotspot, the comment system acquires the position and comment information of the terminal device serving as the hotspot in the second broadcast message. The comment system determines the position of the comment object according to the comment information, namely determines the position of the restaurant or the scenic spot, compares the position of the comment object with the position of the terminal device serving as the hotspot, and determines that the comment information is real, namely the comment information is a real user comment, but not a virtual physical position information or a virtual positioning mode for comment if the distance between the position of the comment object and the position of the terminal device serving as the hotspot is smaller than a preset threshold value.
In some embodiments, the accessing device includes a non-terminal device, the accessing device information includes an accessing device identifier, and the determining the authenticity of the comment information according to the accessing device information (i.e. step 203) includes: determining the position of the comment object according to the comment information; determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment; and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
In the initial stage, the device identification of the optical modem or ADSL modem and the physical location of the optical modem are recorded in a corresponding relationship at the beginning of the transaction, and need to be stored in the review system in advance and updated in real time. Preferably, the review system also prestores the user terminal identification and the identification of the optical modem or ADSL modem to which the user terminal has been connected.
In this step, when the access device is a non-terminal device, that is, the optical modem or ADSL modem, the review system obtains the access device identifier and the review information of the optical modem or ADSL modem in the second broadcast message. The comment system inquires the position of the optical modem or ADSL cat or modem stored before the access equipment identification of the optical modem or ADSL cat or modem, and meanwhile, the comment system determines the position of a comment object according to the comment information, namely determines the position of a restaurant or an attraction. The comment system compares the position of the comment object with the position of the optical modem or the ADSL cat or the modem, and if the distance between the position of the comment object and the position of the optical modem or the ADSL cat or the modem is smaller than a preset threshold value, the comment information is determined to be real, namely the comment information is real, and the comment information is not virtual physical position information or is commented in a virtual positioning mode.
It should be noted that, when the second broadcast message carries the user terminal identifier, the second broadcast message may not carry the access device identifier of the optical modem or ADSL modem, and the access device identifier of the optical modem or ADSL modem may be determined by querying the identifier of the optical modem or ADSL modem connected to the user terminal identifier stored in advance in the comment system.
In some embodiments, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key; before the obtaining the access device information and the comment information in the second broadcast message (i.e. step 202), the method includes: determining a node identification of an access device broadcasting the second broadcast message; acquiring a public key according to the node identifier of the access equipment; and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
In this step, after receiving the second broadcast information, the comment system in the blockchain determines a node identifier of an access device that broadcasts the second broadcast information, queries a blockchain book according to the node identifier, finds a public key corresponding to the access device, verifies a private key signature of the second broadcast information using the public key, and acquires comment information and access device information in the second broadcast information after the verification is passed.
As a third embodiment of the present application, there is provided an access device, as shown in fig. 3, including a receiving module 11 and a broadcasting module 12. The access device provided by the application is used for executing the comment identification method based on the block chain provided by the first embodiment of the application. The method comprises the following specific steps:
a receiving module 11, configured to receive a first broadcast message, where the first broadcast message is broadcast by a user equipment in a block chain.
The broadcasting module 12 is configured to broadcast a second broadcast message carrying the comment information and access device information of the access device in the blockchain if the first broadcast message includes the comment information and the device is an access device, so that the comment system determines authenticity of the comment information according to the access device information and issues the comment information when it is determined that the comment information is authentic.
Preferably, the device is a non-terminal device, and the access device information includes an access device identifier.
Preferably, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device.
As a fourth embodiment of the present application, there is provided a comment system, as shown in fig. 4, including a receiving module 21, a first acquiring module 22, a judging module 23, and a posting module 24. The comment system provided by the application is used for executing the comment identification method based on the block chain provided by the second embodiment of the application. The method comprises the following specific steps:
a receiving module 21, configured to receive a second broadcast message, where the second broadcast message is broadcast by an access device in a block chain;
a first obtaining module 22, configured to obtain access device information and comment information in the second broadcast message;
the judging module 23 is configured to judge authenticity of the comment information according to the access device information;
and the publishing module 23 is configured to publish the comment information if the comment information is real.
Preferably, the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the determining module 23 is configured to:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining module 23 is configured to:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.
Claims (10)
1. A comment identification method based on a block chain is characterized in that the method is applied to access equipment; the method comprises the following steps:
receiving a first broadcast message, wherein the first broadcast message is information broadcasted by a user terminal in a block chain to a block chain network;
if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic; the access device and the comment system are both nodes of a block chain network.
2. The comment recognition method based on the blockchain according to claim 1, wherein the device is a non-terminal device, and the access device information includes an access device identifier.
3. The comment identification method based on the blockchain according to claim 1, wherein the device is a terminal device that is a hotspot, and the access device information includes a location of the access device.
4. A comment identification method based on a block chain is characterized in that the method is applied to a comment system; the method comprises the following steps:
receiving a second broadcast message, wherein the second broadcast message is information broadcasted by an access device in a block chain after receiving first broadcast information broadcasted by a user terminal to a block chain network and the first broadcast message comprises comment information; the access equipment and the comment system are both nodes of a block chain network;
acquiring access equipment information and comment information in the second broadcast message, and judging the authenticity of the comment information according to the access equipment information;
and if the comment information is real, issuing the comment information.
5. The comment identification method based on the blockchain according to claim 4, wherein the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
6. The comment recognition method based on the blockchain according to claim 4, wherein the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
7. The comment identification method based on the blockchain according to claim 4, wherein the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
before the obtaining of the access device information and the comment information in the second broadcast message, the method includes:
determining a node identification of an access device broadcasting the second broadcast message;
acquiring a public key according to the node identifier of the access equipment;
and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
8. An access device, comprising:
a receiving module, configured to receive a first broadcast message, where the first broadcast message is information broadcasted by a user terminal in a blockchain to a blockchain network;
the broadcasting module is used for broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain if the first broadcast message comprises the comment information and the equipment is the access equipment, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be real; the access device and the comment system are both nodes of a block chain network.
9. A review system, comprising:
the receiving module is used for receiving a second broadcast message, wherein the second broadcast message is information which is broadcasted after the access equipment in the block chain broadcasts the first broadcast information to the block chain network by the receiving user terminal and the comment information is included in the first broadcast message; the access equipment and the comment system are both nodes of a block chain network;
the first acquisition module is used for acquiring the access equipment information and the comment information in the second broadcast message;
the judging module is used for judging the authenticity of the comment information according to the access equipment information;
and the publishing module is used for publishing the comment information if the comment information is real.
10. The review system of claim 9 wherein the second broadcast message is sent by the access device after signing the review information and the access device information with a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010352112.9A CN111586002B (en) | 2020-04-28 | 2020-04-28 | Comment identification method based on block chain, access device and comment system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010352112.9A CN111586002B (en) | 2020-04-28 | 2020-04-28 | Comment identification method based on block chain, access device and comment system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111586002A CN111586002A (en) | 2020-08-25 |
CN111586002B true CN111586002B (en) | 2022-04-15 |
Family
ID=72111726
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010352112.9A Active CN111586002B (en) | 2020-04-28 | 2020-04-28 | Comment identification method based on block chain, access device and comment system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111586002B (en) |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10171476B2 (en) * | 2015-01-12 | 2019-01-01 | Sal Khan | System and method for protecting the privacy of identity and financial information of the consumer conducting online business |
US10217078B1 (en) * | 2017-05-31 | 2019-02-26 | Elliot Klein | Blockchain system and method for calculating location of time-crucial shipments according to expectation and smart contracts |
CN108242017A (en) * | 2018-02-07 | 2018-07-03 | 杭州蜜迩科技有限公司 | A kind of location-based comment interaction systems and method |
CN109657450B (en) * | 2018-12-14 | 2021-04-16 | 泰康保险集团股份有限公司 | Method, device, medium, and electronic device for evaluation based on block chain |
CN110602248B (en) * | 2019-09-27 | 2020-08-11 | 腾讯科技(深圳)有限公司 | Abnormal behavior information identification method, system, device, equipment and medium |
CN110597841B (en) * | 2019-09-29 | 2021-09-14 | 腾讯科技(深圳)有限公司 | Application comment information processing method and device based on block chain network |
CN110765490A (en) * | 2019-10-31 | 2020-02-07 | 北京海益同展信息科技有限公司 | Method and apparatus for processing information |
CN110909381A (en) * | 2019-11-12 | 2020-03-24 | 北京芯际科技有限公司 | Block chain-based user comment tamper-proof system and method |
-
2020
- 2020-04-28 CN CN202010352112.9A patent/CN111586002B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN111586002A (en) | 2020-08-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20170286539A1 (en) | User profile stitching | |
CN100390823C (en) | Selective media stream advertising technique | |
CN105225027A (en) | Customer allocation method and system | |
CN101499156A (en) | Advertisement issuance control method and apparatus based on multi-advertisement information issuing apparatus | |
TWI599212B (en) | System and method for providing information of outgoing call | |
CN109741482A (en) | A kind of information sharing method and device | |
SE0201315D0 (en) | A method and system of rating in a charging system | |
CN109919726A (en) | A kind of business system | |
Brown | An assessment of the proportionality of regulation of ‘over the top’communications services under Europe's common regulatory framework for electronic communications networks and services | |
CN104616170A (en) | Interactive method and electronic equipment | |
CN104540114A (en) | Methods, terminal, server and system used for recognizing opposite terminal identity | |
CN101499077A (en) | Control device and method for issuing information according to carrier content category message | |
CN111586002B (en) | Comment identification method based on block chain, access device and comment system | |
CN111556152B (en) | Comment identification method based on block chain, base station and evaluation system | |
KR102197695B1 (en) | System for managing commercial use of contents copyright and method thereof | |
EP1846810A2 (en) | Method and system for providing customized recommendations to users | |
KR20050095402A (en) | Location-based internet advertising service system and method thereof | |
CN105787789A (en) | Method and apparatus for displaying currency exchange rate | |
CN111651209A (en) | Method and device for determining guide page | |
WO2016026309A1 (en) | Comment message processing method and apparatus | |
KR101254078B1 (en) | Advertising System Using SNS Message Output | |
KR20090030690A (en) | Method and system for providing the language exchange service using user created contents | |
CN111415105B (en) | Comment verification method, node, population thermodynamic diagram data node and management system | |
CN102419850A (en) | Control method for sending advertisement according to idle degrees of users | |
CN108596680A (en) | A kind of method for pushing based on block chain price |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |