CN111586002B - Comment identification method based on block chain, access device and comment system - Google Patents

Comment identification method based on block chain, access device and comment system Download PDF

Info

Publication number
CN111586002B
CN111586002B CN202010352112.9A CN202010352112A CN111586002B CN 111586002 B CN111586002 B CN 111586002B CN 202010352112 A CN202010352112 A CN 202010352112A CN 111586002 B CN111586002 B CN 111586002B
Authority
CN
China
Prior art keywords
comment
information
broadcast message
access device
access
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010352112.9A
Other languages
Chinese (zh)
Other versions
CN111586002A (en
Inventor
田新雪
肖征荣
马书惠
贾佳
杨子文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010352112.9A priority Critical patent/CN111586002B/en
Publication of CN111586002A publication Critical patent/CN111586002A/en
Application granted granted Critical
Publication of CN111586002B publication Critical patent/CN111586002B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0282Rating or review of business operators or products
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/52Network services specially adapted for the location of the user terminal
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/02Services making use of location information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W4/00Services specially adapted for wireless communication networks; Facilities therefor
    • H04W4/06Selective distribution of broadcast services, e.g. multimedia broadcast multicast service [MBMS]; Services to user groups; One-way selective calling services

Abstract

The application discloses a comment identification method based on a block chain, access equipment and a comment system, wherein the method comprises the following steps: receiving a first broadcast message, wherein the first broadcast message is broadcast by a user terminal in a block chain; if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic. The phenomenon of false comments in places such as restaurants or scenic spots is avoided, the condition of a water army which swipes a comment on a bill is greatly reduced, the authenticity of the comments is improved, the benefits of consumers are guaranteed, and the user experience is improved.

Description

Comment identification method based on block chain, access device and comment system
Technical Field
The application belongs to the technical field of communication, and particularly relates to a comment identification method based on a block chain, access equipment and a comment system.
Background
Although review functions are started to be introduced from various domestic tourism websites, the quality of the tourism websites is uneven due to various reasons. The development and application of the network enable any netizen to become a medium, and have strong vitality and dissemination, and public praise dissemination of the netizen can even influence or change consumption decisions of other people. Particularly in the online tourism industry, the strength of public praise is remarkable. Whether the scenic spot is good, whether the hotel is comfortable, whether the traffic is convenient or not, and the comment of others is opened to be known at a glance. The quality of the comments directly influences the selection of the tourism products by the users and even surpasses the traditional advertising.
Although review functions are started to be introduced from various domestic tourism websites, the quality of the tourism websites is uneven due to various reasons. And places such as many restaurants or scenic spots, etc. are good at themselves by the water army for counterfeiting, so that the consumers are deceived and the interests of the consumers are damaged in order to rank the place ahead. Meanwhile, people miss other better choices.
The industry indicates that the order and the amount of the orders brushed can influence the decision of the consumers, more businesses are won, and the platform can also provide good-looking data for investors, so that data counterfeiting becomes a big problem of the industry, even a plurality of 'latent rules' of comment websites. And the data counterfeiting cost is low, for example, 1 ten thousand video clicks can be bought by 2 yuan, meanwhile, the responsibility tracing cost is very high, and a video website complains and flushes companies, and 9.5 hundred million times of counterfeiting are replaced by 50 yuan of compensation.
Disclosure of Invention
The application provides a comment identification method, access equipment and a comment system based on a block chain, aiming at the problem that places such as many restaurants or scenic spots are good for the users to review by water army.
As a first aspect of the present application, there is provided a comment identification method based on a blockchain, including:
receiving a first broadcast message, wherein the first broadcast message is broadcast by a user terminal in a block chain;
if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic.
Preferably, the device is a non-terminal device, and the access device information includes an access device identifier.
Preferably, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device.
As a second aspect of the present application, there is provided a comment identification method based on a blockchain, including:
receiving a second broadcast message, wherein the second broadcast message is broadcast by an access device in a block chain;
acquiring access equipment information and comment information in the second broadcast message, and judging the authenticity of the comment information according to the access equipment information;
and if the comment information is real, issuing the comment information.
Preferably, the accessing device includes a terminal device as a hotspot, the accessing device information includes a location of the accessing device, and the determining the authenticity of the comment information according to the accessing device information includes:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
before the obtaining of the access device information and the comment information in the second broadcast message, the method includes:
determining a node identification of an access device broadcasting the second broadcast message;
acquiring a public key according to the node identifier of the access equipment;
and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
As a third aspect of the present application, there is provided an access device, including:
a receiving module, configured to receive a first broadcast message, where the first broadcast message is broadcast by a user equipment in a block chain;
and the broadcasting module is used for broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in the block chain if the first broadcast message comprises the comment information and the equipment is the access equipment, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be real.
As a fourth aspect of the present application, there is provided a comment system including:
a receiving module, configured to receive a second broadcast message, where the second broadcast message is broadcast by an access device in a block chain;
the first acquisition module is used for acquiring the access equipment information and the comment information in the second broadcast message;
the judging module is used for judging the authenticity of the comment information according to the access equipment information;
and the publishing module is used for publishing the comment information if the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
J in the block chain receives a first broadcast message of user terminal wide access equipment in the block chain, and if the first broadcast message comprises comment information and the equipment is access equipment, a second broadcast message carrying the comment information and the access equipment information of the access equipment is broadcast in the block chain. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
Drawings
Fig. 1 is a flowchart of a comment identification method based on a blockchain according to a first embodiment of the present application;
fig. 2 is a flowchart of a comment identification method based on a blockchain according to a second embodiment of the present application;
fig. 3 is a schematic structural diagram of an access device according to a third embodiment of the present application;
fig. 4 is a schematic structural diagram of a comment system provided in a fourth embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present invention better understood, the present invention will be described in further detail with reference to the accompanying drawings and specific embodiments.
The application provides a comment identification method based on a block chain, access equipment and a comment system. The following detailed description is made with reference to the drawings of the embodiments provided in the present application, respectively.
For ease of understanding, the block link points in this application will be briefly described. The method comprises three block chain nodes, wherein the first type is a user terminal, the first type is access equipment, and the third type is a comment system. The access device comprises a non-terminal device or a terminal device as a hotspot. Non-end devices include Optical modems (i.e., ONT nodes, Optical Network Termination Optical Network terminals) or modems or ADSL modems (Asymmetric Digital Subscriber Line).
As a first embodiment of the present application, a comment identification method based on a block chain is provided. The execution subject of the comment identification method based on the block chain is the access equipment. As shown in fig. 1, the comment identification method based on a blockchain includes the following steps.
Step 101, receiving a first broadcast message.
In this step, an access device in the blockchain receives a first broadcast message. The first broadcast message is broadcast by a user terminal in a block chain. A user inputs own comment information on a user terminal, and then the user terminal broadcasts a first broadcast message and the like carrying the comment information to a block chain network.
Step 102, if the first broadcast message includes comment information and the device is an access device, broadcasting a second broadcast message carrying the comment information and access device information of the access device in a block chain, so that a comment system can judge the authenticity of the comment information according to the access device information and issue the comment information when the comment information is confirmed to be authentic.
In this step, if the user is approaching a scene area with a fixed geographic location, such as a restaurant, the user terminal is connected to the access device near the fixed geographic location, and the access device is provided with a comment information detection module. When the comment information detection module detects that the user sends comment information to the Internet through the comment information detection module, the access equipment packages the comment information and the access equipment information into a second broadcast message, and then broadcasts the second broadcast message into the block chain network in a private key signature mode. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic.
It should be noted that, preferably, the second broadcast message further includes a user terminal identifier.
The application provides a comment identification method based on a block chain, wherein access equipment in the block chain receives a first broadcast message broadcasted by a user terminal in the block chain, and if the first broadcast message comprises comment information and the equipment is the access equipment, a second broadcast message carrying the comment information and the access equipment information of the access equipment is broadcasted in the block chain. And enabling a comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is authentic. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
In some embodiments, the device is a non-terminal device, and the access device information includes an access device identifier. When the access device is a non-terminal device, that is, when the access device is an optical modem or an ADSL modem, the optical modem or ADSL modem packages the comment information and the access device identifier into a second broadcast message, and then broadcasts the second broadcast message to the block chain network in a private key signature mode.
In some embodiments, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device. When the access device is a terminal device serving as a hotspot, the terminal device serving as the hotspot packages the comment information and the position of the access device into a second broadcast message, and then broadcasts the comment information and the position of the access device into the blockchain network in a mode of a broadcast message signed by a private key. Here the location of the access device is latitude and longitude information.
As a second embodiment of the present application, a comment identification method based on a block chain is provided. The execution subject of the comment identification method based on the block chain is a comment system. As shown in fig. 2, the comment identification method based on a blockchain includes the following steps.
Step 201, receiving a second broadcast message.
In this step, the review system in the blockchain receives a second broadcast message. The second broadcast message is broadcast by an access device in a block chain.
Step 202, obtaining the access device information and the comment information in the second broadcast message.
In this step, the comment system in the block chain acquires the access device information and the comment information in the second broadcast message according to the node identifier of the access device that broadcasts the second broadcast message.
And step 203, judging the authenticity of the comment information according to the access equipment information.
In this step, the comment system in the block chain judges the authenticity of the comment information according to the access device information, that is, judges whether the comment information is a real comment of the user.
And step 204, if the comment information is true, the comment information is issued.
In this step, if the comment information is real, the comment is made by a real user, and the comment is not made by virtual physical location information or virtual positioning. The comment system publishes the comment information to a website corresponding to the comment system.
The application provides a comment identification method based on a block chain. And enabling the comment system in the block chain to acquire the access equipment information and the comment information in the second broadcast message, judging the authenticity of the comment information according to the access equipment information, and issuing the comment information if the comment information is true. The situation that the user terminal can perform the bill-swiping operation if the user terminal does not go to places such as restaurants or scenic spots for commenting at all or the user terminal forges the physical position of the user terminal through a virtual positioning mode is avoided, the phenomenon of false comment of the places such as the restaurants or the scenic spots is avoided, the situation of the water army for swiping a bill for commenting is greatly reduced, the authenticity of the comment is improved, the benefit of a consumer is guaranteed, and the user experience is improved.
In some embodiments, the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the authenticity of the comment information is determined according to the access device information (i.e., step 203), including: determining the position of the comment object according to the comment information; and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
In this step, when the access device is a terminal device serving as a hotspot, the comment system acquires the position and comment information of the terminal device serving as the hotspot in the second broadcast message. The comment system determines the position of the comment object according to the comment information, namely determines the position of the restaurant or the scenic spot, compares the position of the comment object with the position of the terminal device serving as the hotspot, and determines that the comment information is real, namely the comment information is a real user comment, but not a virtual physical position information or a virtual positioning mode for comment if the distance between the position of the comment object and the position of the terminal device serving as the hotspot is smaller than a preset threshold value.
In some embodiments, the accessing device includes a non-terminal device, the accessing device information includes an accessing device identifier, and the determining the authenticity of the comment information according to the accessing device information (i.e. step 203) includes: determining the position of the comment object according to the comment information; determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment; and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
In the initial stage, the device identification of the optical modem or ADSL modem and the physical location of the optical modem are recorded in a corresponding relationship at the beginning of the transaction, and need to be stored in the review system in advance and updated in real time. Preferably, the review system also prestores the user terminal identification and the identification of the optical modem or ADSL modem to which the user terminal has been connected.
In this step, when the access device is a non-terminal device, that is, the optical modem or ADSL modem, the review system obtains the access device identifier and the review information of the optical modem or ADSL modem in the second broadcast message. The comment system inquires the position of the optical modem or ADSL cat or modem stored before the access equipment identification of the optical modem or ADSL cat or modem, and meanwhile, the comment system determines the position of a comment object according to the comment information, namely determines the position of a restaurant or an attraction. The comment system compares the position of the comment object with the position of the optical modem or the ADSL cat or the modem, and if the distance between the position of the comment object and the position of the optical modem or the ADSL cat or the modem is smaller than a preset threshold value, the comment information is determined to be real, namely the comment information is real, and the comment information is not virtual physical position information or is commented in a virtual positioning mode.
It should be noted that, when the second broadcast message carries the user terminal identifier, the second broadcast message may not carry the access device identifier of the optical modem or ADSL modem, and the access device identifier of the optical modem or ADSL modem may be determined by querying the identifier of the optical modem or ADSL modem connected to the user terminal identifier stored in advance in the comment system.
In some embodiments, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key; before the obtaining the access device information and the comment information in the second broadcast message (i.e. step 202), the method includes: determining a node identification of an access device broadcasting the second broadcast message; acquiring a public key according to the node identifier of the access equipment; and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
In this step, after receiving the second broadcast information, the comment system in the blockchain determines a node identifier of an access device that broadcasts the second broadcast information, queries a blockchain book according to the node identifier, finds a public key corresponding to the access device, verifies a private key signature of the second broadcast information using the public key, and acquires comment information and access device information in the second broadcast information after the verification is passed.
As a third embodiment of the present application, there is provided an access device, as shown in fig. 3, including a receiving module 11 and a broadcasting module 12. The access device provided by the application is used for executing the comment identification method based on the block chain provided by the first embodiment of the application. The method comprises the following specific steps:
a receiving module 11, configured to receive a first broadcast message, where the first broadcast message is broadcast by a user equipment in a block chain.
The broadcasting module 12 is configured to broadcast a second broadcast message carrying the comment information and access device information of the access device in the blockchain if the first broadcast message includes the comment information and the device is an access device, so that the comment system determines authenticity of the comment information according to the access device information and issues the comment information when it is determined that the comment information is authentic.
Preferably, the device is a non-terminal device, and the access device information includes an access device identifier.
Preferably, the device is a terminal device serving as a hotspot, and the access device information includes a location of the access device.
As a fourth embodiment of the present application, there is provided a comment system, as shown in fig. 4, including a receiving module 21, a first acquiring module 22, a judging module 23, and a posting module 24. The comment system provided by the application is used for executing the comment identification method based on the block chain provided by the second embodiment of the application. The method comprises the following specific steps:
a receiving module 21, configured to receive a second broadcast message, where the second broadcast message is broadcast by an access device in a block chain;
a first obtaining module 22, configured to obtain access device information and comment information in the second broadcast message;
the judging module 23 is configured to judge authenticity of the comment information according to the access device information;
and the publishing module 23 is configured to publish the comment information if the comment information is real.
Preferably, the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the determining module 23 is configured to:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining module 23 is configured to:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
Preferably, the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. A comment identification method based on a block chain is characterized in that the method is applied to access equipment; the method comprises the following steps:
receiving a first broadcast message, wherein the first broadcast message is information broadcasted by a user terminal in a block chain to a block chain network;
if the first broadcast message comprises comment information and the equipment is access equipment, broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be authentic; the access device and the comment system are both nodes of a block chain network.
2. The comment recognition method based on the blockchain according to claim 1, wherein the device is a non-terminal device, and the access device information includes an access device identifier.
3. The comment identification method based on the blockchain according to claim 1, wherein the device is a terminal device that is a hotspot, and the access device information includes a location of the access device.
4. A comment identification method based on a block chain is characterized in that the method is applied to a comment system; the method comprises the following steps:
receiving a second broadcast message, wherein the second broadcast message is information broadcasted by an access device in a block chain after receiving first broadcast information broadcasted by a user terminal to a block chain network and the first broadcast message comprises comment information; the access equipment and the comment system are both nodes of a block chain network;
acquiring access equipment information and comment information in the second broadcast message, and judging the authenticity of the comment information according to the access equipment information;
and if the comment information is real, issuing the comment information.
5. The comment identification method based on the blockchain according to claim 4, wherein the access device includes a terminal device as a hotspot, the access device information includes a location of the access device, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
6. The comment recognition method based on the blockchain according to claim 4, wherein the access device includes a non-terminal device, the access device information includes an access device identifier, and the determining the authenticity of the comment information according to the access device information includes:
determining the position of a comment object according to the comment information;
determining the position of the access equipment according to the access equipment identification and the corresponding relation between the locally stored equipment identification of the access equipment and the position of the access equipment;
and if the distance between the position of the comment object and the position of the access equipment is smaller than a preset threshold value, determining that the comment information is real.
7. The comment identification method based on the blockchain according to claim 4, wherein the second broadcast message is sent after the access device signs the comment information and the access device information by using a private key;
before the obtaining of the access device information and the comment information in the second broadcast message, the method includes:
determining a node identification of an access device broadcasting the second broadcast message;
acquiring a public key according to the node identifier of the access equipment;
and verifying the signature according to the public key, and if the signature passes the verification, acquiring the comment information and the access equipment information in the second broadcast message.
8. An access device, comprising:
a receiving module, configured to receive a first broadcast message, where the first broadcast message is information broadcasted by a user terminal in a blockchain to a blockchain network;
the broadcasting module is used for broadcasting a second broadcast message carrying the comment information and the access equipment information of the access equipment in a block chain if the first broadcast message comprises the comment information and the equipment is the access equipment, so that a comment system can judge the authenticity of the comment information according to the access equipment information and issue the comment information when the comment information is confirmed to be real; the access device and the comment system are both nodes of a block chain network.
9. A review system, comprising:
the receiving module is used for receiving a second broadcast message, wherein the second broadcast message is information which is broadcasted after the access equipment in the block chain broadcasts the first broadcast information to the block chain network by the receiving user terminal and the comment information is included in the first broadcast message; the access equipment and the comment system are both nodes of a block chain network;
the first acquisition module is used for acquiring the access equipment information and the comment information in the second broadcast message;
the judging module is used for judging the authenticity of the comment information according to the access equipment information;
and the publishing module is used for publishing the comment information if the comment information is real.
10. The review system of claim 9 wherein the second broadcast message is sent by the access device after signing the review information and the access device information with a private key;
the comment system further comprises:
a determining module, configured to determine a node identifier of an access device that broadcasts the second broadcast message;
a second obtaining module, configured to obtain a public key according to the node identifier of the access device;
and the verification module is used for verifying the signature according to the public key, and acquiring the comment information and the access equipment information in the second broadcast message if the signature passes the verification.
CN202010352112.9A 2020-04-28 2020-04-28 Comment identification method based on block chain, access device and comment system Active CN111586002B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010352112.9A CN111586002B (en) 2020-04-28 2020-04-28 Comment identification method based on block chain, access device and comment system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010352112.9A CN111586002B (en) 2020-04-28 2020-04-28 Comment identification method based on block chain, access device and comment system

Publications (2)

Publication Number Publication Date
CN111586002A CN111586002A (en) 2020-08-25
CN111586002B true CN111586002B (en) 2022-04-15

Family

ID=72111726

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010352112.9A Active CN111586002B (en) 2020-04-28 2020-04-28 Comment identification method based on block chain, access device and comment system

Country Status (1)

Country Link
CN (1) CN111586002B (en)

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10171476B2 (en) * 2015-01-12 2019-01-01 Sal Khan System and method for protecting the privacy of identity and financial information of the consumer conducting online business
US10217078B1 (en) * 2017-05-31 2019-02-26 Elliot Klein Blockchain system and method for calculating location of time-crucial shipments according to expectation and smart contracts
CN108242017A (en) * 2018-02-07 2018-07-03 杭州蜜迩科技有限公司 A kind of location-based comment interaction systems and method
CN109657450B (en) * 2018-12-14 2021-04-16 泰康保险集团股份有限公司 Method, device, medium, and electronic device for evaluation based on block chain
CN110602248B (en) * 2019-09-27 2020-08-11 腾讯科技(深圳)有限公司 Abnormal behavior information identification method, system, device, equipment and medium
CN110597841B (en) * 2019-09-29 2021-09-14 腾讯科技(深圳)有限公司 Application comment information processing method and device based on block chain network
CN110765490A (en) * 2019-10-31 2020-02-07 北京海益同展信息科技有限公司 Method and apparatus for processing information
CN110909381A (en) * 2019-11-12 2020-03-24 北京芯际科技有限公司 Block chain-based user comment tamper-proof system and method

Also Published As

Publication number Publication date
CN111586002A (en) 2020-08-25

Similar Documents

Publication Publication Date Title
US20170286539A1 (en) User profile stitching
CN100390823C (en) Selective media stream advertising technique
CN105225027A (en) Customer allocation method and system
CN101499156A (en) Advertisement issuance control method and apparatus based on multi-advertisement information issuing apparatus
TWI599212B (en) System and method for providing information of outgoing call
CN109741482A (en) A kind of information sharing method and device
SE0201315D0 (en) A method and system of rating in a charging system
CN109919726A (en) A kind of business system
Brown An assessment of the proportionality of regulation of ‘over the top’communications services under Europe's common regulatory framework for electronic communications networks and services
CN104616170A (en) Interactive method and electronic equipment
CN104540114A (en) Methods, terminal, server and system used for recognizing opposite terminal identity
CN101499077A (en) Control device and method for issuing information according to carrier content category message
CN111586002B (en) Comment identification method based on block chain, access device and comment system
CN111556152B (en) Comment identification method based on block chain, base station and evaluation system
KR102197695B1 (en) System for managing commercial use of contents copyright and method thereof
EP1846810A2 (en) Method and system for providing customized recommendations to users
KR20050095402A (en) Location-based internet advertising service system and method thereof
CN105787789A (en) Method and apparatus for displaying currency exchange rate
CN111651209A (en) Method and device for determining guide page
WO2016026309A1 (en) Comment message processing method and apparatus
KR101254078B1 (en) Advertising System Using SNS Message Output
KR20090030690A (en) Method and system for providing the language exchange service using user created contents
CN111415105B (en) Comment verification method, node, population thermodynamic diagram data node and management system
CN102419850A (en) Control method for sending advertisement according to idle degrees of users
CN108596680A (en) A kind of method for pushing based on block chain price

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant