CN111695154A - Information verification method and device based on block chain - Google Patents

Information verification method and device based on block chain Download PDF

Info

Publication number
CN111695154A
CN111695154A CN202010523562.XA CN202010523562A CN111695154A CN 111695154 A CN111695154 A CN 111695154A CN 202010523562 A CN202010523562 A CN 202010523562A CN 111695154 A CN111695154 A CN 111695154A
Authority
CN
China
Prior art keywords
information
verified
node
trusted
trusted node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010523562.XA
Other languages
Chinese (zh)
Other versions
CN111695154B (en
Inventor
郝芸霞
饶光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN202010523562.XA priority Critical patent/CN111695154B/en
Publication of CN111695154A publication Critical patent/CN111695154A/en
Application granted granted Critical
Publication of CN111695154B publication Critical patent/CN111695154B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/24Classification techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Artificial Intelligence (AREA)
  • Accounting & Taxation (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Databases & Information Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Finance (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Storage Device Security (AREA)

Abstract

The invention provides an information verification method and device based on a block chain, wherein the method comprises the following steps: the first trusted node receives the information to be verified and acquires a classification label corresponding to the information to be verified; the method comprises the steps that a first trusted node inquires whether a trusted node corresponding to a classification label exists in a block chain network in a preset database of the first trusted node; the first trusted node receives the verification result of the encrypted information to be verified issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates the final verification result of the information to be verified. The method and the device solve the problems that the masses and the third party cannot trace the verification process of the information in the existing verification method, and the masses and the third party cannot obtain the final verification result when different platforms have different verification results.

Description

Information verification method and device based on block chain
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an information verification method and apparatus based on a block chain.
Background
Various kinds of information often appear on the network, some are correct information, and some are wrong information. The wrong information, namely rumors, can cause negative effects if the rumors are forwarded in a dispute. In order to verify whether network information is true or not, many platforms have an anti-ballad function, which is generally to verify information by manually confirming the information by an authoritative expert or institution, but the verification method makes the masses and third parties unable to trace back the verification process of the information, and different platforms have different verification results, and the masses and third parties cannot obtain the final verification result.
Disclosure of Invention
The technical problem to be solved by the present invention is to provide an information verification method and apparatus based on a block chain, so as to solve the problems that in the existing verification method, people and third parties cannot trace back the verification process of information, and when different platforms have different verification results, people and third parties cannot obtain the final verification result.
In a first aspect, an embodiment of the present invention provides an information verification method based on a block chain, where the method includes:
the first trusted node receives the information to be verified and acquires a classification label corresponding to the information to be verified;
the first trusted node inquires whether a trusted node corresponding to the classification label exists in a block chain network in a preset database of the first trusted node, wherein the preset database comprises node identifications, classification label sets and public keys of all trusted nodes in the block chain network;
if the trusted node corresponding to the classification label exists, the first trusted node encrypts the information to be verified and the classification label by adopting a public key of the trusted node corresponding to the classification label, and issues the encrypted information to be verified and the encrypted classification label to a blockchain network;
and the first trusted node receives the encrypted verification result of the information to be verified issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result and generates the final verification result of the information to be verified.
Preferably, after the first trusted node queries whether a trusted node corresponding to the classification tag exists in a blockchain network in a preset database of the first trusted node, the method further includes:
and if the credible node corresponding to the classification label does not exist, the first credible node respectively encrypts the information to be verified and the classification label by adopting public keys of all credible nodes in the block chain network, and issues the encrypted information to be verified and the encrypted classification label to the block chain network.
Preferably, before the step of receiving, by the first trusted node, information to be verified and acquiring a classification tag corresponding to the information to be verified, the method further includes:
the method comprises the steps that a demand node crawls network information with high transfer quantity in preset time from the internet as to-be-verified information, and the to-be-verified information is sent to a first credible node;
the method for acquiring the classification label corresponding to the information to be verified by the first trusted node includes:
the first trusted node receives information to be verified sent by the demand node;
the first trusted node carries out semantic classification on the information to be verified to obtain a classification label;
after the first trusted node generates the final verification result of the information to be verified, the method further includes:
and the first trusted node sends the final verification result of the information to be verified to the demand node.
Preferably, the method for the demand node to crawl the network information with a higher transfer quantity within a preset time from the internet as the information to be verified and send the information to be verified to the first trusted node includes:
the demand node crawls network information in preset time from the Internet, wherein the network information comprises title information, text information and URL information;
the demand node extracts the network information which has the same title information and text information and corresponds to different URL information from the network information, the network information of which the occurrence frequency is greater than a preset threshold value is used as the information to be verified, and the information to be verified comprises the title information and the text information;
the demand node sends the information to be verified to the first trusted node;
the semantic classification of the information to be verified is carried out by the first trusted node to obtain a classification label, and the classification label comprises the following steps:
the first trusted node extracts one or more key words in the header information;
the first trusted node carries out semantic classification on the one or more key words to obtain a classification label;
the first trusted node queries whether a trusted node corresponding to the classification tag exists in a block chain network in a preset database of the first trusted node, and the method comprises the following steps:
the first trusted node inquires whether a classification label set corresponding to each node identification contains the classification label or not in a preset database of the first trusted node;
and if the classification label set corresponding to the node identification contains the classification label, determining the node corresponding to the node identification as a credible node corresponding to the classification label.
Preferably, if there is a trusted node corresponding to the classification tag, the first trusted node encrypts the to-be-verified information and the classification tag by using a public key of the trusted node corresponding to the classification tag, and issues the encrypted to-be-verified information and the encrypted classification tag to the blockchain network, including:
if a trusted node corresponding to the classification label exists, the first trusted node queries a public key corresponding to the trusted node in the preset database;
the first trusted node encrypts the information to be verified and the classification label by adopting a public key corresponding to the trusted node;
the first credible node respectively issues the encrypted information to be verified and the encrypted classification labels to the block chain network, the encrypted information to be verified and the encrypted classification labels are used for triggering the credible node to decrypt the information to be verified and the classification labels by using a private key, then the information to be verified is verified, a verification result, the information to be verified and the classification labels are generated into an HASH summary, and the HASH summary, the verification result, the information to be verified and the classification labels are issued to the block chain network.
Preferably, if there is no trusted node corresponding to the classification tag, the first trusted node encrypts the to-be-verified information and the classification tag respectively by using public keys of all trusted nodes in the blockchain network, and issues the encrypted to-be-verified information and the encrypted classification tag to the blockchain network, including:
if the trusted node corresponding to the classification label does not exist, the first trusted node queries public keys corresponding to all trusted nodes in the block chain network in the preset database;
the first trusted node respectively encrypts the information to be verified and the classification labels by adopting public keys corresponding to all the trusted nodes;
the first trusted node respectively issues the encrypted information to be verified and the encrypted classification label to the blockchain network, the encrypted information to be verified and the encrypted classification label are used for triggering each trusted node in the blockchain network to decrypt the information to be verified and the classification label by using a respective private key, determining whether the information to be verified can be verified, verifying the information to be verified under the condition that the information to be verified can be verified, generating a HASH summary by using a verification result, the information to be verified and the classification label, and simultaneously issuing the HASH summary, the verification result, the information to be verified and the classification label to the blockchain network.
Preferably, the receiving, by the first trusted node, the encrypted verification result of the to-be-verified information issued in the blockchain network, decrypting the verification result, and performing comprehensive judgment on the decrypted verification result to generate a final verification result of the to-be-verified information includes:
the first trusted node receives the HASH summary, a verification result, information to be verified and classification labels sent by one or more trusted nodes in a block chain network;
the first trusted node performs HASH processing on the verification result, the information to be verified and the classification label, compares the result after the HASH processing with the HASH abstract, and judges whether the verification result, the information to be verified and the classification label are tampered;
if the verification result, the information to be verified and the classification label are not tampered, the first trusted node inquires weight information corresponding to the one or more trusted nodes in a preset database, comprehensive judgment is carried out according to the weight information and the verification result, and a final verification result of the information to be verified is generated.
Preferably, after the first trusted node issues the encrypted information to be verified and the classification label to the blockchain network, the method further includes:
the trusted node which verifies the information to be verified issues the encrypted verification result of the information to be verified, the node identification and the classification label to the blockchain network;
and all the trusted nodes in the blockchain network decrypt the verification result, the node identification and the classification label of the encrypted information to be verified issued to the blockchain network, and update the preset database of the trusted nodes according to the decrypted node identification and the classification label.
Preferably, after the step of generating the final verification result of the information to be verified by the first trusted node, the method further includes:
the preset database also comprises the weights of all the credible nodes in the block chain network;
the first trusted node issues the final verification result of the encrypted information to be verified to the block chain network;
and all the trusted nodes in the block chain network increase the weight information corresponding to the trusted nodes with the same verification result as the final verification result by 1 in a preset database of the trusted nodes.
In a second aspect, an embodiment of the present invention provides an information verification apparatus based on a block chain, where the apparatus is applied to a first trusted node, and the apparatus includes:
the classification acquisition module is used for receiving the information to be verified and acquiring a classification label corresponding to the information to be verified;
a node query module, configured to query whether a trusted node corresponding to the classification tag exists in a blockchain network in a preset database, where the preset database includes node identifiers, a classification tag set, and a public key of all trusted nodes in the blockchain network;
the first sending module is used for encrypting the information to be verified and the classification label by adopting a public key of the trusted node corresponding to the classification label when the trusted node corresponding to the classification label exists, and issuing the encrypted information to be verified and the encrypted classification label to the blockchain network;
and the comprehensive judgment module is used for receiving the encrypted verification result of the information to be verified issued in the block chain network, decrypting the verification result, comprehensively judging the decrypted verification result and generating the final verification result of the information to be verified.
According to the information verification method and device based on the block chain, provided by the embodiment of the invention, the information to be verified is received through the first trusted node, the classification label corresponding to the information to be verified is obtained, and the first trusted node inquires whether the trusted node corresponding to the classification label exists in the block chain network in a preset database of the first trusted node, so that the information to be verified can be quickly mapped into one or more trusted nodes with verification function on the verification information in the block chain network; meanwhile, the first trusted node receives the encrypted verification result of the to-be-verified information issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates a final verification result of the to-be-verified information. In addition, the problem that the verification process of the information cannot be traced by the masses and third parties in the existing verification method is solved through the information verification based on the block chain.
Drawings
FIG. 1: a flow chart of an information verification method based on a block chain in embodiment 1 of the present invention;
FIG. 2: a block chain-based information verification apparatus according to embodiment 2 of the present invention;
FIG. 3: a block chain-based information verification apparatus according to embodiment 3 of the present invention is a configuration diagram.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," "third," "fourth," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Example 1:
as shown in fig. 1, the present embodiment provides an information verification method based on a block chain, which includes the following steps:
step S102: the first trusted node receives the information to be verified and acquires a classification label corresponding to the information to be verified;
it should be noted that the first trusted node is any one trusted node in the blockchain network, the blockchain network is composed of a plurality of trusted nodes, and the trusted node may be an official agency, an authenticated expert, a network large V verified by real names, and the like. Each credible node has the verification function of verification information corresponding to one or more classification labels, and the classification labels can be politics, economy, livelihood, epidemic situation, life, science and technology, medical treatment, education, media, entertainment and the like.
Alternatively, in step S102: before the step of receiving, by the first trusted node, the information to be verified and obtaining the classification label corresponding to the information to be verified, the method may further include:
the method comprises the steps that a demand node crawls network information with high transfer quantity in preset time from the internet as to-be-verified information, and the to-be-verified information is sent to a first credible node;
the demand node may be a rumor-seeking organization, and is responsible for crawling the network information with a high reprinting quantity from the internet periodically as the information to be verified, and sending the information to be verified to any trusted node in the blockchain network through the blockchain API interface, such as the first trusted node.
Specifically, the demand node crawls network information in preset time from the Internet, wherein the network information comprises title information, text information and URL information;
the method comprises the steps that a demand node extracts network information which is provided with same header information and text information and corresponds to different URL information from the network information, the network information with the occurrence frequency larger than a preset threshold value serves as information to be verified, and the information to be verified comprises the header information and the text information;
and the demand node sends the information to be verified to the first trusted node.
Optionally, the obtaining, by the first trusted node, the classification label corresponding to the information to be verified includes:
a first trusted node receives information to be verified sent by a demand node;
the first trusted node carries out semantic classification on the information to be verified to obtain a classification label;
specifically, the first trusted node extracts one or more key words in the header information;
the method comprises the steps that a first trusted node carries out semantic classification on one or more key words to obtain a classification label;
for example, the first trusted node crawls network information with a high number of reprints in the last week from the internet as to-be-verified information, and the contents are as follows:
title: weight scale! SHUANGHUANGLIAN oral liquid for inhibiting new coronavirus
The text content is as follows: the journalist 31 days ago known from the Shanghai medicine of Chinese academy of sciences, and the research preliminarily finds that the Chinese patent medicine Shuanghuanglian oral liquid can inhibit the novel coronavirus. At present, the Shanghai medicament institute starts an emergency attack team for anti-novel coronavirus infection pneumonia medicament, which is led by Jianghua universities, and focuses on screening and evaluation of new treatment candidate drugs and new application research of old drugs aiming at the virus on the basis of early-stage SARS related research and medicament discovery results.
The first trusted node extracts keywords from the header information: the first credible node generates a classification label as epidemic situation through semantic analysis according to the keywords.
Step S104: the method comprises the steps that a first trusted node inquires whether a trusted node corresponding to a classification label exists in a block chain network in a preset database of the first trusted node;
the preset database comprises node identifications, classification label sets, public keys and weight information of all trusted nodes in the block chain network.
It should be noted that, all trusted nodes in the blockchain network include their own preset databases, in the initial state, each trusted node presets a partial classification tag initial value according to the previously grasped blockchain network node data, a partial classification tag set of trusted nodes without grasping information may be empty, the weights of the node rights are consistent, and the default may be 1, wherein each trusted node grasps at least its classification tag set, for example, the preset database initial state of the first trusted node a may include information as shown in table 1, the first trusted node a sets its classification tag set "political and economic", then presets a partial classification tag initial value in the classification tag set according to the previously grasped information of the trusted nodes B and C, because the first trusted node a has no information grasped in advance for the trusted node D, thus, the set of classification tags is empty.
Table 1:
node identification Classification tag set Public key Weight information
A Politics and economy abcdefg 1
B Epidemic situation and life egfewefa 1
C Epidemic situation dbcfefg 1
D NULL kgfemefa 1
In this embodiment, when a trusted node joins the blockchain network, the respective public key is broadcast to the blockchain network, so that other trusted nodes in the blockchain network add the node identifier and the public key of the trusted node to the respective preset database, then each node presets the initial value of the classification label of the trusted node according to the information of the trusted node grasped in advance, and if there is no grasped information, the classification label set of the trusted node is set to be NULL, that is, NULL.
Optionally, in step S104, the querying, by the first trusted node, in a preset database of the first trusted node, whether a trusted node corresponding to the classification tag exists in the block chain network may include:
the method comprises the steps that a first credible node inquires whether a classification label set corresponding to each node identification contains a classification label in a preset database of the first credible node;
and if the classification label set corresponding to the node identification contains the classification label, determining the node corresponding to the node identification as a credible node corresponding to the classification label. The number of the credible nodes corresponding to the classification labels can be one or more.
In this embodiment, it is assumed that the preset database of the first trusted node a is as shown in table 1, when the classification label is "epidemic situation", the first trusted node a queries whether the classification label sets of all trusted nodes in the preset database contain "epidemic situation", and after the query, the obtained classification label sets of the trusted nodes B and C contain "epidemic situation", that is, the trusted nodes B and C are determined as the trusted nodes corresponding to the classification labels.
Alternatively, at step S104: after the step of querying whether the trusted node corresponding to the classification tag exists in the block chain network by the first trusted node in the preset database of the first trusted node, the method may further include:
and if the credible node corresponding to the classification label does not exist, the first credible node encrypts the information to be verified and the classification label respectively by adopting public keys of all credible nodes in the blockchain network, and issues the encrypted information to be verified and the encrypted classification label to the blockchain network.
Specifically, if the trusted node corresponding to the classification label does not exist, the first trusted node queries public keys corresponding to all trusted nodes in the block chain network in a preset database;
the first trusted node respectively encrypts the information to be verified and the classification label by adopting public keys corresponding to all the trusted nodes;
the first credible node respectively issues the encrypted information to be verified and the encrypted classification label to the blockchain network, the encrypted information to be verified and the encrypted classification label are used for triggering each credible node in the blockchain network to decrypt the information to be verified and the classification label by using a respective private key, determining whether the information to be verified can be verified or not, verifying the information to be verified under the condition that the information to be verified can be verified, generating a HASH summary by using the verification result, the information to be verified and the classification label, and simultaneously issuing the HASH summary, the verification result, the information to be verified and the classification label to the blockchain network.
In this embodiment, since the classification labels of other trusted nodes grasped by each trusted node in advance in the initial stage are not perfect, if the trusted node corresponding to the classification label is not queried in the preset database by the first trusted node, the first trusted node sends the classification label and the information to be verified to all trusted nodes in the block chain network. All the trusted nodes acquire the information sent by the first trusted node and decrypt the information with the private keys of the trusted nodes to acquire the information to be verified and the corresponding classification labels. All the trusted nodes inquire whether the classification label set of the respective preset database contains the classification label or not, if so, the information to be verified is determined to be verified, and under the condition that the information to be verified can be verified, the trusted nodes respectively verify whether the content of the information to be verified is correct or not and generate verification results. And meanwhile, generating a HASH summary by the verification result, the information to be verified and the classification label, and issuing the verification result, the information to be verified, the classification label and the HASH summary to the block chain network after being encrypted and signed by a private key of the HASH summary. And if the information to be verified cannot be verified, the trusted node does not verify the information to be verified.
Step S106: if the credible node corresponding to the classification label exists, the first credible node encrypts the information to be verified and the classification label by adopting a public key of the credible node corresponding to the classification label, and issues the encrypted information to be verified and the encrypted classification label to the block chain network;
specifically, if a trusted node corresponding to the classification label exists, the first trusted node queries a public key corresponding to the trusted node in a preset database;
the first credible node encrypts the information to be verified and the classification label by adopting a public key corresponding to the credible node;
the first credible node respectively issues the encrypted information to be verified and the encrypted classification label to the blockchain network, the encrypted information to be verified and the encrypted classification label are used for triggering the credible node to decrypt the information to be verified and the classification label by using a private key, then the information to be verified is verified, a verification result, the information to be verified and the classification label are generated into an HASH summary, and the HASH summary, the verification result, the information to be verified and the classification label are issued to the blockchain network.
Optionally, after the first trusted node issues the encrypted information to be verified and the classification label to the blockchain network, the method may further include:
the trusted node which verifies the information to be verified issues the encrypted verification result of the information to be verified, the node identification and the classification label to the blockchain network;
and all the trusted nodes in the block chain network decrypt the verification result, the node identification and the classification label of the encrypted information to be verified, which is issued to the block chain network, and update the preset database of the trusted nodes according to the decrypted node identification and the classification label.
In this embodiment, in order to improve the reliability of the verification of the information to be verified, so that the verification process of the information to be verified is traceable, the trusted node that verifies the information to be verified issues the encrypted verification result, the node identifier, and the classification tag of the information to be verified to the blockchain network.
In this embodiment, if there are N trusted nodes corresponding to the classification tag, the first trusted node encrypts N times with the public key of each of the N trusted nodes, and issues the encrypted N times to the blockchain network, and the N trusted nodes receive the broadcast with the signature issued by the first trusted node, and decrypt the broadcast with the private key of the first trusted node to obtain the information to be verified and the corresponding classification tag. And the N credible nodes respectively verify whether the information content to be verified is correct and generate verification results. And meanwhile, generating a HASH summary by the verification result, the information to be verified and the classification label, and issuing the verification result, the information to be verified, the classification label and the HASH summary to the block chain network after being encrypted and signed by a private key of the HASH summary. All trusted nodes in the block chain network receive the broadcast with the signature issued by the N trusted nodes, and the public keys of the N trusted nodes are used for decryption to obtain a verification result with the HASH abstract, information to be verified and a classification label. And all the trusted nodes of the block chain network carry out HASH processing on the verification result, the verification result is compared with the HASH abstract, if the verification result is consistent with the HASH abstract, the verification information is confirmed to be correct and not tampered, after the verification is correct, the preset database of the block chain network is dynamically updated according to the signatures of the N nodes, if the classification label set corresponding to the N nodes in the preset database of the block chain network does not contain the classification label, the classification label is added, and if not, the classification label set is not added.
In the embodiment, the classification label sets in the preset databases of all trusted nodes are updated through the actual verification process of the information to be verified at each time, so that the accuracy of the classification labels of all trusted nodes is realized, any trusted node can confirm and share the classification label of the trusted node to the block chain network through the verification process of the information to be verified at one time, and therefore the problem that the classification of the information in the prior art is not accurate enough can be solved, the information to be verified can be classified accurately, and the information to be verified can be verified quickly verified. With continuous acquisition and verification of information to be verified, the preset database classification label set of each trusted node is nearly saturated.
Step S108: the first trusted node receives the verification result of the encrypted information to be verified issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates the final verification result of the information to be verified.
In this embodiment, the verification result is one of correct and incorrect, and the final verification result is one of correct, incorrect and non-verifiable.
Optionally, step S108: the first trusted node receives a verification result of the encrypted to-be-verified information issued in the blockchain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates a final verification result of the to-be-verified information, which may include:
a first trusted node receives HASH abstracts, verification results, information to be verified and classification labels sent by one or more trusted nodes in a block chain network;
the first trusted node performs HASH processing on the verification result, the information to be verified and the classification label, compares the result after the HASH processing with the HASH summary, and judges whether the verification result, the information to be verified and the classification label are tampered;
if the verification result, the information to be verified and the classification label are not tampered, the first trusted node inquires weight information corresponding to one or more trusted nodes in a preset database, comprehensive judgment is carried out according to the weight information and the verification result, and a final verification result of the information to be verified is generated.
In this embodiment, in order to prevent a final verification result from being incorrect due to the fact that the verification result is tampered in the transmission process, the first trusted node firstly judges whether the verification result, the information to be verified and the classification label are tampered before comprehensively judging the verification result, and comprehensively judges the verification result under the condition that the verification result is not tampered.
The final verification result may be the result with the largest number of correct or incorrect times in the verification results. If two verification results are correct and one verification result is wrong, the final verification result is wrong.
Preferably, in order to increase the weight of the trusted node with high weight in the final verification result, comprehensive judgment can be performed according to the weight information and the verification result, so as to generate the final verification result of the information to be verified. The method specifically comprises the following steps: comparing the weight information corresponding to the correct result in the credible node with the weight information corresponding to the error result, and finally verifying that the result is correct if the weight information corresponding to the correct result is more than the weight information corresponding to the error result; if the weight information sum corresponding to the correct result is equal to the weight information sum corresponding to the wrong result, the final verification result is not judged. Assuming that the first trusted node receives the verification results of the trusted nodes B, C and D in the blockchain network, where the verification results are correct, and wrong, respectively, and the respective weight information is 1, and 3, that is, the weight information sum corresponding to the correct result is 2, and the weight information sum corresponding to the wrong result is 3, then the final verification result is wrong.
Optionally, after the step of generating the final verification result of the information to be verified, the first trusted node may further include:
and the first trusted node sends the final verification result of the information to be verified to the demand node.
The first trusted node issues the final verification result of the encrypted information to be verified to the block chain network;
all trusted nodes in the block chain network increase the weight information corresponding to the trusted nodes with the same verification result as the final verification result by 1 in a preset database of the trusted nodes.
In this embodiment, after the first trusted node issues the final verification result of the encrypted to-be-verified information to the blockchain network, all trusted nodes in the blockchain network update their respective preset databases, 1 is added to the weight information of the trusted node having the same verification result as the final verification result in the actual verification process, and the authority of the verification result of the trusted node is measured by the weight information, thereby further ensuring the accuracy of the final verification result.
According to the information verification method based on the block chain, provided by the embodiment of the invention, the information to be verified is received through the first trusted node, the classification label corresponding to the information to be verified is obtained, and the first trusted node inquires whether the trusted node corresponding to the classification label exists in the block chain network in a preset database of the first trusted node, so that the information to be verified can be quickly mapped into one or more trusted nodes with verification function on the verification information in the block chain network; meanwhile, the first trusted node receives the encrypted verification result of the to-be-verified information issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates a final verification result of the to-be-verified information. In addition, the problem that the verification process of the information cannot be traced by the masses and third parties in the existing verification method is solved through the information verification based on the block chain.
Example 2:
as shown in fig. 2, the present embodiment provides an information verification apparatus based on a block chain, which is applied to a first trusted node, and the apparatus includes:
the classification acquisition module 202 is configured to receive information to be verified and acquire a classification label corresponding to the information to be verified;
a node query module 204, connected to the classification acquisition module 202, configured to query whether a trusted node corresponding to the classification tag exists in the blockchain network in a preset database, where the preset database includes node identifiers, classification tag sets, and public keys of all trusted nodes in the blockchain network;
the first publishing module 206 is connected to the node querying module 204, and configured to encrypt the information to be verified and the classification label with the public key of the trusted node corresponding to the classification label when there is a trusted node corresponding to the classification label, and publish the encrypted information to be verified and the encrypted classification label to the blockchain network;
a comprehensive judgment module 208, connected to the first sending module 206, configured to receive a verification result of the encrypted to-be-verified information issued in the blockchain network, decrypt the verification result, perform comprehensive judgment on the decrypted verification result, and generate a final verification result of the to-be-verified information;
optionally, the apparatus may further include:
and a second issuing module, connected to the node querying module 204, configured to, if there is no trusted node corresponding to the classification tag, encrypt, by the first trusted node, the to-be-verified information and the classification tag by using public keys of all trusted nodes in the blockchain network, and issue the encrypted to-be-verified information and the encrypted classification tag to the blockchain network.
Optionally, the apparatus may further include:
the network information acquisition module is used for the demand node to crawl the network information with higher transfer quantity in the preset time from the Internet as the information to be verified and send the information to be verified to the first credible node;
optionally, the classification obtaining module 202 may further include:
the first receiving module is used for the first trusted node to receive the information to be verified, which is sent by the demand node;
the classification label module is used for carrying out semantic classification on the information to be verified by the first trusted node to obtain a classification label;
optionally, the apparatus may further include:
and the first sending module is used for sending the final verification result of the information to be verified to the demand node by the first trusted node.
Optionally, the network information obtaining module may further include:
the crawling module is used for crawling the network information in a preset time from the Internet by the demand node, wherein the network information comprises title information, text information and URL information;
the extraction module is used for extracting the network information which has the same title information and the same text information and corresponds to different URL information from the network information by the demand node, the network information of which the occurrence frequency is greater than a preset threshold value is taken as the information to be verified, and the information to be verified comprises the title information and the text information;
and the second sending module is used for sending the information to be verified to the first trusted node by the demand node.
Optionally, the classification label module may further include:
the key word extracting module is used for extracting one or more key words in the header information by the first credible node;
the semantic classification module is used for performing semantic classification on the one or more key words by the first trusted node to obtain a classification label;
optionally, the node querying module 204 may further include:
the first query module is used for the first trusted node to query whether the classification label set corresponding to each node identifier contains the classification label in a preset database of the first trusted node;
and the trusted node determining module is used for determining the node corresponding to the node identifier as the trusted node corresponding to the classification label if the classification label set corresponding to the node identifier contains the classification label.
Optionally, the first distribution module 206 may further include:
the first processing module is used for inquiring a public key corresponding to the trusted node in the preset database by the first trusted node if the trusted node corresponding to the classification label exists;
the second processing module is used for encrypting the information to be verified and the classification label by the first trusted node by adopting a public key corresponding to the trusted node;
the third processing module is used for the first trusted node to respectively issue the encrypted information to be verified and the encrypted classification label to the blockchain network, the encrypted information to be verified and the encrypted classification label are used for triggering the trusted node to decrypt the information to be verified and the classification label by using a private key, then verifying the information to be verified, generating a HASH abstract by using a verification result, the information to be verified and the classification label, and simultaneously issuing the HASH abstract, the verification result, the information to be verified and the classification label to the blockchain network.
Optionally, the second publishing module may further include:
the fourth processing module is configured to, if there is no trusted node corresponding to the classification tag, query, by the first trusted node, public keys corresponding to all trusted nodes in the block chain network in the preset database;
a fifth processing module, configured to encrypt, by the first trusted node, the to-be-verified information and the classification label by using the public keys corresponding to all trusted nodes, respectively;
the sixth processing module is used for the first trusted node to respectively issue the encrypted information to be verified and the encrypted classification tag to the blockchain network, the encrypted information to be verified and the encrypted classification tag are used for triggering each trusted node in the blockchain network to decrypt the information to be verified and the classification tag by using a respective private key, determining whether the information to be verified can be verified, verifying the information to be verified under the condition that the information to be verified can be verified, generating a HASH digest by using a verification result, the information to be verified and the classification tag, and simultaneously issuing the HASH digest, the verification result, the information to be verified and the classification tag to the blockchain network.
Optionally, the comprehensive judgment module 208 may further include:
a second receiving module, configured to receive, by the first trusted node, the HASH digest, the verification result, the information to be verified, and the classification tag sent by one or more trusted nodes in the block chain network;
the judging module is used for performing HASH processing on the verification result, the information to be verified and the classification label by the first trusted node, comparing the result after the HASH processing with the HASH abstract, and judging whether the verification result, the information to be verified and the classification label are tampered;
and the final verification result module is used for inquiring the weight information corresponding to the one or more trusted nodes in a preset database by the first trusted node if the verification result, the information to be verified and the classification label are not tampered, and carrying out comprehensive judgment according to the weight information and the verification result to generate a final verification result of the information to be verified.
Optionally, the apparatus may further include:
the first storage module is used for the trusted node which verifies the information to be verified to issue the encrypted verification result of the information to be verified, the node identification and the classification label to the block chain network;
and the classification label updating module is used for decrypting the verification result, the node identification and the classification label of the encrypted information to be verified issued to the blockchain network by all the trusted nodes in the blockchain network and updating the preset database of the trusted nodes according to the decrypted node identification and the classification label.
Optionally, the preset database further includes weights of all trusted nodes in the block chain network, and the apparatus may further include:
the second storage module is used for the first trusted node to issue the final verification result of the encrypted information to be verified to the block chain network;
and the weight updating module is used for increasing the weight information corresponding to the credible node with the verification result being the same as the final verification result by 1 in a preset database of all credible nodes in the block chain network.
Example 3:
as shown in fig. 3, the present embodiment provides a block chain based information verification apparatus, which includes a memory 21 and a processor 22, where the memory 21 stores instructions, and the processor 22 executes the instructions to execute the block chain based information verification method in embodiment 1.
The memory 21 is connected to the processor 22, the memory 21 may be a flash memory, a read-only memory or other memories, and the processor 22 may be a central processing unit or a single chip microcomputer.
Embodiments 2 to 3 provide the information verification apparatus based on a block chain, where a first trusted node receives information to be verified and obtains a classification tag corresponding to the information to be verified, and the first trusted node queries, in a preset database of the first trusted node, whether a trusted node corresponding to the classification tag exists in a block chain network, so that the information to be verified can be quickly mapped to one or more trusted nodes in the block chain network, where the trusted nodes have a verification function on the verification information; meanwhile, the first trusted node receives the encrypted verification result of the to-be-verified information issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result, and generates a final verification result of the to-be-verified information. In addition, the problem that the verification process of the information cannot be traced by the masses and third parties in the existing verification method is solved through the information verification based on the block chain.
It will be understood that the above embodiments are merely exemplary embodiments taken to illustrate the principles of the present invention, which is not limited thereto. It will be apparent to those skilled in the art that various modifications and improvements can be made without departing from the spirit and substance of the invention, and these modifications and improvements are also considered to be within the scope of the invention.

Claims (10)

1. An information verification method based on a block chain, the method comprising:
the first trusted node receives the information to be verified and acquires a classification label corresponding to the information to be verified;
the first trusted node inquires whether a trusted node corresponding to the classification label exists in a block chain network in a preset database of the first trusted node, wherein the preset database comprises node identifications, classification label sets and public keys of all trusted nodes in the block chain network;
if the trusted node corresponding to the classification label exists, the first trusted node encrypts the information to be verified and the classification label by adopting a public key of the trusted node corresponding to the classification label, and issues the encrypted information to be verified and the encrypted classification label to a blockchain network;
and the first trusted node receives the encrypted verification result of the information to be verified issued in the block chain network, decrypts the verification result, comprehensively judges the decrypted verification result and generates the final verification result of the information to be verified.
2. The method for verifying information based on a blockchain according to claim 1, wherein after the first trusted node queries whether a trusted node corresponding to the classification tag exists in a blockchain network in a preset database of the first trusted node, the method further comprises:
and if the credible node corresponding to the classification label does not exist, the first credible node respectively encrypts the information to be verified and the classification label by adopting public keys of all credible nodes in the block chain network, and issues the encrypted information to be verified and the encrypted classification label to the block chain network.
3. The information verification method based on the blockchain according to claim 2, wherein before the step of receiving the information to be verified and acquiring the class label corresponding to the information to be verified by the first trusted node, the method further comprises:
the method comprises the steps that a demand node crawls network information with high transfer quantity in preset time from the internet as to-be-verified information, and the to-be-verified information is sent to a first credible node;
the method for acquiring the classification label corresponding to the information to be verified by the first trusted node includes:
the first trusted node receives information to be verified sent by the demand node;
the first trusted node carries out semantic classification on the information to be verified to obtain a classification label;
after the first trusted node generates the final verification result of the information to be verified, the method further includes:
and the first trusted node sends the final verification result of the information to be verified to the demand node.
4. The information verification method based on the blockchain as claimed in claim 3, wherein the requiring node crawls network information with a higher number of uploads in a preset time from the internet as to-be-verified information, and sends the to-be-verified information to the first trusted node, and the method comprises:
the demand node crawls network information in preset time from the Internet, wherein the network information comprises title information, text information and URL information;
the demand node extracts the network information which has the same title information and text information and corresponds to different URL information from the network information, the network information of which the occurrence frequency is greater than a preset threshold value is used as the information to be verified, and the information to be verified comprises the title information and the text information;
the demand node sends the information to be verified to the first trusted node;
the semantic classification of the information to be verified by the first trusted node to obtain a classification label, which includes:
the first trusted node extracts one or more key words in the header information;
the first trusted node carries out semantic classification on the one or more key words to obtain a classification label;
the first trusted node queries whether a trusted node corresponding to the classification tag exists in a block chain network in a preset database of the first trusted node, and the method comprises the following steps:
the first trusted node inquires whether a classification label set corresponding to each node identification contains the classification label or not in a preset database of the first trusted node;
and if the classification label set corresponding to the node identification contains the classification label, determining the node corresponding to the node identification as a credible node corresponding to the classification label.
5. The information verification method based on the blockchain according to claim 4, wherein if there is a trusted node corresponding to the classification tag, the first trusted node encrypts the to-be-verified information and the classification tag by using a public key of the trusted node corresponding to the classification tag, and issues the encrypted to-be-verified information and the encrypted classification tag to the blockchain network, including:
if a trusted node corresponding to the classification label exists, the first trusted node queries a public key corresponding to the trusted node in the preset database;
the first trusted node encrypts the information to be verified and the classification label by adopting a public key corresponding to the trusted node;
the first credible node respectively issues the encrypted information to be verified and the encrypted classification labels to the block chain network, the encrypted information to be verified and the encrypted classification labels are used for triggering the credible node to decrypt the information to be verified and the classification labels by using a private key, then the information to be verified is verified, a verification result, the information to be verified and the classification labels are generated into an HASH summary, and the HASH summary, the verification result, the information to be verified and the classification labels are issued to the block chain network.
6. The information verification method based on the blockchain according to claim 5, wherein if there is no trusted node corresponding to the classification tag, the first trusted node encrypts the to-be-verified information and the classification tag respectively using public keys of all trusted nodes in the blockchain network, and issues the encrypted to-be-verified information and the encrypted classification tag to the blockchain network, including:
if the trusted node corresponding to the classification label does not exist, the first trusted node queries public keys corresponding to all trusted nodes in the block chain network in the preset database;
the first trusted node respectively encrypts the information to be verified and the classification labels by adopting public keys corresponding to all the trusted nodes;
the first trusted node respectively issues the encrypted information to be verified and the encrypted classification label to the blockchain network, the encrypted information to be verified and the encrypted classification label are used for triggering each trusted node in the blockchain network to decrypt the information to be verified and the classification label by using a respective private key, determining whether the information to be verified can be verified, verifying the information to be verified under the condition that the information to be verified can be verified, generating a HASH summary by using a verification result, the information to be verified and the classification label, and simultaneously issuing the HASH summary, the verification result, the information to be verified and the classification label to the blockchain network.
7. The information verification method based on the blockchain according to claim 6, wherein the first trusted node receives the verification result of the encrypted to-be-verified information issued in the blockchain network, decrypts the verification result, and performs comprehensive judgment on the decrypted verification result to generate a final verification result of the to-be-verified information, and the method includes:
the first trusted node receives the HASH summary, a verification result, information to be verified and classification labels sent by one or more trusted nodes in a block chain network;
the first trusted node performs HASH processing on the verification result, the information to be verified and the classification label, compares the result after the HASH processing with the HASH abstract, and judges whether the verification result, the information to be verified and the classification label are tampered;
if the verification result, the information to be verified and the classification label are not tampered, the first trusted node inquires weight information corresponding to the one or more trusted nodes in a preset database, comprehensive judgment is carried out according to the weight information and the verification result, and a final verification result of the information to be verified is generated.
8. The blockchain-based information verification method according to any one of claims 1 to 7, wherein after the first trusted node issues the encrypted information to be verified and the classification label to the blockchain network, the method further includes:
the trusted node which verifies the information to be verified issues the encrypted verification result of the information to be verified, the node identification and the classification label to the blockchain network;
and all the trusted nodes in the blockchain network decrypt the verification result, the node identification and the classification label of the encrypted information to be verified issued to the blockchain network, and update the preset database of the trusted nodes according to the decrypted node identification and the classification label.
9. The method for verifying information based on a blockchain according to claim 8, further comprising, after the step of generating a final verification result of the information to be verified by the first trusted node:
the preset database also comprises the weights of all the credible nodes in the block chain network;
the first trusted node issues the final verification result of the encrypted information to be verified to the block chain network;
and all the trusted nodes in the block chain network increase the weight information corresponding to the trusted nodes with the verification results identical to the final verification results in a preset database.
10. An information verification device based on a block chain is applied to a first trusted node, and is characterized by comprising:
the classification acquisition module is used for receiving the information to be verified and acquiring a classification label corresponding to the information to be verified;
a node query module, configured to query whether a trusted node corresponding to the classification tag exists in a blockchain network in a preset database, where the preset database includes node identifiers, a classification tag set, and a public key of all trusted nodes in the blockchain network;
the first sending module is used for encrypting the information to be verified and the classification label by adopting a public key of the trusted node corresponding to the classification label when the trusted node corresponding to the classification label exists, and issuing the encrypted information to be verified and the encrypted classification label to the blockchain network;
and the comprehensive judgment module is used for receiving the encrypted verification result of the information to be verified issued in the block chain network, decrypting the verification result, comprehensively judging the decrypted verification result and generating the final verification result of the information to be verified.
CN202010523562.XA 2020-06-10 2020-06-10 Information verification method and device based on block chain Active CN111695154B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010523562.XA CN111695154B (en) 2020-06-10 2020-06-10 Information verification method and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010523562.XA CN111695154B (en) 2020-06-10 2020-06-10 Information verification method and device based on block chain

Publications (2)

Publication Number Publication Date
CN111695154A true CN111695154A (en) 2020-09-22
CN111695154B CN111695154B (en) 2023-04-28

Family

ID=72480058

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010523562.XA Active CN111695154B (en) 2020-06-10 2020-06-10 Information verification method and device based on block chain

Country Status (1)

Country Link
CN (1) CN111695154B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948856A (en) * 2021-03-03 2021-06-11 电信科学技术第五研究所有限公司 Tamper-proof credible network collaborative control system and implementation method
CN112950237A (en) * 2021-05-12 2021-06-11 常州市市场监管服务中心(常州市特种设备事故调查处置中心) Gas cylinder quality safety tracing system based on OCR and block chain and control method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228133A1 (en) * 2018-01-19 2019-07-25 Nasdaq, Inc. Systems and methods of digital content certification and verification using cryptography and blockchain
CN110083827A (en) * 2019-03-28 2019-08-02 无锡天脉聚源传媒科技有限公司 Deceptive information discrimination method, system and storage medium based on machine learning
CN110599210A (en) * 2019-09-27 2019-12-20 腾讯云计算(北京)有限责任公司 Information management method and device of block chain
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN111209540A (en) * 2020-01-03 2020-05-29 腾讯科技(深圳)有限公司 Information verification method, device and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20190228133A1 (en) * 2018-01-19 2019-07-25 Nasdaq, Inc. Systems and methods of digital content certification and verification using cryptography and blockchain
CN110083827A (en) * 2019-03-28 2019-08-02 无锡天脉聚源传媒科技有限公司 Deceptive information discrimination method, system and storage medium based on machine learning
CN110599210A (en) * 2019-09-27 2019-12-20 腾讯云计算(北京)有限责任公司 Information management method and device of block chain
CN110889264A (en) * 2019-11-11 2020-03-17 腾讯科技(深圳)有限公司 Multimedia information processing method, device, equipment and storage medium
CN111209540A (en) * 2020-01-03 2020-05-29 腾讯科技(深圳)有限公司 Information verification method, device and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冯秀果;许金叶;: "新媒体下虚假信息的治理:基于区块链技术治理的逻辑" *
马强;林浩瀚;: "基于区块链技术的网络谣言治理模式探析――以新闻平台Steemit为例" *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112948856A (en) * 2021-03-03 2021-06-11 电信科学技术第五研究所有限公司 Tamper-proof credible network collaborative control system and implementation method
CN112948856B (en) * 2021-03-03 2022-11-15 电信科学技术第五研究所有限公司 Tamper-proof credible network collaborative control system and implementation method
CN112950237A (en) * 2021-05-12 2021-06-11 常州市市场监管服务中心(常州市特种设备事故调查处置中心) Gas cylinder quality safety tracing system based on OCR and block chain and control method

Also Published As

Publication number Publication date
CN111695154B (en) 2023-04-28

Similar Documents

Publication Publication Date Title
Liu et al. Verifiable Diversity Ranking Search Over Encrypted Outsourced Data.
CN110224993B (en) Responsibility pursuing anonymous electronic voting method and system based on block chain
CN111914027B (en) Block chain transaction keyword searchable encryption method and system
US11233657B2 (en) Method and system for registering digital documents
US9977918B2 (en) Method and system for verifiable searchable symmetric encryption
US10476662B2 (en) Method for operating a distributed key-value store
Churches et al. Some methods for blindfolded record linkage
CA2870930C (en) System for anonymizing and aggregating protected health information
CN111723355A (en) Information management in a database
CN113626484A (en) Searchable encryption method and system capable of flexibly replacing ciphertext and computer equipment
CN110635913B (en) Electronic prescription verification method and device
CN111695154B (en) Information verification method and device based on block chain
US7519822B2 (en) Method and apparatus for processing descriptive statements
CN116433425A (en) Case setting method based on alliance chain and related equipment
JP2007043321A (en) Authenticity verification method and system of electronic document
JP2005100347A (en) Program creation apparatus
CN105868987A (en) Method and system for sharing information among devices
CN102299927A (en) Content security supervision system and method
CN112163036A (en) Block chain information construction and query method and related device
Hacigümüş et al. Encrypted database integrity in database service provider model
CN112732789A (en) Searchable encryption method based on block chain and electronic equipment
KR102680140B1 (en) System and method for collecting of clinical trial data based on block-chain
JP6831601B2 (en) Information management method and equipment
Lewison et al. Rich credentials for remote identity proofing
EP4154149B1 (en) Data storage server and client devices for securely storing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant